We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Data security

Data security News

iPhone gets first free app for encrypting voice calls

Signal is compatible with RedPhone, its Android sibling read more »

BlackBerry focuses on security for the enterprise

BlackBerry says it can offer levels of security that can not be replicated on Apple, Android or other mobile devices read more »

Guns, vandals and thieves: Data shows US networks under attack

More than a thousand malicious acts have targeted the US telecoms infrastructure in recent years, FCC data shows read more »

Canada blames China for cyber intrusion at National Research Council

The attack was carried out by highly sophisticated state-sponsored hackers, the government of Canada said read more »

Senator pushes new version of bill to limit NSA phone records collection

Leahy reintroduces the USA Freedom Act in an effort to strengthen the bill that passed the House read more »

Android vulnerability allows malware to compromise most devices and apps

Attackers can impersonate trusted developers to gain powerful privileges on the OS, researchers from Bluebox Security said read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Data security In Depth

Car industrys biggest problem is moving from hardware to software

BMW’s outage presents the minefield manufacturers are navigating in the wake of the connected car. read more »

For Your Eyes Only: Corporate espionage using social channels – is your company at risk?

Are businesses ensuring their employees remain vigilant in their personal online activities? read more »

Why Microsoft isn't spooked by the Apple-IBM alliance

Nadella's plan to put services, software on all platforms means the Apple-IBM deal will have little impact on the enterprise-centric Microsoft read more »

Wearables: Are we handing more tools to Big Brother?

Fitness trackers and other wearables are all the rage, but privacy advocates warn that they come with the risk of a "privacy nightmare" read more »

Salford City Council transforms IT into SME service provider

Delivers cloud services to local companies with Cisco and NetApp infrastructure read more »

Why Samsung needs to move beyond Android -- and Google

The company's profit problems show its hardware focus isnt enough read more »

more in depth ..
Data security Slideshows

Top 25 free tools for every Windows desktop

Whatever your poison -- Windows 7 or 8, updated or not -- there's a desktop tool just begging to become part of your repertoire read more »

Nine tips for CIOs as summer holidays hit

Have trouble leaving the office behind when you go on vacation? Here are nine tips to help give CIOs peace of mind when they (and their staff and fellow employees) head out for summer R&R. read more »

How IBM served up Wimbledon analytics from an underground bunker to devices worldwide

Vast quantities of data collected and analysed across two IBM suites read more »

11 top tools for Android road warriors

Heading out on the road? Be sure you have these critical business apps on your Android device read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open