Data security standard

Data security standard News

IBM: CISO's outgunned in the cybercrime coral

IBM's third annual Chief Information Security Officer study makes grgim reading read more »

Government wants nine out of 10 using online public services by 2020

Digital initiatives at the core of plans to achieve savings of £30 billion during next Parliament read more »

FBI memo warns of malware possibly linked to hack at Sony Pictures

Insiders who have seen the memo believe the timing is no coincidence read more »

CGI lands Inmarsat ESA contract work to improve pilot/ground control communications

The contract for the Iris Precursor will eventually have a capability to update flight plans en-route read more »

BlackBerry's deal to buy voice crypto company Secusmart blessed by German government

The deal will let BlackBerry step up its cross-platform push with better security read more »

Coming soon: Murder by Internet

Security experts now believe that the Internet of Things will -- eventually -- be used for murderous purposes. read more »

more news ..
Data security standard Blogs

AllSeen's Open Source Internet of Things: One Year On

Good progress, but more needed on security read more »

The UK's Real Intelligence Failure

Time for a global debate about the limits of surveillance read more »

The Coming War on Encryption, Tor, and VPNs

Time to stand up for your right to online privacy read more »

TTIP Update XLIII

The problem of data flows, and why CETA's ISDS is a disaster read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Data security standard In Depth

ComputerworldUK 2014 round-up: The good, the bad and the ugly of the world of retail

2014 - the year of the data breaches, online shopping and beacon technology read more »

How to manage a remote workforce

Practical tips to help IT support increasingly remote employees read more »

How management failings led to RBS IT catastrophe

Was lack of IT investment to blame for the banks 2012 IT fiasco? read more »

Privacy is the new killer app

Ello, Wiper, Anonabox and others prove that Apple, Facebook and the like can't rest on their laurels when it comes to security. read more »

New PCI council leader ready to take on the hackers

Payment Card Industry Security Standards Council leader warns against complaince complacency read more »

Beware the Cloud Poser: 5 Ways to Tell a Cloud Poser from a Cloud Pro

Infrastructure expert Jason Lehr has five questions businesses can ask a cloud provider to check if they're the real deal read more »

more in depth ..
Data security standard Slideshows

9 cool Java 9 proposals developers will love

Modularity, JSON, smart compilation -- Java's future offers compelling features to look forward to read more »

9 Rules for the Developer-isation of IT

CIOs who want to drive innovation and change in their organisations should focus on making the lives of developers easier so they can innovate, produce great apps and deliver valuable IP read more »

Hot products at VMworld 2014

Click through all the products being released at VMworld last week read more »

11 post-holiday checklist tips for CIOs

As the holiday period ends, it's a good time for your IT organisation to undertake some of those long put-off tasks. Here are tips from four CIOs and CTOs for cleaning up your IT environment. read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open