Data security

Data security News

Microsoft's Surface turns first profit in 2 years

After two years and nearly $2 billion in losses, Microsoft's Surface turned a profit in the September quarter. read more »

Wireless price war's good for consumers, but challenges carriers

More than any time in the past decade, wireless customers are reaping the benefits of a carrier price war over smartphones and tablets read more »

Senator wants Whisper to explain how it tracks users, shares their data

Reports saying the supposedly anonymous social media app is sharing user information leads to questions from Rockefeller read more »

The 'Backoff' malware linked to data breaches is spreading

A rising number of devices are connecting to Backoff-related infrastructure, Damballa says read more »

Cyberespionage group launches sophisticated phishing attacks against Outlook Web App users

The group targeted military agencies, embassies, defense contractors and media organizations, researchers from Trend Micro said read more »

Adobe begins encrypting user data collected from Digital Editions app

The company was criticized for sending data about content to its servers in plain text read more »

more news ..
Data security Blogs

The Future of the Internet - 20 Years Ago

The birth of Netscape and its browser read more »

Connected utilities: Five IT priorities for energy suppliers

Flexible, fast development will open up business opportunities read more »

Why Open Source is Replacing Open Standards

Linux Foundation leads the way read more »

The dangerous disconnect between security teams and the board

Are boards getting the advice they need? read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Data security In Depth

Big trends in big data analytics

Big data technologies and practices are moving quickly. Here's what you need to know to stay ahead of the game. read more »

Practical tips for negotiating with Google, Amazon, Apple and Workday

Gartner analyst Gayla Sullivan provides advice for dealing with 'new guard' of suppliers read more »

Lead or Perish – disrupt your business with mobile to gain a timely edge

The mobile revolution in enterprise - resistance is futile read more »

Five tips for building a successful hybrid cloud

Companies are opting to mix the speed and flexibility of a public cloud with the security and control of a private cloud. read more »

The man who would be (cloud backup) king

Veeam Software's CEO Ratmir Timashev is out to revolutionise disaster recovery as a service read more »

The human OS: Overdue for a social engineering patch

Experts say training -- done well and frequently -- can make employees much more difficult to 'hack' read more »

more in depth ..
Data security Slideshows

Top 6 threats to iOS devices

Given the recent iOS update and iPhone announcement, a security group provides tips to fend off threats to your device. read more »

Pick of the week's news

IT professionals who don't work long hours, government missing a deadline (surprise), and a 'curious' new SAP UK MD read more »

9 cool Java 9 proposals developers will love

Modularity, JSON, smart compilation -- Java's future offers compelling features to look forward to read more »

9 employee insiders who breached security

These disgruntled employees show what can happen when an employer wrongs them. read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open