IT for utilities and energy
Utility firms and energy companies rely on IT to support their often highly complex operations. The industry is being forced by politial and customer pressure to be greener and technology is central to achieving greater energy efficiency, through major initiatives such as smart meters. Our stories about energy and utility firms examine how IT is helping to enable change and improvement in these companies.
-
News
27 May 2021
Singapore deploys drones to monitor reservoir water quality
Singapore’s national water agency PUB is deploying autonomous drones at six reservoirs to monitor water quality and other activities to improve operational efficiency Continue Reading
-
News
21 Nov 2019
How Nicigas is disrupting Japan’s gas market with IoT
Japanese energy retailer Nicigas is deploying 850,000 IoT devices to convert traditional gas meters into smart meters to unlock consumption data amid efforts to shake up the utilities industry Continue Reading
-
News
25 Apr 2014
Heartbleed prompts tech firms to pledge open-source support
Top tech firms have joined forces to support open-source software to help prevent future bugs like Heartbleed Continue Reading
-
News
11 Apr 2014
Microsoft halts Windows 8.1 update for businesses due to bug
Microsoft has suspended the Windows 8.1 update for business users because of a bug. Continue Reading
-
News
10 Apr 2014
TCG releases TPM 2 specification for improved security
The Trusted Computing Group has published an updated specification for the Trusted Platform Module Continue Reading
-
News
08 Apr 2014
Workday sees opportunity for cloud financial management in Europe
Workday plans to push cloud finance and accounting services to enterprise in Europe, but observers say its background in HR technology may prove an obstacle Continue Reading
-
News
04 Apr 2014
RWE signs seven-year network deal with Vodafone to improve efficiency
Utility provider RWE has signed a seven year, multi-million pound contract to run its network, to reduce cost and gain greater efficiency Continue Reading
-
News
02 Apr 2014
Study alleges deeper NSA influence on RSA
RSA adopted a second NSA-developed encryption tool, increasing the agency's spying capabilities, a study claims Continue Reading
-
News
01 Apr 2014
UK update to copyright law imminent
The UK is to update its 1988 copyright law for the digital age in line with a nearly three-year-old review Continue Reading
-
News
28 Mar 2014
Google says government data requests are up 120% since 2009
Government requests for information about Google customers, have increased by 120% since 2009 Continue Reading
-
News
27 Mar 2014
Security an unnecessary expense, say one in six techies
One in six IT professionals see security as an unnecessary expense, a study has revealed Continue Reading
-
Feature
25 Mar 2014
Using NoSQL databases to gain competitive advantage
NoSQL is attracting growing interest from businesses - we examine three case studies: Amadeus, i2O and Temetra Continue Reading
-
Feature
25 Mar 2014
Target data breach: Why UK business needs to pay attention
Late last year, US retailer Target was hit by one of the biggest data breaches in the industry's history. So what happened and why is it relevant to UK businesses? Continue Reading
-
News
21 Mar 2014
Customer privacy an ongoing challenge, says Unilever
Unilever has set up a programme to address the continually evolving challenge of privacy issues relating to customer data Continue Reading
-
News
19 Mar 2014
Pirated software malware to cost business $491bn in 2014, study shows
Malware deliberately loaded into pirated or counterfeit software is expected cost enterprises $491bn in 2014 Continue Reading
-
News
19 Mar 2014
Firms urged to take tough action on Unix-based cyber attack
Security researchers have urged businesses to take action on a cyber criminal campaign that has seized control of 25,000+ Unix servers worldwide Continue Reading
-
News
17 Mar 2014
SMEs believes they are immune to cyber attack
Most SMEs believe they are not at real risk of cyber attack, a survey has revealed Continue Reading
-
Feature
14 Mar 2014
Hacktivism: good or evil?
IT lawyer Dai Davis looks at the rise of hacktivism and its impact on business and international politics Continue Reading
-
News
12 Mar 2014
More than 162,000 WordPress sites used in DDoS attack
Security researchers have uncovered a DDoS attack that used more than 162,000 legitimate and unwitting WordPress websites Continue Reading
-
News
12 Mar 2014
Tim Berners-Lee calls for internet users’ "bill of rights"
World Wide Web creator marks its 25th anniversary by calling for a “free, open and truly global internet” enshrined in a "bill of rights" Continue Reading
-
News
10 Mar 2014
Case study: BG Group turns to cloud HR to reach staff in multiple countries
Gas exploration and production company replaces SAP HR technology with Oracle Fusion in the cloud. Continue Reading
-
News
10 Mar 2014
Dark web key enabler for cyber criminals, say McAfee researchers
The dark web is a key conduit for the malware industry to refine and distribute its products and services, say security researchers Continue Reading
-
News
06 Mar 2014
Thames Water pilots smart analytics with Accenture
Thames Water is six months into an 18 month pilot with Accenture Smart Grid to pilot real time monitoring to deliver an improved service Continue Reading
-
News
27 Feb 2014
Microsoft takes aim at passwords
Microsoft says it is determined to solve the problem of ineffective authentication that relies on usernames and passwords Continue Reading
-
News
21 Feb 2014
Employee mobiles expose firms to attack, says Webroot
Employees mobile devices expose companies to malicious applications and attacks, according to the latest mobile threat report from Webroot Continue Reading
-
News
19 Feb 2014
UK firms see 1,000+ internal data breaches a day, study finds
Internal threats are not a high priority for UK firms despite more than 1,000 internal data breaches a day Continue Reading
-
News
19 Feb 2014
NHS England puts patient database on hold
NHS England is to delay by six months the roll-out of its controversial Care.data scheme for sharing patient records through a central database Continue Reading
-
News
18 Feb 2014
Cut Microsoft admin rights to mitigate 92% of threats, study shows
Removing Microsoft admin rights from employees mitigates 92% of critical vulnerabilities reported in 2013 Continue Reading
-
News
11 Feb 2014
Rights groups call on White House to open privacy review
A coalition of 25 rights groups is calling for a 90-day US government review of big data and the future of privacy to be opened up to the public Continue Reading
-
News
11 Feb 2014
UK among targets of 'Mask' advanced cyber espionage campaign
The UK has been hit more than 100 times in an advanced global cyber espionage campaign that has gone undetected for more than five years Continue Reading
-
News
10 Feb 2014
Barclays bank leaks thousands of customer records
Regulators investigate Barclays after a whistleblower claims the bank leaked 27,000 customer records Continue Reading
-
News
06 Feb 2014
UK critical infrastructure at risk of cyber attack, says IET report
UK critical national infrastructure is at risk of cyber attack, says a report by consultancy Atkins for the Institution of Engineering and Technology (IET) Continue Reading
-
News
04 Feb 2014
NHS site malicious redirects are a warning to developers
A coding error that redirected NHS website visitors to malicious content should be a warning to developers, say security experts Continue Reading
-
News
31 Jan 2014
Hackers access Yahoo Mail with stolen passwords
Yahoo has revealed that hackers have tried to access some Yahoo Mail accounts with stolen passwords Continue Reading
-
News
29 Jan 2014
Cyber security quest strong in UK, says Isaca
There is a strong interest in cyber security in the UK, says Rob Stroud, international president-elect for Isaca Continue Reading
-
News
23 Jan 2014
New Snapchat security measure easily by-passed, says researcher
A new Snapchat security measure to verify users are human is easily by-passed, says researcher Continue Reading
-
News
23 Jan 2014
US startup aims to turn tables on hackers
US startup Shape Security is turning the tables against hackers by using one of their own techniques against them Continue Reading
-
News
22 Jan 2014
CERT-UK to drive international cyber security collaboration
The UK’s new national computer emergency response team (CERT-UK) is set to drive international cyber security collaboration once it becomes operational Continue Reading
-
News
14 Jan 2014
Top European IT initiative to support business in 2014?
Expanding IT to support business growth is one of the biggest areas of focus for IT departments in 2014, so what does this mean? Continue Reading
-
News
07 Jan 2014
Security Think Tank: Information security strategy should support the business
How should Edward Snowden's revelations about the NSA and GCHQ influence future information security strategies in the UK? Continue Reading
-
News
06 Jan 2014
Infosec Skills, BCS announce winners of Cyber Security Challenge
Stuart Pringle, Simon Robinson and Robert Wyllie have won over £2,000 of training and a place in the semi-final of the current UK Cyber Security Challenge Continue Reading
-
News
06 Jan 2014
Samsung launches Smart Home ecosystem to connect home devices
Samsung has launched a connected home ecosystem at the Consumer Electronics Show (CES) in Las Vegas Continue Reading
-
News
06 Jan 2014
Yahoo claims malicious ads under control
Yahoo says the situation is under control after its advertising network served up malware to thousands of visitors last week Continue Reading
-
News
03 Jan 2014
FireEye acquires Mandiant in $1bn deal
Security firm FireEye has bought Mandiant in a deal worth just over $1bn Continue Reading
-
News
03 Jan 2014
Facebook faces lawsuit over monitoring private messages
Facebook is facing a lawsuit that claims it scans the contents of private messages to profile the user’s online activity Continue Reading
-
News
24 Dec 2013
Top 10 IT privacy stories of 2013
Stories related to whistleblower Edward Snowden’s revelations about internet mass surveillance programmes by the US and the UK have dominated this year Continue Reading
-
Opinion
19 Dec 2013
User acceptance testing needs real training, not just a short course
In spite of its importance, user acceptance testing (UAT) is often chaotic, problematic and ineffective Continue Reading
-
News
11 Dec 2013
Research reveals widespread mobile app hacking
The top 100 paid Android apps and 56% of the top 100 paid Apple iOS apps have been hacked, research has revealed Continue Reading
-
News
11 Dec 2013
Thirteen plead guilty to Anonymous DDoS attack on Paypal
Thirteen people have pleaded guilty to taking part in DDoS attacks on eBay’s Paypal, organised by the Anonymous hacker group in 2010 Continue Reading
-
News
11 Dec 2013
Ransomware looks set to increase, warns Sophos
Cyber criminals are planning to produce new forms of ransomware on an unprecedented scale, according to IT security firm Sophos Continue Reading
-
News
09 Dec 2013
Computer system failure delays hundreds of UK flights
Hundreds of flights at several UK airports were delayed or cancelled at the weekend because of a computer failure at National Air Traffic Services (NATS) Continue Reading
-
Feature
09 Dec 2013
Realising the benefits of a totally connected world
The internet of things will transform everyday life, from managing airports’ passenger flow to heating buildings and caring for the elderly. Continue Reading
-
News
05 Dec 2013
Automation key to balancing agility and security, says AlgoSec
Automated critical business application management enables a more agile business and enhances security, says security policy management firm AlgoSec Continue Reading
-
News
04 Dec 2013
Proof-of-concept malware jumps air gap with sound card
Researchers demonstrate proof-of-concept malware exfiltrating data using high-frequency transmissions inaudible to humans Continue Reading
-
News
04 Dec 2013
The Guardian denies Snowden stories damaged national security
Guardian editor Alan Rusbridger defends decision to publish stories on documents leaked by whistleblower Edward Snowden Continue Reading
-
News
04 Dec 2013
UK proposes formal talks on cyber security with China
Prime minister David Cameron has called on China to be more open about cyber security Continue Reading
-
News
28 Nov 2013
EU calls on US to rebuild trust in post-Snowden era
The EC has called on the US to provide guarantees to restore trust in the wake of spying revelations Continue Reading
-
News
26 Nov 2013
NCA changed UK cyber crime fighting, says NCCU head
The NCA has changed the UK law enforcement landscape, says Andy Archibald, head of the NCA’s National Cyber Crime Unit Continue Reading
-
News
26 Nov 2013
Government lays out 2014 cyber security agenda
The UK government has reiterated its commitment to addressing cyber security and laid out some plans for 2014 at the Cyber Security Summit 2013 Continue Reading
-
News
26 Nov 2013
White hat Wi-Fi hacking shows vulnerability of business data
Whitehat hackers have shown that senstitive data can be sniffed easily from public Wi-Fi hotspots Continue Reading
-
News
26 Nov 2013
FTSE 350 firms complete cyber risk assessment
Most FTSE 350 companies put cyber risk on the board agenda, but many need to improve how they manage that risk Continue Reading
-
News
21 Nov 2013
CSA appoints Microsoft’s Adrienne Hall to board
The CSA has appointed Adrienne Hall, from Trustworthy Computing at Microsoft, to its board of directors Continue Reading
-
News
21 Nov 2013
Pegasystems CEO Alan Trefler plans his next move for the $500m software company
Alan Trefler discusses his plans for Pegasystems, the BPM and CRM specialist that has grown into a $500m a year company Continue Reading
-
News
20 Nov 2013
Report highlights poor UK attitudes to mobile security
Businesses should note that many UK mobile users do not take security precautions and do not know how to guard against data theft Continue Reading
-
News
19 Nov 2013
Google reaches $17m multi-state settlement over Safari snooping
Google has reached a $17m settlement agreement with 10 US states for bypassing Apple Safari privacy settings Continue Reading
-
News
18 Nov 2013
Google and Microsoft to block searches for child porn
Google and Microsoft have announced measures to make it more difficult to find child abuse images online Continue Reading
-
News
15 Nov 2013
Cyber collateral damage a concern for all, says Lancope
All organisations could be affected by cyber attack collateral damage, says network security firm Lancope Continue Reading
-
News
14 Nov 2013
Shell delivers global SAP upgrade
Shell has simplified and standardised business processes in its business focused on refining and marketing activities for oil products and chemicals, through a global SAP upgrade Continue Reading
-
News
12 Nov 2013
Mass surveillance a bad idea, says Information Commissioner Christopher Graham
Information Commissioner Christopher Graham says issues of national security must not overshadow concerns of legitimate public interest Continue Reading
-
News
12 Nov 2013
Web surveillance not a good idea, says Info Commissioner
Information Commissioner Christopher Graham says issues of national security cannot be allowed to overshadow concerns of legitimate public interest Continue Reading
-
News
08 Nov 2013
NSA and GCHQ mass surveillance violates EU law, study finds
Mass internet surveillance by US and UK intelligence agencies violates European law, according to a study by two academics Continue Reading
-
News
07 Nov 2013
UK intelligence heads defend mass surveillance operations
Heads of the UK’s intelligence services insist all they do in term of mass surveillance is strictly within the confines of UK law Continue Reading
-
News
29 Oct 2013
Analysis: RSA says security needs to change, but what does that mean?
RSA executive chairman Art Coviello has issued a call to action to the security industry to improve technology and collaboration Continue Reading
-
News
29 Oct 2013
Most businesses need to transform IT security, says RSA
No modern network or IT system can withstand the onslaught of a skilled adversary, given focus and time, says Amit Yoran, general manager of RSA Continue Reading
-
News
28 Oct 2013
Cyber attack shuts down Israeli toll road tunnel
A cyber attack has shut down a major link in Israel's national road network, experts claim Continue Reading
-
News
24 Oct 2013
Thales launches critical infrastructure cyber security lab
Thales has set up a cyber security lab dedicated to help improve the security of critical national infrastructure, government and business Continue Reading
-
News
23 Oct 2013
US publishes draft cyber security framework
The US has published a draft framework of voluntary cyber security standards aimed at reducing risks to critical national infrastructure Continue Reading
-
News
21 Oct 2013
Microsoft withdraws faulty Windows RT 8.1 update for Surface tablets
Microsoft has widthdrawn its Windows 8.1 update for Surface RT tablets after some users reported system crashes Continue Reading
-
News
17 Oct 2013
Dexter payment card malware variant hits South Africa
The Dexter payment card skimming malware discovered last year has resurfaced in South Africa, resulting in millions of pounds lost to fraud Continue Reading
-
News
16 Oct 2013
Neustar to host first DDoS awareness day
Communications firm Neustar is to host the first international awareness day on distributed denial of service (DDoS) attacks Continue Reading
-
News
15 Oct 2013
The ICO issues BYOD warning after breach
The ICO is calling on organisations to ensure data protection policies reflect how employees are using personal devices for work Continue Reading
-
Photo Story
15 Oct 2013
10 security reasons to upgrade to iOS 7
Even if it did not include numerous security fixes, iOS 7 has compelling reasons for corporates to adopt it to improve their security Continue Reading
-
News
15 Oct 2013
D-Link begins fixing router backdoor
D-Link has begun releasing security patches to close the backdoor discovered on some of its routers Continue Reading
-
News
11 Oct 2013
Legitimate users of Tor need not worry, says NCA
The National Crime Agency (NCA) says criminals cannot hide on the internet, but legitimate business users of anonymity software Tor are safe Continue Reading
-
News
07 Oct 2013
UK National Cyber Crime Unit becomes operational
The UK's National Cyber Crime Unit has become operational as part of the new National Crime Agency Continue Reading
-
News
03 Oct 2013
FBI shuts down Silk Road online drug market
The FBI has shut down the Silk Road online drug market and arrested kingpin Ross Ulbricht, previously known only as Dread Pirate Roberts Continue Reading
-
Opinion
03 Oct 2013
Privacy concerns in the digital world
Considering the full spectrum of privacy, people need to ask themselves if they are comfortable with all their characteristics in the public domain Continue Reading
-
News
02 Oct 2013
McAfee Focus 2013: McAfee leadership upbeat about Stonesoft acquisition
Intel-owned security firm McAfee is upbeat about its acquisition of Stonesoft and its future capability to tackle security differently Continue Reading
-
News
01 Oct 2013
IT security industry still immature, says (ISC)2 board member
The information security industry is still immature and failing to act or speak as one, says Dave Lewis, (ISC)2 board member Continue Reading
-
News
27 Sep 2013
Financial markets next big cyber target, says US expert
Manipulation of international financial markets will be the next evolution of cyber crime, says US Cyber Consequences Unit chief Continue Reading
-
News
27 Sep 2013
Top 10 cyber crime stories of 2013
Cyber crime featured heavily in security news coverage in 2013, with cyber criminals and cyber law enforcers upping their games with each passing month Continue Reading
-
News
27 Sep 2013
Software acquisition is risk acquisition, says industry panel
New software often means new security vulnerabilities, panel tells the (ISC)2 Security Congress 2013 Continue Reading
-
Feature
24 Sep 2013
How Capgemini keeps its Merlin datacentre green and energy-efficient
Capgemini's Swindon-based Merlin datacentre is one of the most energy-efficient in the world. But what makes it green? Continue Reading
-
News
19 Sep 2013
NSA reveals how Snowden accessed secret Prism files
Prism whistleblower Edward Snowden accessed secret documents through a file-share, the NSA has revealed Continue Reading
-
News
16 Sep 2013
Risk assessment key to cloud adoption, says Isaca
There is mass confusion among small and medium businesses about cloud computing, says Amar Singh, chair of Isaca UK Continue Reading
-
News
09 Sep 2013
Most websites could be targeted through PHP, warns Imperva
Hackers are focusing on vulnerabilities in PHP web application development platform, threatening most websites, warns Imperva Continue Reading
-
News
09 Sep 2013
Executive interview: Andrew Brem, Connected Homes, British Gas
British Gas is digitising energy. Andrew Brem speaks to Computer Weekly about the internet connected home Continue Reading
-
News
03 Sep 2013
Disinfecting PCs false security, says security expert
Many companies proud of their ability to identify and clean malware infected machines are missing a trick, says veteran security expert Continue Reading
-
News
22 Aug 2013
Charlie McMurdie joins PwC’s cyber practice
Charlie McMurdie, former head of the Metro Police central e-crime unit, is joining business consultancy firm PwC as its senior crime adviser Continue Reading
-
Opinion
14 Aug 2013
How to appoint a new outsourcing supplier
Outsourcing can come with its own security risks if not managed appropriately, making due diligence and clear contractual arrangements key Continue Reading
-
E-Zine
12 Aug 2013
Is the UK smart meter project doomed to fail?
In this week’s Computer Weekly, we look at one of the biggest IT roll-outs in the UK - the £12bn plan to install smart meters in every home – and ask: is it doomed to fail? Our latest buyer’s guide examines software asset management. We analyse the big IT suppliers’ plans to compete with pure-play cloud providers. And we discuss the future of the chief information security officer role. Read the issue now. Continue Reading
-
Opinion
30 Jul 2013
The ideology of hacking
Business leaders need to be educated on the true threats their firms face and IT security professionals have to arm their executives with that information Continue Reading