Data security

Data security News

FBI opens malware tool to public as part of radical crowdsourcing plan

Public Malware Investigator portal nears launch read more »

Trying Windows 10 Tech Preview? Keep these 7 things in mind

The software you'll install on your PC is an early stage version of the OS that'll have bugs and will change a lot over time read more »

White House sets 20% data center efficiency goal, but finds few takers

Without a carbon tax or anything that penalizes fossil fuel consumption, the federal government has little ability to influence how much energy a data center uses. But it's trying. read more »

Xen Project discloses serious vulnerability that impacts virtualized servers

Major cloud providers like Amazon and Rackspace were forced to reboot some of their servers in order to apply the patch read more »

ARM builds an OS for the Internet of Things

ARM's mbed OS will be free for use on ARM chips when it's released next year read more »

IT pros should pay attention to 'shadow IT,' Interop NY keynoters urge

'Shadow IT,' commonly called BYOD, has existed for a long time, one says read more »

more news ..
Data security Blogs

Interop: Is cloud a bad word if you want to sell IT products and services?

The buzzwords they are a changin'... read more »

New ARM-based Moonshot servers from HP exemplify workload-specific computing

HP promises 35 percent cost savings for targeted workloads read more »

The cloud should be a glasshouse not a mysterious black box

If SMEs don't trust the cloud it's because they fail to do due diligence read more »

Open Data, OpenCorporates, OpenOil

Opening up Business with Open Data read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Data security In Depth

Organisations must increase the value for customer data if they want to survive

Brocade and McAfee lay out their predictions for big data savvy business in 2050 read more »

OpenDaylight Executive Director spells out open source SDN efforts progress

Neela Jacques explains where the standards stand read more »

How to spot a tech company that's about to lose

If you're buying IT products and services, you need to be able to spot potential failures read more »

Incremental SDN: Automating Network Device Configuration

Automation is a logical next step in the SDN migration journey. read more »

Mobile phone spy masts worry US Congress

Rogue cell towers discovered in Washington, D.C. read more »

Ford on apps: We are making the car more accessible – like it used to be back in the day

Open source software platform allows developers to create imaginative apps despite the risk of enabling their own disruption read more »

more in depth ..
Data security Slideshows

9 Rules for the Developer-isation of IT

CIOs who want to drive innovation and change in their organisations should focus on making the lives of developers easier so they can innovate, produce great apps and deliver valuable IP read more »

Hot products at VMworld 2014

Click through all the products being released at VMworld last week read more »

11 post-holiday checklist tips for CIOs

As the holiday period ends, it's a good time for your IT organisation to undertake some of those long put-off tasks. Here are tips from four CIOs and CTOs for cleaning up your IT environment. read more »

7 far-out technologies that are closer than you think

Some of these technology innovations sound like science fiction, but they may land in your data centre sooner than you'd imagine read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open