We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Authentication

Authentication News

Arrests made after international cyber-ring targets StubHub

StubHub accounts were compromised and used to buy tickets for popular events, which were then resold read more »

Open Wireless Router firmware aims for better router security, network performance

The new custom router firmware will allow users to share their wireless networks, but could also improve their router's security read more »

Home router security to be tested in upcoming hacking contest

Researchers will compete to exploit previously unknown vulnerabilities in popular home routers read more »

Microsoft may drag out layoffs for a year

Long periods of uncertainty about who goes, who stays, can corrode a company's morale read more »

Systems engineer arrested in massive data leak in Japan

At least 7 million names were stolen from the database of education firm Benesse read more »

Why the Microsoft Active Directory design flaw isn't serious

Don't panic but take remedial measures read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Authentication In Depth

Beware the next circle of hell: Unpatchable systems

Insecure by design and trusted by default, embedded systems present security concerns that could prove crippling read more »

How Windows Enterprise BranchCache increases network efficiency

Be productive while remaining secure read more »

OpenStack 101: The parts that make up the project

Understanding the building blocks read more »

Gartner tells IT executives how to enable enterprise collaboration

Why is it so hard? read more »

How to defend against the OpenSSL Heartbleed flaw

Basic steps for IT CIOs, CISOs and IT Directors to take now read more »

Windows 8 VPN features

Secure connections in Windows 8 read more »

more in depth ..
Authentication Slideshows

Hero hacks: 14 Raspberry Pi projects primed for IT

VoIP PBXes, NTP servers, Web-controlled power strips - hack together one of these handy, cheap solutions for the server closet and beyond read more »

Eight ways the password is dying

From smartphones that know you’re near to tattoos and even pills, high-tech companies are busy replacing pesky strings of text with easier ways to authenticate. Check out the future here. read more »

Microsoft's SME offerings

Microsoft takes us around a Kelly Hoppen designed apartment to show us its collaborative business products read more »

Ten great Android apps for IT pros

From remote data access to electronics reference tools, these Android apps come in handy for IT pros on the go read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open