Email Alerts
-
Researchers uncover advanced cyber espionage campaign
An elusive cyber espionage campaign has been targeting diplomatic, governmental and scientific research organisations for several years, analysis by Kaspersky Lab has revealed Cyber security | 14 Jan 2013
-
UK hackers admit stealing Michael Jackson tracks from Sony
Two UK men have avoided jail by admitting breaking into servers at Sony Music and downloading Michael Jackson's 50,000-track back catalogue News | 14 Jan 2013
-
Anonymous uses Aaron Swartz suicide to call for copyright reform
At least two MIT websites have been replaced with a political message in memory of digital activist and pioneer Aaron Swartz, who hanged himself News | 14 Jan 2013
-
Oracle rushes out patches for Java zero days
Oracle has released two out-of-band security updates for the latest zero day vulnerabilities in Java software security | 14 Jan 2013
-
European Cybercrime Centre opens in The Hague
Cecilia Malmström, EU commissioner for home affairs, has opened the European Cybercrime Centre (EC³) at Europol in The Hague News | 11 Jan 2013
-
Disable Java to protect from latest zero-day
Security researchers are warning of a zero-day vulnerability in all versions of Java, including the latest Java 7 update 10 News | 11 Jan 2013
-
Ruby on Rails flaws expose thousands of websites to attack
More than 240,000 websites that use Ruby on Rails web applications are at risk of being exploited by attackers Cyber security | 10 Jan 2013
-
Software piracy international in scope, says Fast
The scale of software piracy is both international in scope and military in its execution, says the Federation Against Software Theft (Fast) News | 10 Jan 2013
-
Drive-by and XXS attacks will increase in 2013 – but why?
Drive-by download and cross-site scripting attacks (XSS) will remain top hacking methods in 2013. But what is their enduring appeal for hackers? Analysis | 10 Jan 2013
-
Internet firms concerned over EU data protection proposals
Internet firms such as Facebook may have to get permission to use data if the EU adopts proposals giving users more control over personal data News | 10 Jan 2013
- See more News on IT for utilities and energy
-
Business priorities: what to protect, monitor and test
How information security professionals can prioritise what to protect, monitor and test in the light of current budget and resource constraints Feature
-
How to manage the security of cloud implementations
Tips for organisations adopting cloud computing on how to ensure that they secure data in line with the expectations of all stakeholders Feature
-
CW500 Club in 2012
Computer Weekly's CW500 Club attracts the top IT leaders in the UK to talk to their peers about the topical challenges they face Top 10s
-
How to preserve forensic evidence in the golden hour after a breach
There is a golden hour at the outset where a clear head and good planning can make or break any subsequent forensic investigation Feature
-
CIOs debate the future of the datacentre
IT leaders met at a roundtable event hosted by Computer Weekly in association with Oracle to discuss the future of the datacentre Feature
-
How to secure Macs in the enterprise
Apple computers are becoming increasingly used in the enterprise - we look at how to securely introduce Macs in the corporate network Feature
-
M2M technology ushers in the age of total connection
Machine-to-machine (M2M) communications is transforming the world into one where everything and everyone is networked. Feature
-
Tune Raid performance to get the most from your HDDs
Tune Raid performance at the storage controller to match application I/O demands to optimal hard drive (HDD) performance Feature
-
How to make your business Flame-proof
Advanced threats such as Flame can show CIOs what cyber attack tools of the future could look like Feature
-
Is cloud data storage right for your organisation?
Find out if cloud data storage is a serious option for you with this evaluation of its suitability for primary, nearline, backup and archive data Feature
- See more Features on IT for utilities and energy
-
Tips for better governance and compliance
What is the relationship between regulation, governance and IT, and how can they contribute in ways that support the business? Opinion
-
Security Think Tank: Infosec and the business – the symbiotic relationship
How can information security make business sense? Opinion
-
Security Think Tank: Basic engagement principles can boost IT security’s profile
How can information security make business sense? Opinion
-
Security Think Tank: Evaluate IT security investments
How can information security make business sense? Opinion
-
Security Think Tank: Four steps to show value of IT security
How can information security make business sense? Opinion
-
Security Think Tank: Infosec professionals need to communicate value to business
How can information security make business sense? Opinion
-
Security Think Tank: A risk-based approach to security is key to business alignment
How can information security make business sense? Opinion
-
Security Think Tank: Information security is not optional
How can information security make business sense? Opinion
-
Security Think Tank: People and risk key to aligning security and business
How can information security make business sense? Opinion
-
Five steps to climbing the IT security ladder
Five steps to help stay ahead of the pack in IT security Opinion
- See more Opinion on IT for utilities and energy
-
UKtech50 2012 - The most influential people in UK IT
We run down the top 20 names from this year's Computer Weekly UKtech50 list of the 50 most influential people in UK IT Photo Story
-
London 2012 Olympic Games Coverage
Read all our London Olympics IT coverage so far including IT preparations, the website, power concerns and the creation of thousands of new jobs. guide
-
Researchers uncover advanced cyber espionage campaign
An elusive cyber espionage campaign has been targeting diplomatic, governmental and scientific research organisations for several years, analysis by Kaspersky Lab has revealed Cyber security
-
UK hackers admit stealing Michael Jackson tracks from Sony
Two UK men have avoided jail by admitting breaking into servers at Sony Music and downloading Michael Jackson's 50,000-track back catalogue News
-
Anonymous uses Aaron Swartz suicide to call for copyright reform
At least two MIT websites have been replaced with a political message in memory of digital activist and pioneer Aaron Swartz, who hanged himself News
-
Oracle rushes out patches for Java zero days
Oracle has released two out-of-band security updates for the latest zero day vulnerabilities in Java software security
-
European Cybercrime Centre opens in The Hague
Cecilia Malmström, EU commissioner for home affairs, has opened the European Cybercrime Centre (EC³) at Europol in The Hague News
-
Disable Java to protect from latest zero-day
Security researchers are warning of a zero-day vulnerability in all versions of Java, including the latest Java 7 update 10 News
-
Ruby on Rails flaws expose thousands of websites to attack
More than 240,000 websites that use Ruby on Rails web applications are at risk of being exploited by attackers Cyber security
-
Software piracy international in scope, says Fast
The scale of software piracy is both international in scope and military in its execution, says the Federation Against Software Theft (Fast) News
-
Drive-by and XXS attacks will increase in 2013 – but why?
Drive-by download and cross-site scripting attacks (XSS) will remain top hacking methods in 2013. But what is their enduring appeal for hackers? Analysis
-
Internet firms concerned over EU data protection proposals
Internet firms such as Facebook may have to get permission to use data if the EU adopts proposals giving users more control over personal data News
- See more All on IT for utilities and energy
About IT for utilities and energy
Utility firms and energy companies rely on IT to support their often highly complex operations. The industry is being forced by politial and customer pressure to be greener and technology is central to achieving greater energy efficiency, through major initiatives such as smart meters. Our stories about energy and utility firms examine how IT is helping to enable change and improvement in these companies.