SecuritySecurity also in this channel
A former Secret Service agent admitted Monday to stealing $820,000 worth of bitcoins from Silk Road vendors during the investigation of the online contraband market. read more »
Passwords are a bane of life on the Internet today, but one Turing Award winner has an algorithmic approach he thinks could make them not only easier to manage but also more secure. read more »
Russian and Chinese cyberspying units are reportedly cross-checking hacked databases to identify U.S. intelligence operatives. read more »
Attivo Networks has upgraded its deception technology so businesses can deploy it within Amazon Web Services cloud to lure attackers to what looks like legitimate physical and virtual machines in order to find out what they are up to. read more »
The Linux Foundation published a list of security recommendations for hardening Linux workstations used by systems administrators. read more »more news ..
Navigating storage in a brave new world
Companies must provide a fast and reliable service if they are to remain competitive in a tough business landscape. Find out more
The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.
Explore how you can improve your servers, storage and networks by developing your infrastructure.
Check out our latest articles on Microsoft's next-generation operating system.
How do you know an invoice is genuine? With great difficulty, it turns out read more »
Public Wi-Fi is used by many to avoid big roaming bills. Can its risks be mitigated? Are public Wi-Fi hotspots a security risk? We examine the security risks of using public Wi-Fi. read more »
Chief Information Officer at global manufacturing firm Coats, Richard Cammish, says cyber security was a key concern as the company re-listed on the London Stock Exchange. read more »
How do Android's growing list of vulnerabilities affect enterprises and is there much they can do about them? read more »
Were there really 250,000 visits to porn sites in Parliament last year? read more »more features ..
Most Popular in Security
How do you know an invoice is genuine? With great difficulty, it turns out
Public Wi-Fi is used by many to avoid big roaming bills. Can its risks be mitigated?
Too much emphasis is placed on external threats and not enough attention is paid to internal ones.read more »
Mergers and acquisition and corporate 'shiny toy' syndrome created software complexityread more »more blogs ..
Also in galleries :
Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals
HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...