We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Data security standard

Data security standard News

Plan International streamlines global HR processes with SAP

Rollout is agile, with focus on configuration not customisation read more »

Major Scottish data centre to rely on renewable energy

'Green' claims disputed by industry experts, however read more »

Lavaboom builds encrypted webmail service to resist snooping

The service has started accepting registrations for its upcoming beta testing period read more »

TrueCrypt source code audit finds no critical flaws or intentional backdoors

Some vulnerabilities were identified but are likely accidental, security auditors from iSEC Partners said read more »

Airlines and airports invest in business intelligence but must do more to avoid problems

Mobile services are the way forward read more »

Connected stuff is catching on -- just don't call it IoT

Enterprises are finding real-world uses for Internet-connected devices but aren't interested in the buzzwords read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Data security standard In Depth

In-memory technologies move databases to real time

Microsoft and Pivotal join a growing field of in-memory data providers read more »

Security should no longer be 'cementing' the status quo

If your security programme is struggling, don't stick with it because it's the way things have always been done read more »

CIO not the only one to blame for Target breach

Beth Jacob's resignation not surprising, but disappointing analysts say read more »

The paranoid's survival guide, part 1: How to protect your personal data

Privacy is not dead yet... read more »

US NIST cybersecurity framework gets mixed reviews

Critical infrastructure is so hard to defend read more »

Location-based services: Controversy at every level

Like it or not, commerce increasingly involves keeping tabs on the customer's location. read more »

more in depth ..
Data security standard Slideshows

Ubuntu Touch starts getting real

Latest beta of Canonical's Linux smartphone system shows the outlines of a possible winner. read more »

Fifteen high impact Apache projects

From geronimo to Tomcat to Hadoop read more »

12 useful websites for IT security

From Microsoft and Cisco to the National Institute of Standards and Technology, we look at some of the most useful IT security websites read more »

10 cloud predictions for 2013

The time for dabbling in the cloud is over read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open