Source is ComputerWeekly.com
A year after collapse, the global IT and business outsourcing sector records its highest-ever first quarter total spend.
The light at the end of the tunnel, seen during the final quarter of last year, has now brightened up the entire sector as businesses start spending again
...
Source is ComputerWeekly.com
Analysis of a trove of personal data leaked online thanks to lax cyber security and privacy policies implemented at social media giant Facebook has revealed Egypt, the US and Italy as the countries with the highest numbers of affected users.
The leak of data from 533...
Source is ComputerWeekly.com
The National Cyber Security Centre (NCSC) has issued a fresh warning over the dangers of using easily hackable passwords, ahead of National Pet Day, which falls on 11 April.
This comes as a study conducted on behalf of the NCSC by Kantar and OnLineBus found that...
Source is ComputerWeekly.com
The operators of Cring ransomware have been conducting a series of damaging attacks on industrial targets and control systems (ICS) after apparently acquiring a list of users of Fortinet’s FortiGate VPN server who had not bothered to patch a dangerous vulnerability.
First identified and fixed some...
Source is ComputerWeekly.com
Technology professionals have seen a sharp increase in the availability of “work anywhere” vacancies, as well as demands for an ability to “handle everything” since the emergence of the Covid-19 pandemic, according to a new report.
The industry is becoming more geographically diverse, with a 149%...
Source is ComputerWeekly.com
The Post Office’s move to extend its controversial 22-year contract with Fujitsu to supply and support the Horizon retail and accounting system is part of a plan to bring the work in-house.
An announcement this week that the contact, which began in 1999, will go beyond...
Source is ComputerWeekly.com
Caroline Carruthers and Peter Jackson, authors of The chief data officer’s playbook, say they have overhauled their CDO summer school to match the increased importance of the chief data officer (CDO) role.
Carruthers told Computer Weekly: “The data leadership role has evolved into a more strategic...
Source is ComputerWeekly.com
Second user software licence reseller ValueLicensing has picked up where the 2012 European Economic Area ruling in favour of UsedSoft left off. The company has filed a claim in the High Court in London against Microsoft for abuse of dominance and restrictive contractual practices.
The complaint...
Source is ComputerWeekly.com
An MP-led inquiry into the UK’s “wild west”-like contracting sector is demanding urgent action by the government to push through regulation to ensure freelance IT workers receive the correct pay and benefits for the work they do through umbrella companies.
Evidence shared with the How Contracting...
Source is ComputerWeekly.com
Nation state-backed cyber attacks are becoming more widespread, varied and open than ever before, with the number of significant incidents doubling between 2017 and 2020, according to the University of Surrey’s senior lecturer in criminology, Mike McGuire, who argues that the world is moving closer to...