The device maker has released a statement saying that it is not a Communist Chinese military company.
The federal government and private sector are still reeling from the SolarWinds supply chain hack, and Congress is on edge as it begins a new term bes...
High-quality data within a CRM helps deliver business success.
Get five data analytics courses for under $30.
One of the greatest draws of cloud computing is the promise of greater security. Cloud service providers typically have greater expertise and budget t...
Cyber criminals know how many of us are working from home and are looking to exploit that situation with phishing emails designed to copy big brands.
Traditional in-person physical offices have been disappearing from our work lives for many years. With pandemic-wracked 2020 receding into history, ma...
VMware Virtual Volumes and a move from NetApp to Pure Storage saw cosmetics retailer Beauty Success make performance gains and eliminate bottlenecks i...
CIOs need to rethink how they present themselves or they will be defined by others.
Ambulance service’s business intelligence has come into its own during the coronavirus crisis, helping the managers behind the paramedics to deliver t...
Data dump understood to include screenshots of emails, peer review information, PDFs and PowerPoint presentations
In a post-Covid world, how can you ensure you're secure?
The cyber security company’s Australia cloud location will address data localisation requirements amid growing adoption of cloud-based security servic...
The unpredictability of today’s business environment has accelerated the need for companies to better manage their data, so getting a better handle on...
Anita (a fictitious character) is a CISO for a global financial institution. With more than 20 years in enterprise cyber security, Anita considers her...
Some ransomware operators have started targeting the C-suite exclusively.
Customers can expect to see more regular and thorough checks on SolarWinds products, alongside greater engagement with the security community
Ransomware gangs are prioritizing stealing data from workstations used by executives in the hopes of finding and using valuable information to use in...
There are two kinds of measurements in business: one to assess performance and the other to provide intelligence. The smart CIO needs to do both.
The SolarWinds hack shows the widespread damage possible from a nation state cyber attack. What is the threat to business and how can it be mitigated?
As organizations chart a post-pandemic recovery that’s both uncertain and uneven, we talked to Stephen Ludlow, SVP of Product Management at OpenText,...
2020 has put IT managers at the center of business operations, now they must navigate the choppy waters ahead.
Chinese networking equipment supplier Huawei fights to retain access to potential 5G contracts across the Nordic region
US prosecutors say the goal was to “steal back” key clients.
Vendor has seen its channel respond to the shift to home working, but is keen to highlight other areas where partners can increase revenues this year
While you've been distracted by the holidays, coronavirus, and politics, the more we learn about the SolarWinds security fiasco, the worse it looks.
Here are Computer Weekly’s top 10 investigations and national security stories of 2020
Enabling performance from smart buildings through cobotic strategies.
Collaboration between organizations and even countries might be the only way to have a positive impact on cybercrime, according to one expert.
The Dissolution of the Monasteries expedited changes that had been gathering for around a century. The Internet has had an impact akin to that of th...
This is a guest blog by Andy Cotgreave, technology evangelist, Tableau Charts: they're all over the news. The NHS chief executive mocked others’ chart...
Cyber criminals are still successfully conducting ransomware campaigns while demanding higher ransoms than ever - and things could be about to get a l...
Industry body requests only one of the two requirements apply to critical infrastructure entities in the telecommunications sector.
US says Chinese companies are engaging in "PRC government-sponsored data theft."
The global pandemic, lockdowns and local lockdowns have required organisations to operate agile supply chains
Organizations that adopt a holistic approach to workforce management will enjoy increased resilience.
As security researchers dig through forensic evidence in the aftermath of the SolarWinds supply chain attack, victim names are slowly starting to surf...
As we all learned in the tumultuous, often tragic months of 2020, technology is essential to nearly every aspect of our lives — from health and learni...
Microsoft says 80% of the victims it identified were located in the United States.
Filed by a bipartisan group of 38 attorneys-general.
The roll-out of Microsoft 365 to dozens of UK police forces may be unlawful, because many have failed to conduct data protection checks before deploym...
According to Benjamin Franklin, nothing is certain in life except death and taxes. And in our advanced technology age, we can add a new inevitability:...
As the COVID-19 pandemic expanded around the world this year, digital transformation went from being a steady evolution to an absolute imperative, acc...
The software will bring crypto risk assessment to KYC processes.
Question: what’s better than project management? Answer: Invisible real-time data-driven project management, that’s what. Holy Land and US-based Linea...
Security teams across the world are on high alert as more details emerge of the widespread SolarWinds ‘Sunburst’ attack. What do defenders need to do...
The average user has more than 90 accounts. Remembering passwords is hard, which is why more than...
Software has transformed every business discipline. For companies trying to increase agility,...
A combination of factors is driving more companies to digital transformations within cloud-based...
The BlackBerry® Cylance® 2020 Threat Report contains a broad range of topics vital to the...
Cyber criminals are taking a people-centric approach to phishing attacks. Is your organization...