Security audit, compliance and standards
Get tips from the experts on security audits, compliance and standards. Advice is offered on data privacy and theft, audit planning and management, how to work with auditors, and compliance with standards, regulations and guidelines such as PCI DSS, GLBA, HIPPA, SOX, FISMA, ISO 17799 and COBIT.
Top Stories
-
Tip
20 Sep 2022
How to develop a cybersecurity strategy: Step-by-step guide
A cybersecurity strategy isn't meant to be perfect, but it must be proactive, effective, actively supported and evolving. Here are the four steps required to get there. Continue Reading
-
Tip
14 Jun 2022
3 steps for CDOs to ensure data sovereignty in the cloud
Data sovereignty regulations, combined with a tsunami of data growth and increased cloud usage, have created a perfect storm that chief data officers must manage. Continue Reading
-
01 Nov 2022
How the pandemic accelerated tech adoption in hospitality
The pandemic led to technology adoption across several sectors, with hospitality being no exception. Continue Reading
-
Blog Post
01 Nov 2022
Tackling the world’s silent polluter – the internet
In this guest post, Donovan Justice, a partner within the digital engineering and emerging tech group at EY, sets out why it is time people started paying attention to the carbon emissions ... Continue Reading
-
E-Zine
01 Nov 2022
How the pandemic accelerated tech adoption in hospitality
In this week’s Computer Weekly, we look at how the hospitality sector is turning to technology to rebuild after it was devastated by the pandemic. Google’s cloud business is growing but remains well behind the market leaders – what does its future look like? And we look at the benefits of AIOps for storage. Read the issue now. Continue Reading
-
Feature
31 Oct 2022
James Earl Jones, AI and the growing voice cloning market
The growing text-to-speech and speech-to-speech market is sparking new enterprise applications. However, the technologies also raise concerns about privacy and misuse of the tools. Continue Reading
-
News
31 Oct 2022
DEI policies and politics divide workplace
In today's workplace, many employees avoid co-workers they don't agree with politically, and also work to resist business efforts to deploy DEI policies. Continue Reading
-
Feature
31 Oct 2022
Why RFID for supply chain management is still relevant
RFID is comparatively older technology but can still be relevant for supply chain management. Learn some potential logistics uses for RFID and reasons for its increased adoption. Continue Reading
-
Podcast
31 Oct 2022
Latest Oracle ERP pitch deems cloud partnerships essential
TechTarget editors discuss enterprise application news from Oracle CloudWorld 2022 and Oracle's emphasis on partnerships to broaden the appeal of its multi-tenant SaaS flagship, Oracle Fusion ERP Cloud. Continue Reading
-
Opinion
31 Oct 2022
Security hygiene and posture management requires new tools
Using multiple tools to address security hygiene and posture management at scale is costly and difficult. A new converged security technology category may be the answer. Continue Reading
-
Feature
31 Oct 2022
A primer on CXL technology uses
The Compute Express Link, an open source memory interconnect, is gaining traction. Take a deep dive into why it's important and how it improves performance. Continue Reading
-
Feature
31 Oct 2022
Defining requirements key to manage machine learning projects
Machine learning projects are likely to fail without proper planning. 'Managing Machine Learning Projects' provides guidance on how to plan by defining ML project requirements. Continue Reading
-
Feature
31 Oct 2022
10 tech jobs that don't require a degree
Not all tech jobs require a college degree. Some of these jobs -- such as network engineer, cybersecurity analyst and web developer -- are in high demand and offer online training. Continue Reading
-
Opinion
31 Oct 2022
How to build consumer trust with a privacy-by-design approach
Undertaken with the right mindset and technology, privacy by design delivers value to consumers and builds trust for the long term Continue Reading
-
Opinion
31 Oct 2022
The risk of losing our EU data adequacy agreement is real
While some may welcome the government’s ambition to shake up the UK’s data protection regime, Westminster should be wary of drifting too far from the path charted by our US and European partners Continue Reading
-
News
31 Oct 2022
Capital One machine learning report points to partnering
A study of data management decision-makers suggests collaboration will play an important role in evolving enterprise machine learning, but a partner's proven experience will be key. Continue Reading
-
Tip
31 Oct 2022
Why and how to use container malware scanning software
Malware is on the rise, and containers are potential attack vectors. Learn why it's crucial to check containers for vulnerabilities and compare container malware scanning tools. Continue Reading
-
News
31 Oct 2022
Channel roundup: Who’s gone where?
Another busy week in the industry as moves are made to gain expertise to support growth Continue Reading
-
Blog Post
31 Oct 2022
SonarSource: Google’s Carbon language is a successor, not a replacement, for C++
This is a guest post for Computer Weekly written by Phil Nash in his role as developer advocate at SonarSource - the company is known for its platform that developers and development teams to write ... Continue Reading
-
Feature
31 Oct 2022
Why and when to consider a feature store in machine learning
Feature stores exist to make data for training machine learning models reusable. Explore both the benefits and challenges of feature stores that organizations can experience. Continue Reading
-
Tip
31 Oct 2022
The ins and outs of unstructured data protection
Protecting unstructured data requires a few extra considerations for backup admins. Growing storage capacity requirements and regulatory compliance are critical. Continue Reading
-
Feature
31 Oct 2022
AI experts question tech industry’s ethical commitments
The massive proliferation of ethical frameworks for artificial intelligence has done little to change how the technology is developed and deployed, with experts questioning the tech industry’s commitment to making it a positive social force Continue Reading
-
News
31 Oct 2022
EE takes AIR for greater energy efficiency in revamped 5G radio net
BT Group mobile division deploys Swedish comms tech provider’s Massive MIMO radio equipment across key UK sites, accelerating 5G deployment Continue Reading
-
Feature
31 Oct 2022
Consider ethical technology issues with data center growth
Authors Harry Lewis and Ken Ledeen discuss ethical issues organizations should consider when expanding data center, data collection and technological capabilities. Continue Reading
-
News
31 Oct 2022
Prepare today for potentially high-impact OpenSSL bug
OpenSSL trailed a critical vulnerability patch last week, which will be only the second such flaw ever found in the open source encryption project. Unfortunately, the first was Heartbleed Continue Reading
-
Tip
31 Oct 2022
How to build a Windows Server 2022 home lab and why
It's possible to get to learn about the features in the latest Microsoft server OS in a cloud environment, but there are a few reasons to stay grounded with this approach. Continue Reading
-
News
31 Oct 2022
Gartner warns of 'inflationary pressure' risk to global public cloud spending
Market watcher Gartner is predicting strong overall growth for the worldwide public cloud market, but warns that any tightening of overall IT budgets could hit its forecast Continue Reading
-
News
31 Oct 2022
Scotland 5G Centre officially launches its 5G Innovation Hub in Ayrshire
National centre for accelerating the deployment and adoption of 5G in Scotland and realising its economic and societal potential unveils latest hub in Ayrshire in partnership with Vodafone and HALO Continue Reading
-
Blog Post
31 Oct 2022
API series - Cisco ThousandEyes: Go deep, granular & adaptive on API testing
This is a guest post for the Computer Weekly Developer Network written by Joe Dougherty in his role as product solutions architect at Cisco ThousandEyes ThousandEyes monitors network ... Continue Reading
-
News
31 Oct 2022
Westcoast merges with German player Komsa
The alliance between Westcoast and Komsa will create an operation that covers the UK, Ireland, France and Germany Continue Reading
-
News
31 Oct 2022
Huawei launches all-band 5G series
Chinese comms tech provider unveils new concept in next-generation mobile communications with set of solutions designed to facilitate the evolution of all bands to 5G infrastructure Continue Reading
-
News
31 Oct 2022
Cyber crime officer says French legal challenges to EncroChat are ‘hype’
Matthieu Audibert, officer of the French Gendarmerie’s cyber space command, gets into a spat with defence lawyers on Twitter over the lawfulness of evidence from the hacked phone network EncroChat Continue Reading
-
Opinion
31 Oct 2022
Security Think Tank: Container security: why so different?
Done well, container security can be a model for securing the enterprise, and businesses that focus their teams on solving it can help accelerate positive change in other areas Continue Reading
-
Podcast
31 Oct 2022
Coding at bet365: A Computer Weekly Downtime Upload podcast
In this podcast, Alan Reed, head of sports development at bet365, discusses the technical and business challenges of scalability Continue Reading
-
Feature
31 Oct 2022
The tech helping organisations manage their finances
With a worsening economic climate, software has an important role in helping finance departments control budgets and spending Continue Reading
-
News
31 Oct 2022
SoftIron’s HyperCloud to ease private cloud deployments
SoftIron claims its technology stack fully automates the provisioning of storage, compute, networking and infrastructure services, providing a fully functioning, multi-tenant cloud Continue Reading
-
Tip
28 Oct 2022
Comparing the features of Citrix and VMware's VDI software
Citrix and VMware offer tools to simplify VDI deployment and management for IT. Understand the key differences between Citrix Virtual Apps and Desktops and VMware Horizon. Continue Reading
-
News
28 Oct 2022
Whistleblower risk rises with AI policy adoption
Big tech companies aren't the only ones who should worry about repercussions from whistleblowers. CIOs from all industries should be implementing responsible tech policies. Continue Reading
-
Feature
28 Oct 2022
Equipment to include in a computer forensic toolkit
Computer forensic investigators require more than software to do their job. Learn what equipment constitutes a complete computer forensic toolkit. Continue Reading
-
Podcast
28 Oct 2022
How multi-tenant SaaS HR unified the Hearst conglomerate
Debra Robinson, SVP and CIO at Hearst Communications, takes listeners inside the company's major project to consolidate disparate ERP and HR systems on Oracle Cloud Applications. Continue Reading
-
Feature
28 Oct 2022
Advice for beginner computer forensic investigators
For those interesting in becoming a computer forensics investigator, learn about the career and what to expect, as well as why digital evidence is the most volatile evidence. Continue Reading
-
News
28 Oct 2022
Staying relevant in process mining: Celonis' challenge
The vendor recently announced a $1 billion funding extension. But despite its popularity for process mining, Celonis faces competition from more vendors entering the market. Continue Reading
-
Feature
28 Oct 2022
Modernizing talent one of the keys to analytics success
Adding a chief data officer, hiring data engineers and implementing a data literacy program are crucial aspects of reaching a desired level of data maturity. Continue Reading
-
Quiz
28 Oct 2022
Data science quiz: Test your knowledge
Interested in becoming a data scientist? This short quiz will test what you know about the data science process, required skills and how data scientists do their jobs. Continue Reading
-
Podcast
28 Oct 2022
Risk & Repeat: Microsoft, SOCRadar spar over data leak
This podcast episode discusses threat intelligence vendor SOCRadar's disclosure of a large Microsoft data leak and the contentious exchange between the two companies that followed. Continue Reading
-
Blog Post
28 Oct 2022
Hands-on Kubernetes interview questions
Review these in-depth Kubernetes interview questions and answers to showcase your applied knowledge of Kubernetes and container orchestration. Continue Reading
-
News
28 Oct 2022
How Musk's Twitter takeover could affect business accounts
Potential changes to Twitter's advertising and security policies are top issues for business owners who rely on the social media platform for brand visibility and sales. Continue Reading
-
Tip
28 Oct 2022
Why contract testing can be essential for microservices
Developers face numerous struggles trying to perform traditional, end-to-end integration testing on microservices. Contract testing presents a potential alternative. Continue Reading
-
Feature
28 Oct 2022
8 cybersecurity books to read in 2023
Brush up on your cybersecurity skills by picking up one of these titles. Continue Reading
-
Guest Post
28 Oct 2022
It's time to rethink security certification for OT devices
Security certifications don't protect OT devices from vulnerable processes and insecure-by-design practices. It's time to update security certs for the connected OT age. Continue Reading
-
News
28 Oct 2022
Post Office warned of Horizon software-induced ‘tragedy’ in 1999
Problems experienced during live trials of the Post Office Horizon system predicted the ‘tragedy’ that unfolded Continue Reading
-
Feature
28 Oct 2022
Tearing down the barriers to full digital connectivity
Millions of households rely on good connectivity for work, study or leisure. But how much has fast and consistent broadband connectivity spread across the UK? Continue Reading
-
Feature
28 Oct 2022
Filmmaker uses NAS storage for better collaboration
With normal workflows out the window, horror filmmaker Damien LeVeck eased the collaborative movie editing process by going all-in with Blackmagic Cloud Store. Continue Reading
-
News
28 Oct 2022
For API security to succeed, devs need integrated tooling
For greater API security and clearer boundaries for developers, experts at API World called for developer-focused security tools that dovetail seamlessly into their workflows. Continue Reading
-
News
28 Oct 2022
Virgin Media O2 trials 5G drone in Snowdonia
Comms operator trials new 5G drone technology to increase safety for millions of visitors at North Wales national park, delivering network coverage to remote areas and helping emergency services to respond to distress calls better Continue Reading
-
Tip
28 Oct 2022
How to create the right self-service content for customers
Organizations should provide useful content to customers to help them solve problems without contacting customer service. Effective content gives customers answers quickly. Continue Reading
-
Tip
28 Oct 2022
What's the difference between 802.11ac vs. 802.11ax?
The difference between 802.11ac and 802.11ax is significant. The two wireless standards differ notably in features such as AP capacity, spatial streams and data rates. Continue Reading
-
Feature
28 Oct 2022
Enterprise ransomware preparedness improving but still lacking
An Enterprise Strategy Group survey found enterprises are making strides in ransomware preparedness, but work remains to prevent and mitigate attacks. Continue Reading
-
News
28 Oct 2022
Sidecarless service mesh: Fad or the future?
Istio's experimental Ambient Mesh is gathering buzz with the promise of simpler operations, but Linkerd loyalists contend that the sidecar itself isn't the real problem. Continue Reading
-
News
28 Oct 2022
Webex looks to enhance customer experiences for digital era
Leading collaboration technology provider reveals what it claims is a unique functionality that can deliver a fully integrated UCaaS, CCaaS and CPaaS portfolio to improve customer experience Continue Reading
-
Podcast
28 Oct 2022
Top 50 women in UK tech, IR35 Truss fiasco – Computer Weekly Downtime Upload podcast
The team reflects on the announcement of the Most Influential Women in UK Technology 2022, the IR35 reforms being scrapped, then not, and Dreamforce & Oracle Cloud World in the US Continue Reading
-
News
28 Oct 2022
Computacenter on track for modest growth
Channel player’s Q3 trading update indicates that this year will be one of growth Continue Reading
-
News
28 Oct 2022
AWS revenue growth rate falls as enterprise customers seek to cut costs
Amazon Web Services (AWS) has reported its slowest year-on-year rate of revenue growth since 2014 as enterprises seek to cut costs as economic uncertainty hits Continue Reading
-
News
28 Oct 2022
FYUZ 2022: Telecom Infra Project, Intel launch metaverse mMIMO collaboration
Global community designed to drive infrastructure services to advance global connectivity enters into partnership with chip giant Continue Reading
-
Opinion
28 Oct 2022
How has container security changed since 2020, and have we taken it too far?
While containers are now one of the most popular ways to deploy applications, it is fair to say that the adoption and implementation of security best practice to govern their use has not kept up Continue Reading
-
News
28 Oct 2022
Singapore’s met service to get new supercomputer
The Meteorological Service Singapore is getting a new Cray supercomputer to improve weather forecasting and tropical climate research Continue Reading
-
News
27 Oct 2022
Government ups cyber support for elderly, vulnerable web users
DCMS announces a funding boost to help the elderly, disabled and other vulnerable groups stay safe online and avoid being misled by disinformation Continue Reading
-
News
27 Oct 2022
SAP improves UX functionality for Intelligent Spend
At SAP Spend Connect, the vendor unveiled new updates to SAP Intelligent Spend applications, including a consumer-like buying experience and a centralized procurement capability. Continue Reading
-
News
27 Oct 2022
Cinchy raises $14.5M to expand dataware data management
The startup's technology aims to help enterprises liberate data from applications where it can be locked so that users can more easily get at data from multiple locations. Continue Reading
-
Opinion
27 Oct 2022
How Sheltered Harbor helps banks navigate cyber-recovery
Banks must be able to recover quickly from a cyber attack -- a difficult task, given the volume and sophistication of attacks. The not-for-profit Sheltered Harbor aims to help. Continue Reading
-
Tip
27 Oct 2022
Create a flood business continuity plan to stay afloat
In the event of a flood, don't settle for watered-down action plans. Download our free flood business continuity plan template to create a flood-specific recovery strategy. Continue Reading
-
Feature
27 Oct 2022
Cloud, security and automation alter networking roles
Networking pros are no longer in their own bubbles, even if they prefer it that way. The growth of cloud, security and automation is expanding traditional networking roles. Continue Reading
-
Feature
27 Oct 2022
Network monitoring tools must offer more insights upfront
Vendors' network monitoring tools can require complex customization after purchase. New EMA research points to the need for tools to deliver more out of the box. Continue Reading
-
News
27 Oct 2022
NCSC’s Levy steps down after 20-year intelligence career
NCSC technical director Ian Levy bids farewell, telling his successor: ‘Don’t panic’ Continue Reading
-
News
27 Oct 2022
API documentation can make or break developer experience
At this week's API World, experts highlight issues with poor API documentation and suggest ways to fix it, such as ditching jargon and adopting the OpenAPI Specification. Continue Reading
-
Feature
27 Oct 2022
Will the OCSF create an open and collaborative cyber industry?
The Open Cybersecurity Schema Framework promises to transform security data analysis and collection, but there are challenges around adoption Continue Reading
-
Blog Post
27 Oct 2022
What to expect from Qualys QSC 2022
After an insightful first year in 2021, the Computer Weekly Developer Network team is headed back for second helpings at Qualys QSC 2022. With a solid focus on security issues (obviously, because ... Continue Reading
-
News
27 Oct 2022
ThoughtSpot launches integration with Google Sheets
The combination of the analytics vendor's NLP-based platform with the spreadsheet is designed to help joint customers derive insights from their data and take action. Continue Reading
-
Tip
27 Oct 2022
Types of cloud malware and how to defend against them
Cloud malware isn't going away anytime soon, but organizations have a growing number of tools at their disposal to combat the threat. Continue Reading
-
News
27 Oct 2022
Platform engineers plug abstraction leaks
Platform engineers presented at KubeCon about how new tools have helped them better hide infrastructure complexity from developers. But a paradox of choice remains. Continue Reading
-
News
27 Oct 2022
MicroScope at 40: Antonio Neri, HPE
President and CEO of HPE shares his thoughts about the past and future of the channel as MicroScope marks its 40th anniversary Continue Reading
-
News
27 Oct 2022
NHS to get new national CISO
The Department for Health and Social Care is seeking a new national CISO, who will be tasked with providing strategic cyber leadership, direction and expertise across DHSC and the wider NHS Continue Reading
-
News
27 Oct 2022
Horizon system EPOSS code writers lacked basic programming skills, public inquiry hears
Horizon system code writers lacked basic programming skills, according to the task force set up to investigate reported problems with the controversial software Continue Reading
-
News
27 Oct 2022
LinkedIn adds new features to safeguard user privacy, security
Social media platform is adding a number of features and systems designed to protect legitimate users from inauthentic profiles and activity Continue Reading
-
News
27 Oct 2022
Medibank breach casts spotlight on data security
Health insurer Medibank Private recently suffered a major data breach involving the personal and health information of millions of customers, once again casting the spotlight on data security in Australia Continue Reading
-
Blog Post
27 Oct 2022
Open source and green tech: A perfect match
In this guest post, Justin Griffith, CTO of supply chain software company StayLinked explores how companies can implement open source technologies as a stand-alone business model Solar technology ... Continue Reading
-
News
27 Oct 2022
Webex claims ‘breakthrough’ advances for hybrid work with innovations, partnerships
Collaboration tech provider announces major updates to the Webex Suite with new collaboration device and new partnerships to expand its footprint Continue Reading
-
News
27 Oct 2022
Santander calls for cooperation to tackle APP fraud
New report puts forward key recommendations that the banking sector, government and other industries could take to tackle authorised push payment fraud Continue Reading
-
News
27 Oct 2022
FYUZ 2022: TIP upgrades Testing and Validation Framework to accelerate deployment
Global community designed to drive infrastructure services to advance global connectivity establishes upgraded Testing and Validation Framework to allow accelerated deployment of open and disaggregated products Continue Reading
-
News
27 Oct 2022
Meta tightens purse strings as it spends on Reality Labs
Facebook’s parent company is betting the business on a long-term strategy to move social media into the metaverse Continue Reading
-
News
26 Oct 2022
How to attract more women into software development
Having role models, support systems and upskilling opportunities are just some of the ways to attract and retain more women coders in the industry, according to a panel of women tech leaders and professionals Continue Reading
-
Tip
26 Oct 2022
How to perform an AD group membership backup and restore
You can fix some problems with Active Directory with a few clicks, but things get difficult when they involve many layers of group membership. Here's a few ways to avoid trouble. Continue Reading
-
News
26 Oct 2022
Ukraine: Russian cyber attacks aimless and opportunistic
Victor Zhora, a key Ukrainian cybersecurity official, says Russia is acting with "no particular strategy" in its cyber attacks on his country as their military invasion drags on. Continue Reading
-
Tip
26 Oct 2022
Data analytics pipeline best practices: Data governance
Data analytics pipelines bring a plethora of benefits, but ensuring successful data initiatives also means following best practices for data governance in analytics pipelines. Continue Reading
-
Tip
26 Oct 2022
5 unstructured data backup challenges and how to handle them
Unstructured data backup requires the management and protection of vast amounts of data while keeping it available and secure. Is your backup strategy up to the challenge? Continue Reading
-
News
26 Oct 2022
Cisco, CISA warn 2 AnyConnect flaws are under attack
CISA added two Cisco AnyConnect flaws to its Known Exploited Vulnerabilities catalog, which signals active exploitation and an urgency to patch. Continue Reading
-
Tip
26 Oct 2022
Stay organized with 6 file storage best practices
File storage can quickly become disorganized without organizational planning. Use best practices like retention policies and naming conventions to easily manage file storage. Continue Reading
-
News
26 Oct 2022
InfluxDB Cloud overhauls time series database engine
InfluxData updated its InfluxDB Cloud database service with a new engine, new storage and real-time data capabilities, and expanded support for SQL queries. Continue Reading
-
News
26 Oct 2022
Cisco adds more Webex-Teams integration for hybrid work
Cisco Webex users now have more hybrid work features, including a new whiteboard and integration with Teams, iPhone and iPad cameras. Continue Reading
-
News
26 Oct 2022
Kubernetes data protection heavy on automation, integration
Kasten, CloudCasa, Portworx and Trilio launched updates to their Kubernetes data protection and management platforms. Backup is critical for Kubernetes workloads in production. Continue Reading
-
News
26 Oct 2022
Contact centers weather pandemic, but are very different now
As customer service leaders dig out from the pandemic, Great Resignation and Great Relocation, they must deal with growing volume while competing for agents. Continue Reading
-
Tip
26 Oct 2022
Why it's time to expire mandatory password expiration policies
Password expiration policies that force users to regularly reset passwords are counterproductive. It's time to align those policies with proven approaches to password security. Continue Reading