Network security

Network security News

How hackers accidentally sold a pre-release XBox One to the FBI

Group member Dylan Wheeler said the FBI ended up buying a mockup of the XBox One for $5,000 read more »

Google-backed Thread Group opens membership, wades into home IoT marsh

The group wants vendors to adopt its networking stack for connected-home devices read more »

Shellshock attacks target QNAP's network storage, FireEye says

A backdoor gives hackers full control over the NAS device, according to the security vendor read more »

Trying Windows 10 Tech Preview? Keep these 7 things in mind

The software you'll install on your PC is an early stage version of the OS that'll have bugs and will change a lot over time read more »

ARM builds an OS for the Internet of Things

ARM's mbed OS will be free for use on ARM chips when it's released next year read more »

IT pros should pay attention to 'shadow IT,' Interop NY keynoters urge

'Shadow IT,' commonly called BYOD, has existed for a long time, one says read more »

more news ..
Network security Blogs

Interop: Is cloud a bad word if you want to sell IT products and services?

The buzzwords they are a changin'... read more »

Open Data, OpenCorporates, OpenOil

Opening up Business with Open Data read more »

Leveraging collaboration for service innovation

How IT suppliers are helping manufacturers apply social technologies during product maintenance read more »

WLAN vendors differentiate by business value and market focus, not technology

Business value, beyond total cost of ownership, is the new differentiator read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Network security In Depth

Organisations must increase the value for customer data if they want to survive

Brocade and McAfee lay out their predictions for big data savvy business in 2050 read more »

OpenDaylight Executive Director spells out open source SDN efforts progress

Neela Jacques explains where the standards stand read more »

How to spot a tech company that's about to lose

If you're buying IT products and services, you need to be able to spot potential failures read more »

Incremental SDN: Automating Network Device Configuration

Automation is a logical next step in the SDN migration journey. read more »

Mobile phone spy masts worry US Congress

Rogue cell towers discovered in Washington, D.C. read more »

Swisscom: Customer trust is something we should not compromise in any way

Are some APIs too precious to give away? Swisscom strikes a balance with big data read more »

more in depth ..
Network security Slideshows

Apple's rotten week: Bent phones, broken software, and shattered security

The only magic in Apple land last week was black magic. read more »

9 Rules for the Developer-isation of IT

CIOs who want to drive innovation and change in their organisations should focus on making the lives of developers easier so they can innovate, produce great apps and deliver valuable IP read more »

Hot products at VMworld 2014

Click through all the products being released at VMworld last week read more »

10 things you need to know about Red Hat Enterprise Linux 7

Red Hat Enterprise Linux 7 is more proof that operating systems aren’t dead, they’re becoming vessels for containerised applications. read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open