Data security

Data security News

Critical XSS flaws patched in WordPress and popular plug-in

The vulnerabilities could allow attackers to create administrator accounts and take control of websites read more »

Police arrest 16 people for alleged Remote Access Trojan hacking

Suspects picked up in UK and six other countries read more »

Grocers, retailers gobble up Apple Pay in time for holidays

U.S. consumers have eschewed in-store mobile payments for years, but Apple Pay is making headway in that area. read more »

NSA chief says cyberattacks on industrial systems are his top concern

Nation states and groups are engaging in risky behavior in the absence of cyberspace rules read more »

Governments act against webcam-snooping websites

Insecam, which broadcast feeds from unsecured webcams, no longer works read more »

Uber, facing public backlash, will rethink privacy

The company is working with a DC law firm to assess its policies read more »

more news ..
Data security Blogs

TTIP Update XLIII

The problem of data flows, and why CETA's ISDS is a disaster read more »

EU Boosts Open Data; Open Contracting Data Standard Out

Building strength in depth read more »

Privacy Becomes A Competitive Differentiator In 2015

Are you in tune with your customers' attitudes? read more »

As OpenStack Stabilises Big Questions Remain for the Foundation

Vendors have too loud a voice in the OpenStack community read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Data security In Depth

How management failings led to RBS IT catastrophe

Was lack of IT investment to blame for the banks 2012 IT fiasco? read more »

Privacy is the new killer app

Ello, Wiper, Anonabox and others prove that Apple, Facebook and the like can't rest on their laurels when it comes to security. read more »

Mobile devices – the weakest link of enterprise security?

Devices are lost at an alarming rate - and this is an area of vulnerability for businesses read more »

New PCI council leader ready to take on the hackers

Payment Card Industry Security Standards Council leader warns against complaince complacency read more »

Beware the Cloud Poser: 5 Ways to Tell a Cloud Poser from a Cloud Pro

Infrastructure expert Jason Lehr has five questions businesses can ask a cloud provider to check if they're the real deal read more »

How the Internet of Things is transforming US law enforcement

From connected guns to wearables for canine units, the IoT is spurring change in the law enforcement field. read more »

more in depth ..
Data security Slideshows

2014s biggest cloud deals (so far)

The most important cloud acquisitions this year have one thing in common: OpenStack. read more »

Top 6 threats to iOS devices

Given the recent iOS update and iPhone announcement, a security group provides tips to fend off threats to your device. read more »

Pick of the week's news

IT professionals who don't work long hours, government missing a deadline (surprise), and a 'curious' new SAP UK MD read more »

9 cool Java 9 proposals developers will love

Modularity, JSON, smart compilation -- Java's future offers compelling features to look forward to read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open