Network security

Network security News

Wi-Fi Passpoint standard now knits together SF, San Jose, London

The specification helps users join secure networks automatically read more »

Apple mum as Mac owners tussle with Yosemite over Wi-Fi problems

Complaints continue to pour in from users whose Wi-Fi is malfunctioning after upgrading to the new Mac OS X version read more »

Wireless price war's good for consumers, but challenges carriers

More than any time in the past decade, wireless customers are reaping the benefits of a carrier price war over smartphones and tablets read more »

The ratings: Most net neutrality groups get poor grades for funding transparency

Ten of 14 think tanks and advocacy groups earn C grades or lower read more »

Senator wants Whisper to explain how it tracks users, shares their data

Reports saying the supposedly anonymous social media app is sharing user information leads to questions from Rockefeller read more »

The 'Backoff' malware linked to data breaches is spreading

A rising number of devices are connecting to Backoff-related infrastructure, Damballa says read more »

more news ..
Network security Blogs

Why Open Source is Replacing Open Standards

Linux Foundation leads the way read more »

Utilities wont let software glitches risk connected device roll-outs

Multivendor, mixed hardware/software environment requires testing coordination and risk management of a high order read more »

What Will Run The Internet of Things? Hint: It's Fully Open

Open trumps almost open read more »

Interop: Is cloud a bad word if you want to sell IT products and services?

The buzzwords they are a changin'... read more »

more blogs ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
Network security In Depth

Big trends in big data analytics

Big data technologies and practices are moving quickly. Here's what you need to know to stay ahead of the game. read more »

Lead or Perish – disrupt your business with mobile to gain a timely edge

The mobile revolution in enterprise - resistance is futile read more »

Five tips for building a successful hybrid cloud

Companies are opting to mix the speed and flexibility of a public cloud with the security and control of a private cloud. read more »

Is it time to move your databases to the cloud?

Faster time to market increasingly drives firms of all sizes to move their databases to the cloud. read more »

Blowing the whistle without blowing your career

How techies can bring data mishandling and abuses to light without putting their careers in jeopardy. read more »

The best new features in Windows Server 10 (so far)

The early look at Windows Server 10 reveals many expected enhancements and nice surprises read more »

more in depth ..
Network security Slideshows

Top 6 threats to iOS devices

Given the recent iOS update and iPhone announcement, a security group provides tips to fend off threats to your device. read more »

9 cool Java 9 proposals developers will love

Modularity, JSON, smart compilation -- Java's future offers compelling features to look forward to read more »

9 employee insiders who breached security

These disgruntled employees show what can happen when an employer wrongs them. read more »

12 surprising ways personal technology betrays your privacy

It's not just your boss or the government that's spying on you, it's also the devices and technologies you embrace. read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open