We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Data security standard

Data security standard News

While Heartbleed distracts, hackers hit US universities

As many as 250,000 people could be affected by a wave of attacks not using Heartbleed read more »

What kind of tablet does $5,000 get you?

Xplore's new XC6 DMSR tablets may break the bank, but can take 7-foot drops and remain submerged in water read more »

Apple patches Secure Transport, but not because of Heartbleed

'Triple-handshake attack' threat quashed in update for OS X Mavericks and Mountain Lion, and iOS 7 read more »

NEC launches face-recognition protection for PCs

NEC's face-recognition technology is being rolled out as an enterprise security solution read more »

SEC seeks data on cyber security policies at Wall Street firms

Cyber defenses at more than 50 broker-dealers and investment advisers will be assessed by federal examiners read more »

4 things to do now to get ready for the Internet of Things

Loads of IP-addressable sensors are descending on the enterprise. Here's how you'll need to pull them all together. read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Data security standard In Depth

Internet of Things vendors face a communications 'mess'

There's a wireless battle brewing, with Bluetooth mesh just the latest contender read more »

In-memory technologies move databases to real time

Microsoft and Pivotal join a growing field of in-memory data providers read more »

Security should no longer be 'cementing' the status quo

If your security programme is struggling, don't stick with it because it's the way things have always been done read more »

CIO not the only one to blame for Target breach

Beth Jacob's resignation not surprising, but disappointing analysts say read more »

The paranoid's survival guide, part 1: How to protect your personal data

Privacy is not dead yet... read more »

US NIST cybersecurity framework gets mixed reviews

Critical infrastructure is so hard to defend read more »

more in depth ..
Data security standard Slideshows

Ubuntu Touch starts getting real

Latest beta of Canonical's Linux smartphone system shows the outlines of a possible winner. read more »

Fifteen high impact Apache projects

From geronimo to Tomcat to Hadoop read more »

12 useful websites for IT security

From Microsoft and Cisco to the National Institute of Standards and Technology, we look at some of the most useful IT security websites read more »

10 cloud predictions for 2013

The time for dabbling in the cloud is over read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open