Security

RSS FeedSecurity also in this channel

Security Newsletter

Latest News

BT chooses CA to power new Assure Cloud Identity service

BT chooses CA to power new Assure Cloud Identity service

Pushes ability to get enterprises up and running quickly read more »

Sony hackers used fake Apple ID emails to target employees

Hackers probably gained access to Sony's network last year after a series of phishing emails aimed at system engineers, network administrators and others who were asked to verify their Apple IDs. read more »

UK's new rail signalling system at risk from malicious insider, expert says

ERTMS hack could cause disruption or serious accident, says David Stupples read more »

Encryption is still a management 'pain' for UK organisations, study shows

Regulators demand it. But it's easier to say than do, finds Thales e-Security study read more »

Many UK firms take two weeks to realise they're under cyber attack says Intel

A quarter of UK organisations admit they took more than two weeks to realise they were under cyber attack last year, according to Intel Security research. read more »

more news ..
Advertisement

Lexmark

Windows Server 2003 Migration: what you need to know

Support for Windows Server 2003 ends in July 2015, ComputerworldUK Editor Mike Simons discusses the migration options with Dell and Microsoft. Find out more


Google Nexus series

Google Nexus series

The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.


Webcast

Part 2 of your journey to virtualisation

Explore how you can improve your servers, storage and networks by developing your infrastructure.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


In Depth

BT chooses CA to power new Assure Cloud Identity service

Pushes ability to get enterprises up and running quickly read more »

Sony hackers used fake Apple ID emails to target employees

Hackers probably gained access to Sony's network last year after a series of phishing emails aimed at system engineers, network administrators and others who were asked to verify their Apple IDs. read more »

UK's new rail signalling system at risk from malicious insider, expert says

ERTMS hack could cause disruption or serious accident, says David Stupples read more »

Encryption is still a management 'pain' for UK organisations, study shows

Regulators demand it. But it's easier to say than do, finds Thales e-Security study read more »

Many UK firms take two weeks to realise they're under cyber attack says Intel

A quarter of UK organisations admit they took more than two weeks to realise they were under cyber attack last year, according to Intel Security research. read more »

more in depth ..
Most Popular in Security

NHS tops the list for serious data breaches last year

The UK's data watchdog's naughty list reveals firms that were investigated for data breaches

Wells Fargo CISO: Security should be viewed as business enabler, not innovation bottleneck

ComputerworldUK talks to Wells Fargo's first chief information security officer, Rich Baich

White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..
Advertisement
Blogs

Penetration testing in the UK is broken - here's how to fix it

Enterprises are being failed by check-box penetration testing that often tells them nothing usefulread more »

RSA Conference 2015 – What We Hope And What We Expect To Hear

Hunting for practical solutions amidst a tech fashion paraderead more »

more blogs ..
Solution Centres

Securing the Enterprise

Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyber criminals


HP Data Protection Zone

HP Data Protection Zone

HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...


Agile Data Center

Transition to the Agile Data Center

Explore the importance of the agile data center to the business, and ideas on how IT can make this transition


Advertisement

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message