We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Data security

Data security News

The UPS Store says malware found on systems of 51 stores

Names, postal and email addresses and payment card data may have been exposed read more »

Civil servants called to sign up for government-funded data courses

Local and central government officials given data training 'vouchers' to push open data agenda read more »

DataGravity targets mid-sized firms with all-in-one storage and unstructured data system

IT administrators can track information as it is being stored - improving governance, security and opening new revenue streams, says DataGravity read more »

Ministry of Justice awards £76.5m electronic tagging contract to Steatite

Serco and G4S lost the contract after overcharging scandal read more »

Workers at U.S. nuclear regulator fooled by phishers

Annual employee training sessions did not stop all attacks read more »

Many Chrome browser extensions do sneaky things

A study of 48,000 Chrome extensions uncovers ad fraud, data theft and other misdeeds read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Data security In Depth

The mobile apps revolution is here to stay

Simplicity is key at the front and the back-end, writes Oracle's mobile strategy VP read more »

The making of a cybercrime market

Business analysis and online crime read more »

How risky will it be to run old IE after Microsoft's 2016 patch stoppage?

Older versions of the browser already contain fewer bugs than newer editions like IE11, analysis shows read more »

Westminster View: Chaos in the Departments for Data

Shadow Cabinet Office minister believes that the government needs to take ownership of its contradictory data policies read more »

9 Common BI Software Mistakes (and How to Avoid Them)

Business intelligence experts and business leaders discuss common mistakes companies make when selecting and implementing a BI solution read more »

ERP security: Protecting the pipeline by focusing on business-critical platforms

Develop a security baseline and measure systems against the baseline read more »

more in depth ..
Data security Slideshows

11 post-holiday checklist tips for CIOs

As the holiday period ends, it's a good time for your IT organisation to undertake some of those long put-off tasks. Here are tips from four CIOs and CTOs for cleaning up your IT environment. read more »

7 far-out technologies that are closer than you think

Some of these technology innovations sound like science fiction, but they may land in your data centre sooner than you'd imagine read more »

The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. read more »

Black Hat 2014: How to crack just about everything

From mobile phones and cars to IPv6, security researchers have turned their skills against a world of technology read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open