Network security

Network security News

Gartner: CIOs must take every opportunity to align IT with an organisation's strategy

No longer just plumbing - grab every opportunity to get IT spend into early business budgeting read more »

NHS BYOD scheme restricted by Microsoft licensing costs

Trust still pressing ahead with ambitious plans for electronic records, e-Prescribing and wearables read more »

Shanghai authorities ban government officials' use of iPhone

read more »

Apple's iOS 8 fixes enterprise Wi-Fi authentication hijacking issue

A weakness in Apple's Wi-Fi implementation could give hackers access to enterprise wireless networks, researchers said read more »

UK appoints first SME cyber-security 'czar' with £4 million funding boost

Drawing security SMEs and startups into network read more »

Malicious advertisements distributed by DoubleClick, Zedo networks

The advertisements redirect victims to the Nuclear exploit kit, which tries to install the Zemot malware read more »

more news ..
Network security Blogs

WLAN vendors differentiate by business value and market focus, not technology

Business value, beyond total cost of ownership, is the new differentiator read more »

Analytic applications and the internet of things

Gearing up for the next wave read more »

Say 'small footprint' again. I dare you

The terminology minimises the struggle involved in ensuring end point security read more »

Holography spells the next phase of innovation in projection technology

From medical training to political campaigning to virtual assistants read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Network security In Depth

Incremental SDN: Automating Network Device Configuration

Automation is a logical next step in the SDN migration journey. read more »

Mobile phone spy masts worry US Congress

Rogue cell towers discovered in Washington, D.C. read more »

Swisscom: Customer trust is something we should not compromise in any way

Are some APIs too precious to give away? Swisscom strikes a balance with big data read more »

Why giving mobile apps banking info isn't as risky as it seems

The risks are no greater than transactions involving payment cards read more »

The hacker 'skills gap' may be more of a strategy gap

It feels like the bad guys are winning read more »

Should you buy enterprise applications from a start-up?

Get ready for radical changes in software purchasing read more »

more in depth ..
Network security Slideshows

9 Rules for the Developer-isation of IT

CIOs who want to drive innovation and change in their organisations should focus on making the lives of developers easier so they can innovate, produce great apps and deliver valuable IP read more »

Hot products at VMworld 2014

Click through all the products being released at VMworld last week read more »

10 things you need to know about Red Hat Enterprise Linux 7

Red Hat Enterprise Linux 7 is more proof that operating systems aren’t dead, they’re becoming vessels for containerised applications. read more »

11 post-holiday checklist tips for CIOs

As the holiday period ends, it's a good time for your IT organisation to undertake some of those long put-off tasks. Here are tips from four CIOs and CTOs for cleaning up your IT environment. read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open