Data security

Data security News

Parliament seeks director for new digital service

Recruitment also due for CTO for service, which will have 300 staff and budget of £30 million read more »

Many Android devices vulnerable to session hijacking through the default browser

The default browser in older, widely used versions of Android contains a vulnerability that can be used to bypass the same-origin policy read more »

TechUK manifesto spells out industry demands on next government

Political parties to react to manifesto at event on Wednesday evening read more »

Apple Watch under scrutiny for privacy by Connecticut attorney general

Attorney General George Jepsen is particularly concerned about the protection of health information collected by the new wearable device read more »

'Tiny banker' malware targets US financial institutions

Its source code was leaked in July, which may have broadened its use among cybercriminals read more »

Data loss detection tool mines the ephemeral world of 'pastes'

Thousands of email addresses are leaked every day on Pastebin unknown to most users read more »

more news ..
Data security Blogs

WLAN vendors differentiate by business value and market focus, not technology

Business value, beyond total cost of ownership, is the new differentiator read more »

A recovering but lagging Europe must embrace digital disruption

Digital technology can kick start productivity read more »

Analytic applications and the internet of things

Gearing up for the next wave read more »

Forrester's 2014 Data Privacy Heat Map

Rampant Government Surveillance and Increased Regulation Around The Globe read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Data security In Depth

HS2 CIO James Findlay sings praises of SME suppliers

Says they bring innovation and flexibility around customer needs and can cope with rapid change read more »

Swisscom: Customer trust is something we should not compromise in any way

Are some APIs too precious to give away? Swisscom strikes a balance with big data read more »

Why giving mobile apps banking info isn't as risky as it seems

The risks are no greater than transactions involving payment cards read more »

The hacker 'skills gap' may be more of a strategy gap

It feels like the bad guys are winning read more »

Should you buy enterprise applications from a start-up?

Get ready for radical changes in software purchasing read more »

Four small business security lessons from real-life hacks

Here are four tips for preventing social engineering and DDoS hacks from ruining your business. read more »

more in depth ..
Data security Slideshows

Hot products at VMworld 2014

Click through all the products being released at VMworld last week read more »

11 post-holiday checklist tips for CIOs

As the holiday period ends, it's a good time for your IT organisation to undertake some of those long put-off tasks. Here are tips from four CIOs and CTOs for cleaning up your IT environment. read more »

7 far-out technologies that are closer than you think

Some of these technology innovations sound like science fiction, but they may land in your data centre sooner than you'd imagine read more »

The 10 most terrifying security nightmares revealed at the Black Hat and Def Con hacker conferences

Hacked planes. Unstoppable, utterly malicious flash drives. Hotel automation gone crazy. These are the 10 most terrifying security stories out of the premier hacker and security conferences in Las Vegas. read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open