Network security

Network security News

Apple Pay rival MCX defends security after hackers steal emails

read more »

Facebook gives away homebrewed OS monitoring tool

Osquery watches for operating system state changes that might indicate a security issue read more »

Hackers reportedly target unclassified White House network

The hackers are said to be working for the Russian government, according to a news report read more »

Gigamon says it can analyze attacker SSL traffic without hitting performance

Attackers are increasingly using SSL to encrypt data they steal, which poses challenges for security read more »

Facebook: $15 billion of WhatsApp's value is based on what it could be

Facebook revealed the calculations behind the massive acquisition price for the first time read more »

California reports huge jump in data breaches

Annual report says records equivalent to almost half the state's residents were lost in 2013 read more »

more news ..
Network security Blogs

Why Open Source is Replacing Open Standards

Linux Foundation leads the way read more »

Utilities wont let software glitches risk connected device roll-outs

Multivendor, mixed hardware/software environment requires testing coordination and risk management of a high order read more »

What Will Run The Internet of Things? Hint: It's Fully Open

Open trumps almost open read more »

Interop: Is cloud a bad word if you want to sell IT products and services?

The buzzwords they are a changin'... read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Network security In Depth

Desktop-as-a-Service: Your BYOD assistant

Using virtualised desktops delivered from the cloud is a way to bring apps to wherever your users are working and whatever they're working on. read more »

Big trends in big data analytics

Big data technologies and practices are moving quickly. Here's what you need to know to stay ahead of the game. read more »

Lead or Perish – disrupt your business with mobile to gain a timely edge

The mobile revolution in enterprise - resistance is futile read more »

Five tips for building a successful hybrid cloud

Companies are opting to mix the speed and flexibility of a public cloud with the security and control of a private cloud. read more »

Is it time to move your databases to the cloud?

Faster time to market increasingly drives firms of all sizes to move their databases to the cloud. read more »

Blowing the whistle without blowing your career

How techies can bring data mishandling and abuses to light without putting their careers in jeopardy. read more »

more in depth ..
Network security Slideshows

Top 6 threats to iOS devices

Given the recent iOS update and iPhone announcement, a security group provides tips to fend off threats to your device. read more »

9 cool Java 9 proposals developers will love

Modularity, JSON, smart compilation -- Java's future offers compelling features to look forward to read more »

9 employee insiders who breached security

These disgruntled employees show what can happen when an employer wrongs them. read more »

12 surprising ways personal technology betrays your privacy

It's not just your boss or the government that's spying on you, it's also the devices and technologies you embrace. read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open