SecuritySecurity also in this channel
Many companies set up subdomains for use with external services, but then forget to disable them when they stop using those services, creating a loophole for attackers to exploit. read more »
Vietnamese cybersecurity authorities are hunting hackers believed to be responsible for the country's biggest-ever online attack last week, according to the founder of a security website in Hanoi. read more »
Apple will stop support next week for an encryption protocol found to contain a severe vulnerability, the company said on Wednesday. read more »
Governments may need to tighten the regulatory screws on SaaS vendors to make them be more transparent and forthcoming about their security practices. read more »more news ..
Join ComputerworldUK'S editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals.
The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.
Explore how you can improve your servers, storage and networks by developing your infrastructure.
Check out our latest articles on Microsoft's next-generation operating system.
It sounds like the operating system that really needs some serious security patches is the human one. read more »
Data is compromised so frequently these days that it seems like nothing is safe anymore. So one would be forgiven for thinking that using apps that require the user to voluntarily submit payment card information in order to function -- think Venmo, Uber, etc. -- would be a risky play. read more »
It's no longer unusual to see major, massive hacks make news these days. They affect millions of individuals and cost millions of dollars to rectify. read more »
Put simply, cybercrime, especially financial malware, has the potential to be quite the lucrative affair. That's only because the bad guys have the tools to make their work quick and easy, though. read more »
Today, more and more businesses are foregoing the traditional design setup of cubicles and closed-off offices for an open floor plan. read more »more in depth ..
Most Popular in Security
Consumers should have a say in how their data is collected
Use of monitoring equipment must be 'necessary and proportionate'
Given the recent iOS update and iPhone announcement, a security group provides tips to fend off threats to your device.
Musicians dominate the 2014 list of celebs you might not want to search on for fear of malware
Experts say training -- done well and frequently -- can make employees much more difficult to 'hack'
Key questions to askread more »
Are boards getting the advice they need?read more »more blogs ..
Also in slideshows :
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals
HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...
View the latest capacity management resources including white papers, videos and news.