- Antivirus
- IAM
- Risk management
- Data protection
- Continuity
- Cybercrime
- Data Breach Incident Management and Recovery
- Data Breach Incident Management and Recovery
- Web Application Security
- Cloud security
- Compliance Regulation and Standard Requirements
- Secure Coding and Application Programming
- Network Security Management
- Endpoint and NAC Protection
Email Alerts
-
Security firm warns against Samsung Galaxy Tab for enterprise use
Security specialist Context Information Security says vulnerabilities in the Samsung Galaxy Tab make it unsuitable for use in the enterpriseNews | 05 Oct 2012
-
CW500 Security Club: Dealing with attacks inside networks
Perimeter defences are no longer enough to keep data safe, experts told IT security leaders at the CW500 Security ClubCW500
-
Security concerns hold back mobile banking adoption
More than two-thirds of smartphone owners have not yet adopted mobile banking apps because of security concerns, a survey has revealedMobile security | 25 Sep 2012
-
How to make your business Flame-proof
Advanced threats such as Flame can show CIOs what cyber attack tools of the future could look likeFeature
-
Gartner Security and Risk Summit 2012: Strategic planning key to survival
Strategic planning is the only option if risk and security leaders want to succeed in a rapidly changing world, says GartnerIT risk management | 19 Sep 2012
-
Android devices vulnerable to security breaches
More than 50% of devices running Google's Android OS have unpatched vulnerabilities, opening them up to malicious apps and other attacksNews | 17 Sep 2012
-
MDM is not security, warns mobile security expert Eric Green
Mobile device management (MDM) is not about security, says US security expert Eric Green from Mobile Active Defense PartnersNews | 13 Sep 2012
-
Government launches £3.8m cyber security institute
The government has ramped up moves to tackle growing cyber security threats by launching a £3.8m research institute.News | 13 Sep 2012
-
Security spending remains important despite slowdown
IT budgets will continue to prioritise security for the next four years, at least, despite the economic slowdown with $60bn to be spent on security technologies this yearNews | 13 Sep 2012
-
AT&T; takes APTs seriously
APTs are real and all companies should be taking them seriously, says telecommunications company AT&T;News | 12 Sep 2012
- VIEW MORE ON : Antivirus
-
Security Think Tank: Least privilege is key to blocking IP theft
Intellectual property (IP) theft: Who should be tackling it and how?Opinion
-
Organisations need alternative data protection as security models fail
Organisations' security models are failing - so could it be time to adopt an intelligence-led approach to data protection and fighting cyber crime?Analysis | 16 Oct 2012
-
Security Think Tank: Block IP theft with policy, process and controls
IP theft affects almost all buinesses, observes no national boundaries and costs economies billions - so who should be tackling it and how?Opinion
-
Security Zone: Passwords: Help users discover what is available!
As company policy requires passwords to be stronger than ever, here are some tips to help employees copeOpinion
-
RSA Europe: Thousands of unprotected virtual servers exposed to the web
Organisations are failing to protect data in virtual environments, says Jason Hart, vice-president cloud solutions, SafeNetNews | 11 Oct 2012
-
RSA Europe: Security must take human factor into account
Security needs to start taking into account the differences in users, says Hugh Thompson, RSA Conference programme committee chairSecurity software | 11 Oct 2012
-
RSA Europe: Security concerns whole supply chain, says Misha Glenny
Targeted attacks affect the whole supply chain, not just big corporations, author Misha Glenny tells RSA Conference Europe 2012 attendeesNews | 11 Oct 2012
-
DWP to announce identity assurance suppliers
The Department for Work and Pensions (DWP) is to announce the first providers in the government’s identity assurance (IDA) scheme at the end of OctoberNews | 10 Oct 2012
-
CW500: Managing the mobile workforce (part 1)
Mobile working has transformed Colt Telecommunications beyond recognition over the past three yearsFeature
-
Security firm warns against Samsung Galaxy Tab for enterprise use
Security specialist Context Information Security says vulnerabilities in the Samsung Galaxy Tab make it unsuitable for use in the enterpriseNews | 05 Oct 2012
- VIEW MORE ON : IAM
-
Google offers Street View of datacentres
Google offers Street View of its datacentres and a virtual tour of how users' data is stored, with an emphasis on security practicesNews | 17 Oct 2012
-
Mike Lynch: Firms happy with 95% IT functionality should move to cloud
Former CEO and founder of Autonomy, Mike Lynch, believes cloud is right for a number of applications, but says ERP will always stay in houseNews | 17 Oct 2012
-
Security Think Tank: Least privilege is key to blocking IP theft
Intellectual property (IP) theft: Who should be tackling it and how?Opinion
-
Forrester: Five important guidelines for business technology governance
Forrester believes that "good" IT governance is business technology governance – a conscious process by senior executives to establish strategies, structures, processes, and measurements for the management of technology to boost business resultsOpinion
-
Theresa May: Hacker Gary McKinnon to stay in UK
Hacker Gary McKinnon will stay in UK, home secretary Theresa May has told MPsNews | 16 Oct 2012
-
Security remains a barrier to mobility, study finds
Security, potential loss of data and compliance remain key concerns in using mobile enterprise apps, a study has revealedmobile security | 16 Oct 2012
-
Austrian hospital improves access to patient data with Imprivata
Klinikum Wels-Grieskirchen hospital in Austria explains how it improved speed of access and security to its works stations.News | 15 Oct 2012
-
Security Think Tank: Block IP theft with policy, process and controls
IP theft affects almost all buinesses, observes no national boundaries and costs economies billions - so who should be tackling it and how?Opinion
-
Consumer capital: The new reality of 21st century data exchange
Consumers are beginning a counter-offensive against the monopoly that industry has enjoyed over the spoils of big dataOpinion
-
Mozilla fixes security flaw in latest Firefox
Mozilla has released a fix for the latest version of its Firefox browser after withdrawing it the day before after identifying a security flawCyber security | 12 Oct 2012
- VIEW MORE ON : Risk management
-
The Pirate Bay continues operations in the cloud
Swedish file sharing website, The Pirate Bay (TPB), has moved into the cloud to improve services, lower costs and evade authoritiesNews | 18 Oct 2012
-
Mike Lynch: Firms happy with 95% IT functionality should move to cloud
Former CEO and founder of Autonomy, Mike Lynch, believes cloud is right for a number of applications, but says ERP will always stay in houseNews | 17 Oct 2012
-
Security Think Tank: Least privilege is key to blocking IP theft
Intellectual property (IP) theft: Who should be tackling it and how?Opinion
-
Forrester: Five important guidelines for business technology governance
Forrester believes that "good" IT governance is business technology governance – a conscious process by senior executives to establish strategies, structures, processes, and measurements for the management of technology to boost business resultsOpinion
-
Draft Communications Bill will be ineffective, says ICO
The Draft Data Communications Bill will only catch the most incompetent criminals, says Information Commissioner Christopher GrahamNews | 17 Oct 2012
-
Theresa May: Hacker Gary McKinnon to stay in UK
Hacker Gary McKinnon will stay in UK, home secretary Theresa May has told MPsNews | 16 Oct 2012
-
Security remains a barrier to mobility, study finds
Security, potential loss of data and compliance remain key concerns in using mobile enterprise apps, a study has revealedmobile security | 16 Oct 2012
-
Organisations need alternative data protection as security models fail
Organisations' security models are failing - so could it be time to adopt an intelligence-led approach to data protection and fighting cyber crime?Analysis | 16 Oct 2012
-
EU advises Google to rethink privacy policy
The EU is to tell Google to change the way it gathers information on users to reduce the risk of infringing on their privacydata privacy | 16 Oct 2012
-
Home secretary Theresa May rules on hacker Gary McKinnon’s US extradition
Home secretary Theresa May is to rule on self-confessed computer hacker Gary McKinnon's extradition to the USNews | 16 Oct 2012
- VIEW MORE ON : Data protection
-
Case Study: Disaster recovery boosts business continuity
A review of disaster recovery capabilities has made multinational recruitment firm Hudson more resilient in its day-to-day businessCase Study | 17 Oct 2012
-
Security Zone: Passwords: Help users discover what is available!
As company policy requires passwords to be stronger than ever, here are some tips to help employees copeOpinion
-
RSA Europe: Security concerns whole supply chain, says Misha Glenny
Targeted attacks affect the whole supply chain, not just big corporations, author Misha Glenny tells RSA Conference Europe 2012 attendeesNews | 11 Oct 2012
-
CW500: Managing the mobile workforce (part 2)
Glenn Morgan, head of service transformation at British Airways, explains how the airline is harnessing consumer technologyFeature
-
Cyber crime costs UK organisations £2.1m a year
Ponemon Institute's 2012 Cost of Cyber Crime Study estimates cyber crime costs UK organisations an average of £2.1m a year eachNews | 08 Oct 2012
-
Swedish government sites targeted by Anonymous
The websites of several Swedish government agencies were knocked offline on Friday after being targeted by hacktivist collective AnonymousNews | 08 Oct 2012
-
Security firm warns against Samsung Galaxy Tab for enterprise use
Security specialist Context Information Security says vulnerabilities in the Samsung Galaxy Tab make it unsuitable for use in the enterpriseNews | 05 Oct 2012
-
Government spends £2m on global cyber security centre
The government is to spend £2m a year on a cyber-security centre.News | 04 Oct 2012
-
Information security: Technical skills highest in demand
Salaries for most information security professionals are continuing to trend upward as demand increases, particularly for technical skills.IT technical skills | 27 Sep 2012
-
Izz ad-Din al-Qassam hackers launch cyber attack on US bank Wells Fargo
A hacker group connected to Hamas says it attacked US bank Wells Fargo in reaction to the video 'Innocence of Muslims' posted on YouTubeNews | 27 Sep 2012
- VIEW MORE ON : Continuity
-
The Pirate Bay continues operations in the cloud
Swedish file sharing website, The Pirate Bay (TPB), has moved into the cloud to improve services, lower costs and evade authoritiesNews | 18 Oct 2012
-
ZTE targets local government for UK growth
Despite security controversy, Chinese firm ZTE’s UK head of sales tells Computer Weekly one of its first targets will be local governmentNews | 17 Oct 2012
-
Security Think Tank: Least privilege is key to blocking IP theft
Intellectual property (IP) theft: Who should be tackling it and how?Opinion
-
McKinnon's mum gives tearful thanks after government halts US extradition
The mother of Gary McKinnon thanks those who helped their 10-year campaign against a US extradition order for hacking federal computersNews | 17 Oct 2012
-
Theresa May: Hacker Gary McKinnon to stay in UK
Hacker Gary McKinnon will stay in UK, home secretary Theresa May has told MPsNews | 16 Oct 2012
-
Security remains a barrier to mobility, study finds
Security, potential loss of data and compliance remain key concerns in using mobile enterprise apps, a study has revealedmobile security | 16 Oct 2012
-
Organisations need alternative data protection as security models fail
Organisations' security models are failing - so could it be time to adopt an intelligence-led approach to data protection and fighting cyber crime?Analysis | 16 Oct 2012
-
Home secretary Theresa May rules on hacker Gary McKinnon’s US extradition
Home secretary Theresa May is to rule on self-confessed computer hacker Gary McKinnon's extradition to the USNews | 16 Oct 2012
-
Security Think Tank: Block IP theft with policy, process and controls
IP theft affects almost all buinesses, observes no national boundaries and costs economies billions - so who should be tackling it and how?Opinion
-
US prepares cyber offensive capability
The US admits to preparing cyber offensive capabilities amid growing evidence that Iran conducted cyber attacks on the Saudi oil industryNews | 15 Oct 2012
- VIEW MORE ON : Cybercrime
-
The Pirate Bay continues operations in the cloud
Swedish file sharing website, The Pirate Bay (TPB), has moved into the cloud to improve services, lower costs and evade authoritiesNews | 18 Oct 2012
-
Google offers Street View of datacentres
Google offers Street View of its datacentres and a virtual tour of how users' data is stored, with an emphasis on security practicesNews | 17 Oct 2012
-
Case Study: Disaster recovery boosts business continuity
A review of disaster recovery capabilities has made multinational recruitment firm Hudson more resilient in its day-to-day businessCase Study | 17 Oct 2012
-
McKinnon's mum gives tearful thanks after government halts US extradition
The mother of Gary McKinnon thanks those who helped their 10-year campaign against a US extradition order for hacking federal computersNews | 17 Oct 2012
-
Theresa May: Hacker Gary McKinnon to stay in UK
Hacker Gary McKinnon will stay in UK, home secretary Theresa May has told MPsNews | 16 Oct 2012
-
Organisations need alternative data protection as security models fail
Organisations' security models are failing - so could it be time to adopt an intelligence-led approach to data protection and fighting cyber crime?Analysis | 16 Oct 2012
-
RSA Europe: Thousands of unprotected virtual servers exposed to the web
Organisations are failing to protect data in virtual environments, says Jason Hart, vice-president cloud solutions, SafeNetNews | 11 Oct 2012
-
CW500: Managing the mobile workforce (part 2)
Glenn Morgan, head of service transformation at British Airways, explains how the airline is harnessing consumer technologyFeature
-
RSA Europe: New intelligence-led security model needed
A new model of security makes sense as nation states, criminals and hacktivists continue to take obscene advantage of the way things are, says Art Coviello, executive chairman of RSANews | 09 Oct 2012
-
Cyber crime costs UK organisations £2.1m a year
Ponemon Institute's 2012 Cost of Cyber Crime Study estimates cyber crime costs UK organisations an average of £2.1m a year eachNews | 08 Oct 2012
- VIEW MORE ON : Data Breach Incident Management and Recovery
-
The Pirate Bay continues operations in the cloud
Swedish file sharing website, The Pirate Bay (TPB), has moved into the cloud to improve services, lower costs and evade authoritiesNews | 18 Oct 2012
-
Security remains a barrier to mobility, study finds
Security, potential loss of data and compliance remain key concerns in using mobile enterprise apps, a study has revealedmobile security | 16 Oct 2012
-
Austrian hospital improves access to patient data with Imprivata
Klinikum Wels-Grieskirchen hospital in Austria explains how it improved speed of access and security to its works stations.News | 15 Oct 2012
-
Security Think Tank: Block IP theft with policy, process and controls
IP theft affects almost all buinesses, observes no national boundaries and costs economies billions - so who should be tackling it and how?Opinion
-
Security Zone: Passwords: Help users discover what is available!
As company policy requires passwords to be stronger than ever, here are some tips to help employees copeOpinion
-
Parliament to look at UK involvement of Huawei
A parliamentary select committee is looking into Huawei’s operations in the UK following controversy around the safety of using the firm’s technologyNews | 11 Oct 2012
-
RSA Europe: Security must take human factor into account
Security needs to start taking into account the differences in users, says Hugh Thompson, RSA Conference programme committee chairSecurity software | 11 Oct 2012
-
CW500: Managing the mobile workforce (part 1)
Mobile working has transformed Colt Telecommunications beyond recognition over the past three yearsFeature
-
How history of security shows we have not learnt our lesson
There is no security control more effective than a diligent system administratorOpinion
-
RSA Europe: New intelligence-led security model needed
A new model of security makes sense as nation states, criminals and hacktivists continue to take obscene advantage of the way things are, says Art Coviello, executive chairman of RSANews | 09 Oct 2012
- VIEW MORE ON : Data Breach Incident Management and Recovery
-
Austrian hospital improves access to patient data with Imprivata
Klinikum Wels-Grieskirchen hospital in Austria explains how it improved speed of access and security to its works stations.News | 15 Oct 2012
-
RSA Europe: Cloud key to future information security, says Qualys
Cloud computing is an opportunity information security professionals should not miss, says Philippe Courtot, CEO of security firm QualysNews | 10 Oct 2012
-
Cyber crime costs UK organisations £2.1m a year
Ponemon Institute's 2012 Cost of Cyber Crime Study estimates cyber crime costs UK organisations an average of £2.1m a year eachNews | 08 Oct 2012
-
Security firm warns against Samsung Galaxy Tab for enterprise use
Security specialist Context Information Security says vulnerabilities in the Samsung Galaxy Tab make it unsuitable for use in the enterpriseNews | 05 Oct 2012
-
Hackers target White House military network
Hackers using computers in China have infiltrated an “unclassified” network in the US White House, believed to be used for issuing nuclear commands.News | 02 Oct 2012
-
Information security: Technical skills highest in demand
Salaries for most information security professionals are continuing to trend upward as demand increases, particularly for technical skills.IT technical skills | 27 Sep 2012
-
Java flaw allows attackers to bypass sandbox defences
Security researchers have discovered a vulnerability in all supported versions of Oracle Java allowing attackers to bypass sandbox defencesNews | 27 Sep 2012
-
Security concerns hold back mobile banking adoption
More than two-thirds of smartphone owners have not yet adopted mobile banking apps because of security concerns, a survey has revealedMobile security | 25 Sep 2012
-
Facebook rejects claim of privacy breach
Facebook has rejected claims that private direct messages between users were appearing publicly on users' timelinesNews | 25 Sep 2012
-
Computer Weekly and FT video debates: Tackling cyber crime
In a series of video debates, Computer Weekly and the Financial Times invite a panel of experts to discuss business and IT issues.Video
- VIEW MORE ON : Web Application Security
-
Download IT in Europe: October
This month’s issue of IT in Europe focuses on cloud technologies. Best practices and key trends in storage, adoption and transition.Magazine
-
The Pirate Bay continues operations in the cloud
Swedish file sharing website, The Pirate Bay (TPB), has moved into the cloud to improve services, lower costs and evade authoritiesNews | 18 Oct 2012
-
Mike Lynch: Firms happy with 95% IT functionality should move to cloud
Former CEO and founder of Autonomy, Mike Lynch, believes cloud is right for a number of applications, but says ERP will always stay in houseNews | 17 Oct 2012
-
Organisations need alternative data protection as security models fail
Organisations' security models are failing - so could it be time to adopt an intelligence-led approach to data protection and fighting cyber crime?Analysis | 16 Oct 2012
-
Security Think Tank: Block IP theft with policy, process and controls
IP theft affects almost all buinesses, observes no national boundaries and costs economies billions - so who should be tackling it and how?Opinion
-
RSA Europe: Thousands of unprotected virtual servers exposed to the web
Organisations are failing to protect data in virtual environments, says Jason Hart, vice-president cloud solutions, SafeNetNews | 11 Oct 2012
-
RSA Europe: Cloud key to future information security, says Qualys
Cloud computing is an opportunity information security professionals should not miss, says Philippe Courtot, CEO of security firm QualysNews | 10 Oct 2012
-
RSA Europe: Free cloud security readiness tool from Microsoft
Microsoft has announced a free tool for organisations to assess their security readiness for cloud computingCloud security | 09 Oct 2012
-
Swedish government sites targeted by Anonymous
The websites of several Swedish government agencies were knocked offline on Friday after being targeted by hacktivist collective AnonymousNews | 08 Oct 2012
-
Does the EC's cloud strategy go far enough?
The European Commission (EC) launched its cloud strategy last week. Legal experts put it under the spotlight to see if it goes far enoughOpinion
- VIEW MORE ON : Cloud security
-
Forrester: Five important guidelines for business technology governance
Forrester believes that "good" IT governance is business technology governance – a conscious process by senior executives to establish strategies, structures, processes, and measurements for the management of technology to boost business resultsOpinion
-
Theresa May: Hacker Gary McKinnon to stay in UK
Hacker Gary McKinnon will stay in UK, home secretary Theresa May has told MPsNews | 16 Oct 2012
-
EU advises Google to rethink privacy policy
The EU is to tell Google to change the way it gathers information on users to reduce the risk of infringing on their privacydata privacy | 16 Oct 2012
-
Austrian hospital improves access to patient data with Imprivata
Klinikum Wels-Grieskirchen hospital in Austria explains how it improved speed of access and security to its works stations.News | 15 Oct 2012
-
Cookie law needs more than ‘do not track’, says Neelie Kroes
Website owners still need consent to use cookies even if web users' browsers offer 'do not track' (DNT), says EC vice-president Neelie KroesNews | 15 Oct 2012
-
Consumer capital: The new reality of 21st century data exchange
Consumers are beginning a counter-offensive against the monopoly that industry has enjoyed over the spoils of big dataOpinion
-
Three million employees lose corporate mobile data
Survey highlights security and privacy flaws as one in eight UK employees admit to losing corporate data on mobile devicesdata security | 09 Oct 2012
-
How IT security can drive business and enable innovation
The most critical IT security challenge is to be able to see the whole picture, understand the business needs and find solutionsOpinion
-
Most US citizens reject online tracking, survey finds
Most US citizens do not want any information collected about which websites they visit, according to a survey by the University of CaliforniaNews | 08 Oct 2012
-
Social media presents risk of data overload
Employees are at risk of information overload as social media technologies are increasingly used in the workplacesocial media technologies | 05 Oct 2012
- VIEW MORE ON : Compliance Regulation and Standard Requirements
-
RSA Europe: New intelligence-led security model needed
A new model of security makes sense as nation states, criminals and hacktivists continue to take obscene advantage of the way things are, says Art Coviello, executive chairman of RSANews | 09 Oct 2012
-
Computer Weekly and FT video debates: Tackling cyber crime
In a series of video debates, Computer Weekly and the Financial Times invite a panel of experts to discuss business and IT issues.Video
-
The Pirate Bay continues operations in the cloud
Swedish file sharing website, The Pirate Bay (TPB), has moved into the cloud to improve services, lower costs and evade authoritiesNews | 18 Oct 2012
-
ZTE targets local government for UK growth
Despite security controversy, Chinese firm ZTE’s UK head of sales tells Computer Weekly one of its first targets will be local governmentNews | 17 Oct 2012
-
Security Think Tank: Least privilege is key to blocking IP theft
Intellectual property (IP) theft: Who should be tackling it and how?Opinion
-
Organisations need alternative data protection as security models fail
Organisations' security models are failing - so could it be time to adopt an intelligence-led approach to data protection and fighting cyber crime?Analysis | 16 Oct 2012
-
Security Zone: Passwords: Help users discover what is available!
As company policy requires passwords to be stronger than ever, here are some tips to help employees copeOpinion
-
Parliament to look at UK involvement of Huawei
A parliamentary select committee is looking into Huawei’s operations in the UK following controversy around the safety of using the firm’s technologyNews | 11 Oct 2012
-
RSA Europe: Thousands of unprotected virtual servers exposed to the web
Organisations are failing to protect data in virtual environments, says Jason Hart, vice-president cloud solutions, SafeNetNews | 11 Oct 2012
-
RSA Europe: Security must take human factor into account
Security needs to start taking into account the differences in users, says Hugh Thompson, RSA Conference programme committee chairSecurity software | 11 Oct 2012
-
RSA Europe: Security concerns whole supply chain, says Misha Glenny
Targeted attacks affect the whole supply chain, not just big corporations, author Misha Glenny tells RSA Conference Europe 2012 attendeesNews | 11 Oct 2012
-
Swedish government sites targeted by Anonymous
The websites of several Swedish government agencies were knocked offline on Friday after being targeted by hacktivist collective AnonymousNews | 08 Oct 2012
- VIEW MORE ON : Network Security Management
-
Security remains a barrier to mobility, study finds
Security, potential loss of data and compliance remain key concerns in using mobile enterprise apps, a study has revealedmobile security | 16 Oct 2012
-
Austrian hospital improves access to patient data with Imprivata
Klinikum Wels-Grieskirchen hospital in Austria explains how it improved speed of access and security to its works stations.News | 15 Oct 2012
-
Security Think Tank: Block IP theft with policy, process and controls
IP theft affects almost all buinesses, observes no national boundaries and costs economies billions - so who should be tackling it and how?Opinion
-
Security Zone: Passwords: Help users discover what is available!
As company policy requires passwords to be stronger than ever, here are some tips to help employees copeOpinion
-
RSA Europe: Security must take human factor into account
Security needs to start taking into account the differences in users, says Hugh Thompson, RSA Conference programme committee chairSecurity software | 11 Oct 2012
-
RSA Europe: Cloud key to future information security, says Qualys
Cloud computing is an opportunity information security professionals should not miss, says Philippe Courtot, CEO of security firm QualysNews | 10 Oct 2012
-
CW500: Managing the mobile workforce (part 1)
Mobile working has transformed Colt Telecommunications beyond recognition over the past three yearsFeature
-
Samsung faces call for Galaxy S3 security update
Samsung is facing calls to issue a security update for the Galaxy S3 smartphone to address a serious vulnerabilityNews | 26 Sep 2012
-
BYOD: IT must tackle printer security
With more staff bringing their own devices to work, IT needs to rethink its printing and scanning policiesNews | 25 Sep 2012
-
Security concerns hold back mobile banking adoption
More than two-thirds of smartphone owners have not yet adopted mobile banking apps because of security concerns, a survey has revealedMobile security | 25 Sep 2012
- VIEW MORE ON : Endpoint and NAC Protection