Email Alerts
-
Austrian hospital improves access to patient data with Imprivata
Klinikum Wels-Grieskirchen hospital in Austria explains how it improved speed of access and security to its works stations. News | 15 Oct 2012
-
Cookie law needs more than ‘do not track’, says Neelie Kroes
Website owners still need consent to use cookies even if web users' browsers offer 'do not track' (DNT), says EC vice-president Neelie Kroes News | 15 Oct 2012
-
US prepares cyber offensive capability
The US admits to preparing cyber offensive capabilities amid growing evidence that Iran conducted cyber attacks on the Saudi oil industry News | 15 Oct 2012
-
Mozilla fixes security flaw in latest Firefox
Mozilla has released a fix for the latest version of its Firefox browser after withdrawing it the day before after identifying a security flaw Cyber security | 12 Oct 2012
-
Draft Data Communications Bill a security risk, says Jimmy Wales
The UK’s Draft Data Communications Bill will be useless and quite dangerous, says Wikipedia founder Jimmy Wales News | 12 Oct 2012
-
Parliament to look at UK involvement of Huawei
A parliamentary select committee is looking into Huawei’s operations in the UK following controversy around the safety of using the firm’s technology News | 11 Oct 2012
-
RSA Europe: Thousands of unprotected virtual servers exposed to the web
Organisations are failing to protect data in virtual environments, says Jason Hart, vice-president cloud solutions, SafeNet News | 11 Oct 2012
-
RSA Europe: Security must take human factor into account
Security needs to start taking into account the differences in users, says Hugh Thompson, RSA Conference programme committee chair Security software | 11 Oct 2012
-
RSA Europe: Security concerns whole supply chain, says Misha Glenny
Targeted attacks affect the whole supply chain, not just big corporations, author Misha Glenny tells RSA Conference Europe 2012 attendees News | 11 Oct 2012
-
RSA Europe: Cloud key to future information security, says Qualys
Cloud computing is an opportunity information security professionals should not miss, says Philippe Courtot, CEO of security firm Qualys News | 10 Oct 2012
- See More: News on Privacy and data protection
-
CW500: Managing the mobile workforce (part 2)
Glenn Morgan, head of service transformation at British Airways, explains how the airline is harnessing consumer technology Feature
-
CW500: Managing the mobile workforce (part 1)
Mobile working has transformed Colt Telecommunications beyond recognition over the past three years Feature
-
How to make your business Flame-proof
Advanced threats such as Flame can show CIOs what cyber attack tools of the future could look like Feature
-
Setting up a botnet is easier than you think
Acquiring, installing, configuring and using a powerful data-stealing banking Trojan toolkit is not as difficult as it sounds Feature
-
BYOD: Can enterprise mitigate the risks?
What can businesses do to mitigate the risks of employees using their own devices as the trend for IT consumerisation gathers momentum? Feature
-
Interview: Angela Tucci, chief strategy officer, Symantec
Angela Tucci, chief strategy officer at Symantec, talks to Computer Weekly about the company's strategic plans Feature
-
Compliance, risk and the coming EU data protection framework: a CISO's perspective
Compliance and risk managers in Europe are facing one of the biggest challenges for decades as the region moves to a new data protection framework Feature
-
How transforming a datacentre can transform your business
IT leaders from Domino's Pizza and TheTrainline.com reveal how transforming their datacentres transformed their businesses. CW500
-
Buyer's Guide: Disclosing security breaches in SMEs
Protecting regulated data is a big enough headache for many small businesses – now they also need to think about disclosure Buyer's Guide
-
Infosecurity: The changing landscape
The role of the chief information security officer (CISO) must adapt as businesses rethink IT security Feature
- See More: Features on Privacy and data protection
-
Security Think Tank: Block IP theft with policy, process and controls
IP theft affects almost all buinesses, observes no national boundaries and costs economies billions - so who should be tackling it and how? Opinion
-
Consumer capital: The new reality of 21st century data exchange
Consumers are beginning a counter-offensive against the monopoly that industry has enjoyed over the spoils of big data Opinion
-
How history of security shows we have not learnt our lesson
There is no security control more effective than a diligent system administrator Opinion
-
How IT security can drive business and enable innovation
The most critical IT security challenge is to be able to see the whole picture, understand the business needs and find solutions Opinion
-
Does the EC's cloud strategy go far enough?
The European Commission (EC) launched its cloud strategy last week. Legal experts put it under the spotlight to see if it goes far enough Opinion
-
Where does the ICO's new cloud guidance take you?
It is not possible to follow the ICO's advice on cloud computing and still have a “cloud” solution Opinion
-
How to ensure you are getting the right cloud service
How can an organisation use an indirect governance to assure trust in cloud services? Opinion
-
Security Think Tank: Several factors feed SQLi attacks
Why does SQL injection remain a successful way of attacking web applications? Opinion
-
Security Zone: Scada exploit fans the Flame of data risk
Analysis of the sophisticated and evidently well-resourced code behind the Flame malware exploit raises the stakes of data security exponentially Opinion
-
Security Think Tank: Best practice to target SQLi
Why does SQL injection remain a successful way of attacking web applications? Opinion
- See More: Opinion on Privacy and data protection
-
CW500 Security Club: Mike St John Green
The inaugural CW500 Security Club, titled "You're probably infected, now what?" invited experts to pass on their experiences to our audience of IT security leaders. Video
-
Computer Weekly and FT video debates: Tackling cyber crime
In a series of video debates, Computer Weekly and the Financial Times invite a panel of experts to discuss business and IT issues. Video
-
Smashing smartphones
How strong are modern smartphones. Data recovery specialist Kroll Ontrack set out to destroy them Photo Story
-
Royal Signals ‘Unsung Heroes’ Awards
IT experts from the Royal Signals were rewarded for their support and commitment to the service during an event for "unsung heroes" at Mansion House. Photo Story
-
InfoSec Europe 2012: A look at IT security skills in the current climate
At InfoSec Europe 2012 security industry experts gave their view on IT skills in the security sector Infosec 2012
-
Tim Wilson, deputy head of ICT at NHS City & Hackney, on ISO 27000 compliance
ISO 27000 has reduced the number of information security incidences dramatically at NHS City & Hackney Video
-
Input from the business vital to risk management in infosec, says CISO for Steria UK
In this video, Mathew Lord, chief information security officer at Steria UK discusses the top of risk management in the context of information security. Infosec
-
Computer Weekly & FT video debates - managing the cost of IT
Computer Weekly and the Financial Times invite a panel of experts to discuss how IT spending is changing. Video
-
IT in Europe
Download an issue of the IT in Europe digital magazine and find out news, features, tips and guides on hot topics in the UK and across the continent. guide
-
Supplier profile: Symantec
In this Symantec guide you will find a special nine-page report from Computer Weekly analysing the challenges facing Symantec. guide
-
Essential guide: EU Data Protection Regulation
This guide lays out what the new European Data Protection Regulation means for European businesses. Find news, features, tips and videos on the European Data Protection Regulation guide
-
InfoSec Europe 2012: Conference coverage
Keep up date with all the news from InfoSec Europe 2012, taking place 24-26 April at London’s Earls Court. guide
-
How to comply with the EU cookie law
Effective from 26 May 2012 the EU cookie law requires websites to gain permission from users, before planting cookies. Find out how to comply and what fines you may face if you don’t. Learning Guide
-
A quick guide to IT security
Everything you need to know on cyber-attacks, data protection, malware and computer viruses Quick Guide
-
Austrian hospital improves access to patient data with Imprivata
Klinikum Wels-Grieskirchen hospital in Austria explains how it improved speed of access and security to its works stations. News
-
Security Think Tank: Block IP theft with policy, process and controls
IP theft affects almost all buinesses, observes no national boundaries and costs economies billions - so who should be tackling it and how? Opinion
-
Cookie law needs more than ‘do not track’, says Neelie Kroes
Website owners still need consent to use cookies even if web users' browsers offer 'do not track' (DNT), says EC vice-president Neelie Kroes News
-
US prepares cyber offensive capability
The US admits to preparing cyber offensive capabilities amid growing evidence that Iran conducted cyber attacks on the Saudi oil industry News
-
Consumer capital: The new reality of 21st century data exchange
Consumers are beginning a counter-offensive against the monopoly that industry has enjoyed over the spoils of big data Opinion
-
Mozilla fixes security flaw in latest Firefox
Mozilla has released a fix for the latest version of its Firefox browser after withdrawing it the day before after identifying a security flaw Cyber security
-
Draft Data Communications Bill a security risk, says Jimmy Wales
The UK’s Draft Data Communications Bill will be useless and quite dangerous, says Wikipedia founder Jimmy Wales News
-
Parliament to look at UK involvement of Huawei
A parliamentary select committee is looking into Huawei’s operations in the UK following controversy around the safety of using the firm’s technology News
-
RSA Europe: Thousands of unprotected virtual servers exposed to the web
Organisations are failing to protect data in virtual environments, says Jason Hart, vice-president cloud solutions, SafeNet News
-
RSA Europe: Security must take human factor into account
Security needs to start taking into account the differences in users, says Hugh Thompson, RSA Conference programme committee chair Security software
- See More: All on Privacy and data protection
About Privacy and data protection
Issues around data protection and privacy are under greater focus than ever before as ubiquitous internet access exposes personal information and critical corporate data to new security threats. New legislation will change the way IT managers need to approach IT security to meet the changing needs of data privacy. We follow the latest developments in the legislative and technological environments.