computing_logo
Sign in Join
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: [email protected]

    • Sign in
logo
  • logo

    Search Computing

     

     

  • Latest
  • Topics

    Choose a topic from the list below

    • Diversity in Tech
    • Big Data & Analytics
    • DevOps
    • Security
    • GDPR
    • AI & ML
    • Cloud & Infrastructure
    • CIO
    • Deskflix
  • Sustainability in Tech
  • Diversity in Tech
  • Deskflix
  • Events
  • Whitepapers
  • More

    Most Popular content

    • Big Data & Analytics
    • Cloud
    • Leadership & Strategy
    • Open Source
    • Storage
    • Telecoms
    • Top 100 IT Leaders
    • Rising Stars 30

    Featured content

    • On-demand webinars
    • Identity Access Management Hub
    • Research
    • Tech Marketing Hub
    • Entry-level tech roles
    • Cloud Sustainability

    Authors

    • Stuart Sumner
    • John Leonard
    • Tom Allen
    • Penny Horwood
    • Computing Contributors

    Computing Resources

    • English
    • Français
    • Deutsch
    • Espagnol
    • Italien

    About

    • About us
    • Code of Ethics
  • Searchlogo

    Search Computing

    x
Join Sign in
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: [email protected]

    • Sign in
    • Sign in

Johnson Matthey

Security

The top 10 UK data-breach stories of 2015

The worst data breaches and the biggest security stories of 2015

clock 21 December 2015 • 10 min read

Supplier

What do CIOs see as the best procurement model for IT?

CIOs and industry experts debate whether a centralised function or a specialist IT function is the best fit for procuring IT

clock 16 November 2015 • 7 min read

Security

Who's to blame for a data breach?

CIOs at Johnson Matthey, Reckitt Benckiser and other major organisations debate who should take responsibility for data breaches

clock 12 November 2015 • 8 min read

Developer

Agile methodology: Can you ever have too many agile projects?

Agile is used by firms to increase the speed of a project, but research suggests that too much of agile can actually slow things down

clock 26 October 2015 • 10 min read
Most read
01

If ChatGPT is an 'iPhone moment' how should IT leaders respond?

08 December 2023 • 4 min read
02

Life after Oracle: Redefining Java in the enterprise in 2024

08 December 2023 • 5 min read
03

Bank of England proposes new rules to curb reliance on big tech

08 December 2023 • 1 min read
04

UK accuses Russia of cyber interference targeting elections and democracy

08 December 2023 • 3 min read
05

Governments forcing Apple and Google to share notification data

07 December 2023 • 2 min read
  • Contact us
  • Marketing Solutions
  • About The Channel Company
  • Privacy Settings
  • Terms & Conditions
  • Policies
  • Careers
FOLLOW US
The Channel Company

© The Channel Company EMEA
180 Borough High Street, London SE1 1LB. Registered in England and Wales with company registration number 14078896

Loading.gif?page type=listing page&tag=johnson matthey