Demand for security testing, which should be conducted from the onset rather than as an afterthought, is growing in Australia
Nordic bank is shifting some of its workforce closer to fintech activity in the Swedish capital
Toy and games retailer Toys R Us is trialling the use of tablets for store assistance to provide a better customer service experience
Security advisers are urging organisations to patch their Windows systems to avert a possible second wave of an unprecedented, indiscriminate ransomware attack
Artificial intelligence could ease the pressures on the NHS, but first the service needs fully integrated health records and to tackle challenges around trust and data
Ramsomware attack highlights system-wide issues around lack of infrastructure investment and the need for cyber security training and awareness among NHS staff
A communications systems fault at Transport for Greater Manchester halted Metrolink tram services across the city on Sunday 14 May
Cyber attackers do not have to use previously unseen or extremely sophisticated attacks to bypass defences, analysis of publicly reported breaches in the past year reveals
MPs and peers have been warned not to use personal emails on parliamentary Windows computers in the wake of WannaCry ransomware outbreak
Manchester Airport Group is using cloud-based ITSM software to support its in-house service
A failure by many organisations to take cyber security seriously has long been blamed on the lack of a single significant event to shake things up. Does WannaCry fit the bill?
The vendor's multicloud strategy for storage was a hot topic during Dell EMC World 2017, headlined by expanded Virtustream, Elastic Cloud Storage and Azure offerings.
Consumers are now more trusting of other customers and product reviews than they are of advice given by retailers
OpenStack's Cinder, Swift and Manila storage projects experience a decline in vendor contributors heading into the upcoming release of the latest iteration, Pike.
Microsoft responds to WannaCry ransomware with an MS17-010 patch for legacy systems as new ransomware variants spread to more countries around the globe.
Vodafone has lost billions on its troubled foray into the Indian mobile market
More ransomware attacks are likely. The best way to protect against them is to have up-to-date in-house backups and to ensure cloud backups are adequately protected and available
Research has found skills gaps in data science, AI and infrastructure management are standing in the way of digital transformation
Survey shows 52% of CISOs working in the finance sector have made compliance with the EU’s General Data Protection Regulation an investment priority
The Labour Party’s 2017 election manifesto highlights better use of technology, maintaining data protection, and a £250bn investment in infrastructure
The UK government believes collaboration between the public and private sectors is critical to success in cyber security
Mobile payments app available in the UK nearly two years after its launch
Network and datacentre provider will expand its high bandwidth IQ Network to Helsinki to offer pan-Eurasian and local connectivity
Shoppers aged 20 and under are increasingly interested in buying goods directly through social media, as well through subscription-based retail services and voice-activated devices
The Machine is HPE’s proof-of-concept next-generation hardware architecture that aims to overcome the limits of today’s IT by using large memory arrays
Australia’s Macquarie bank builds a data layer on top of legacy IT systems to transform customer experience
Microsoft blames the U.S. government for cyberweapon stockpiling as WannaCry ransomware infections continue to spread, though some experts say Microsoft shares responsibility.
With its expanded Leonardo platform that includes machine learning capabilities, SAP hopes to go beyond its stronghold of supplying core ERP systems
At SAP’s annual Sapphire Now conference in Orlando, Florida, CEO Bill McDermott ruled out charging for static read access from third-party systems, after recent controversy
Virtualisation giant strikes up public cloud partnership with Microsoft to support users that want to run their business applications and desktops in Azure
Essential Accessibility is on a mission to make online services more friendly to disabled people through a mix of assistive technology and consultancy
TechUK’s digital vision sees the government placing digital technology at the heart of the UK economy, refreshing Gov.uk Verify and prioritising tech in Brexit negotiations
The gap between the number of digital tech firms in London and the rest of the UK is growing
Coloclue, an independent network testing association, is building out its next-generation product network on Juniper’s NFV technology
National data guardian for health and care says the NHS data-sharing deal with Google DeepMind, which relied on implied consent from patients, was made on an inappropriate legal basis
Most businesses are still not taking cyber security seriously enough, according to the former CEO of TalkTalk, which suffered a major data breach in 2015
Dell EMC’s XtremIO X2 all-flash arrays got a performance jump from ungraded hardware, but the real performance boost comes from changes to the way I/O is dealt with
Canadian vehicle manufacturer inks IBM cloud deal to support five-year push to cut costs and improve efficiency
The first chief digital officer at Danish shipping giant Maersk tells Computer Weekly how he is taking on the digital challenge
As bug bounty programs become more mainstream, Bugcrowd founder and CEO Casey Ellis offers insights into rewards, best practices and tips for getting the most bang for the buck.
Tired of waiting for NVMe? Western Digital's HGST Ultrastar-branded 12 Gbps SAS-based 3D NAND SSDs target high-performance virtual, database, analytics and cloud workloads.
The Cinder, Swift and Manila OpenStack storage projects focused on performance, stability, scalability and enterprise-level capabilities in the latest Ocata release cycle.
Console unveils a cloud interconnect service that offers a more secure and stable connection between multiple cloud providers.
This week, bloggers look into the open source networking option SNAS, SIEM for enterprises and automating device configurations.
The business software supplier expects its cloud portfolio to contribute at least a third of its revenues in a region that includes key markets such as Australia, Japan and Southeast Asia
The bipartisan PATCH Act aims to codify the Vulnerabilities Equities Process into law in the wake of a global ransomware attack based on a stolen NSA cyberweapon.
Dubai is becoming a world leader in smart city developments and international organisations want to tap its experience
Cisco CEO Chuck Robbins has been talking about the criticality of analytics and automation technology to the enterprise network
The WannaCry ransomware attack that started on 12 May 2017 is the biggest single incident that the new UK National Cyber Security Centre (NCSC) has faced
There is a direct correlation between data breaches and falls in stock prices, but the impact is lighter on companies with good cyber security, a study has revealed
The Liberal Democrats 2017 election manifesto promises 30Mbps broadband, a focus on innovation and a digital bill of rights
IT-focused professional services company FDM has encouraged firms to adopt gender pay reporting after revealing a pay gap of 6% across its firm
DTCC whitepaper claims financial services firms that shun cloud are at heightened risk of running into resiliency, security and performance issues.
Tories aim to create a digital charter, continuing a “digital by default” government and a dynamic digital economy
Uncertainty caused by the UK leaving the EU has caused a pause in activity for half of CIOs, while the others are accelerating their digital transformation
Coreix found costly SAN capex outlays too onerous so opted to build its own hyper-converged infrastructure from StorPool storage software and SuperMicro x86 servers
Comcast Business chooses Versa Networks as its managed SD-WAN partner, while Sprint turns to VeloCloud. Also, NEC and Dell EMC announce the availability of their SD-LAN service.
Micron Ceph storage comes as a four-node storage cluster that incorporates object features of Red Hat's Jewel release. A single cluster scales to 96 TB of effective capacity.
Organisations in Japan and Australia are improving worker safety and reducing bus accidents with data analytics and wearables
Survey shows 42% of people think autonomous vehicles will make roads safer, but 46% admit they would not feel safe as a passenger in a driverless vehicle
Sharing information in the face of threats such as WannaCry is crucial for organisations to improve their cyber security capability, according to Neustar, which is making it easier to do
We examine the digital promises in the three main national political parties’ manifestos and how they compare on broadband, skills, digital government, infrastructure and innovation
Software giant plans to capitalise on business demand for its cloud services in Africa by offering users access to locally hosted Azure and Office 365
Claude Moraes, chair of the European Parliament's Civil Liberties, Justice and Home Affairs Committee shares his views, concerns, reservations about EU-US data transfers, encryption and Brexit
App developed with IT company ThinkShield helps clinicians at London NHS trust to prioritise at-risk patients
Malware command and control (C&C) communications are key to detecting advanced threats, according to a security researcher
Although there is evidence that some victims of the WannaCry ransomware attack on 12 May have paid the attackers, there is no evidence that they are getting their data back
A leader in the IT systems management market, ServiceNow looks to expand into new applications markets. Farrell Hough, in charge of ServiceNow's product operations, lays out the roadmap.
News roundup: The new Google Play Protect system aims to improve Android app security. Plus, Google Cloud IoT Core adds layer of device security, and more.
Juniper's Kevin Walker talks with SearchSecurity about the evolving threat landscape and how some attackers are incorporating data manipulation into their schemes.