Security

RSS FeedSecurity also in this channel

Security Newsletter

Latest News

Sony hackers used fake Apple ID emails to target employees

Sony hackers used fake Apple ID emails to target employees

Hackers probably gained access to Sony's network last year after a series of phishing emails aimed at system engineers, network administrators and others who were asked to verify their Apple IDs. read more »

UK's new rail signalling system at risk from malicious insider, expert says

ERTMS hack could cause disruption or serious accident, says David Stupples read more »

Encryption is still a management 'pain' for UK organisations, study shows

Regulators demand it. But it's easier to say than do, finds Thales e-Security study read more »

Many UK firms take two weeks to realise they're under cyber attack says Intel

A quarter of UK organisations admit they took more than two weeks to realise they were under cyber attack last year, according to Intel Security research. read more »

Microsoft moves to address customers' concerns about cloud control and transparency

Microsoft will expand Office 365's logging capabilities to include user, administrator and policy related actions for Exchange Online and SharePoint Online. read more »

more news ..
Advertisement

Lexmark

Windows Server 2003 Migration: what you need to know

Support for Windows Server 2003 ends in July 2015, ComputerworldUK Editor Mike Simons discusses the migration options with Dell and Microsoft. Find out more


Google Nexus series

Google Nexus series

The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.


Webcast

Part 2 of your journey to virtualisation

Explore how you can improve your servers, storage and networks by developing your infrastructure.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


In Depth

Sony hackers used fake Apple ID emails to target employees

Hackers probably gained access to Sony's network last year after a series of phishing emails aimed at system engineers, network administrators and others who were asked to verify their Apple IDs. read more »

UK's new rail signalling system at risk from malicious insider, expert says

ERTMS hack could cause disruption or serious accident, says David Stupples read more »

Encryption is still a management 'pain' for UK organisations, study shows

Regulators demand it. But it's easier to say than do, finds Thales e-Security study read more »

Many UK firms take two weeks to realise they're under cyber attack says Intel

A quarter of UK organisations admit they took more than two weeks to realise they were under cyber attack last year, according to Intel Security research. read more »

Microsoft moves to address customers' concerns about cloud control and transparency

Microsoft will expand Office 365's logging capabilities to include user, administrator and policy related actions for Exchange Online and SharePoint Online. read more »

more in depth ..
Most Popular in Security

Would financial incentives stop the rise of cybercrime?

Legislation doesn't seem to be working to cut cybercrime, is another approach needed?

NHS tops the list for serious data breaches last year

The UK's data watchdog's naughty list reveals firms that were investigated for data breaches

White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..
Advertisement
Blogs

RSA Conference 2015 – What We Hope And What We Expect To Hear

Hunting for practical solutions amidst a tech fashion paraderead more »

Brand resilience: Risk pros' key role in protecting company reputation

Reputational risk is growing and IT security and risk professionals need to understand itread more »

more blogs ..
Solution Centres

Securing the Enterprise

Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals


HP Data Protection Zone

HP Data Protection Zone

HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...


Agile Data Center

Transition to the Agile Data Center

Explore the importance of the agile data center to the business, and ideas on how IT can make this transition


Advertisement

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message