Data security

Data security News

The 'grinch' isn't a Linux vulnerability, Red Hat says

The way Linux handles user permissions could still lead to potential misuse, security researchers say read more »

Ofcom fended off 1,600 cyberattacks in two months, FoI request reveals

SQL injection attacks a running sore read more »

Cabinet Office seeking suppliers for GOV.UK Verify

Maximum of ten suppliers to join current five for four-year, £150 million framework contract read more »

We need to recruit more apprentices to address the data centre skills shortage, says MigSolv CEO

Apprenticeships needed to address shortfall in 'generalist' staff read more »

This Linux grinch could put a hole in your security stocking

A potential flaw in how Linux handles access rights could give attackers entry, a security firm charges read more »

After the Snowden leaks, 700m act to avoid NSA spying

Nearly 700 million people worldwide have taken steps to protect their privacy from NSA surveillance, according to an international internet security survey read more »

more news ..
Data security Blogs

AllSeen's Open Source Internet of Things: One Year On

Good progress, but more needed on security read more »

Theres an (enterprise) app for that

Businesses need to close the mobile app gap and an enterpise app store is the way to go read more »

More Money, More Problems For Security Organisations In 2015

Beware executives bearing gifts... read more »

The UK's Real Intelligence Failure

Time for a global debate about the limits of surveillance read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Data security In Depth

ComputerworldUK 2014 round-up: Top 10 stories in the world of government

Universal Credit waste, the expiry of big ICT deals, PSN, Care.data, new digital services & G-Cloud all featured in the headlines read more »

ComputerworldUK 2014 round-up: The good, the bad and the ugly of the world of retail

2014 - the year of the data breaches, online shopping and beacon technology read more »

3 low-tech threats that lead to high-profile breaches

Visual hacking, social engineering and insiders threat remain the challenge read more »

The 9 essential rules for securing an Android smartphone

Everyone adds a screen lock. But what's next? read more »

How to manage a remote workforce

Practical tips to help IT support increasingly remote employees read more »

Westminster View: The Autumn Statement is a missed opportunity for Digital Government

The government's digital ideas seem to echo those from Labour's recently published review of digital government read more »

more in depth ..
Data security Slideshows

Lotus Notes creator Ray Ozzie celebrates the 25th anniversary of corporate email

Former Microsoft CTO recalls the first enterprise grade email platform and his original startup read more »

Labour digital government report: key recommendations

A run-down of the main points in Labour’s digital government report out this week read more »

5 things you need to know about the UKs new Counter Terrorism Bill

On Wednesday, the government will announce the details of the latest version of the 'snooper's charter' read more »

2014s biggest cloud deals (so far)

The most important cloud acquisitions this year have one thing in common: OpenStack. read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open