Cloud security
-
News
19 Nov 2024
AI readiness stalls in APAC
Despite significant investment in AI, only 15% of organisations in Asia-Pacific are ready to deploy the technology today, according to Cisco’s latest regional AI readiness survey Continue Reading
-
Feature
19 Nov 2024
Storage technology explained: Ransomware and storage and backup
We look at ransomware attacks, and the importance of good backup practice as well as immutable snapshots, air-gapping, network segmentation, AI anomaly detection and supplier warranties Continue Reading
By- Antony Adshead, Storage Editor
-
News
05 Sep 2013
Windows 2012 Server Network Security
This book chapter offers an introduction to Windows 8 and Windows Server 2012 network security and IPv6. It includes a 30% discount code for Computer Weekly readers. Continue Reading
-
News
23 Aug 2013
Box.com forges new cloud security model
Service providers and consumers need to move to a security model better suited to the cloud computing, says Box.com Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Aug 2013
Targeted attacks and how to defend against them
Analysts Bob Tarzey and Louella Fernandes assess the scale and real impact of targeted attacks the measures being taken to defend against them. Continue Reading
-
Opinion
13 Aug 2013
The data fragmentation challenge
Few organisations have policies to guide where data should and should not be stored. The result: data fragmentation Continue Reading
By- Tony Lock, Freeform Dynamics
-
Feature
30 Jul 2013
Big data journalism exposes offshore tax dodgers
How journalists harnessed big data to challenge offshore financial secrecy Continue Reading
By- Duncan Campbell and Craig Shaw
-
Opinion
19 Jul 2013
How to assess the security of a cloud service provider
As businesses continue to put more information online, understanding cloud suppliers and agreements has never been more important Continue Reading
By- Andrew Fitzmaurice
-
News
19 Jul 2013
IT security case studies
Four critical IT security case-studies selected from the winners of Computer Weekly's European User Awards for security Continue Reading
-
News
18 Jul 2013
Needle in a Datastack: The rise of big security data
This research from McAfee investigates how well organisations are positioned to address the challenges of managing security in a world of ever increasing amounts and types of data. Continue Reading
-
News
17 Jul 2013
Security Think Tank Download: Bring your own device
Downloadable guide. How to make your company secure when you introduce BYOD. Continue Reading
-
News
17 Jul 2013
CW500: Back to the Future: Big Data at Channel 4
Bob Harris, Chief Technology Officer of Channel 4 Television, explains the broadcaster's approach to big data in this presentation for Computer Weekly's 500 Club. Continue Reading
-
News
17 Jul 2013
IT Security Case Studies
Warwick Ashford presents 4 essential IT security case-studies selected from the winners of Computer Weekly's European User Awards. Continue Reading
-
News
09 Jul 2013
Will cloud services follow the evolution of the banking industry?
Cloud service providers say security will become the very reason companies choose cloud services in future Continue Reading
-
News
05 Jul 2013
NSA Prism scandal could hit US cloud providers, says EC vice-president
EC vice-president Neelie Kroes says US cloud services providers could lose business because of fears over US Prism surveillance programme Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Jun 2013
Encrypting enterprises miss out on cloud benefits
Enterprises sending encrypted data to the cloud are missing out on some of the greatest benefits of cloud computing, says Thales e-Security Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Jun 2013
BES extends MDM to Android and iPhones
Aiming to rekindle interest in the Blackberry Enterprise Server (BES), Blackberry has extended the platform to support Android and iOS Continue Reading
By- Cliff Saran, Managing Editor
-
News
24 Jun 2013
Identity management key to browser-based IT strategy
A cloud-based identity management system is key to enabling a browser-based IT strategy at online recruitment firm Reed.co.uk Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Jun 2013
UK businesses failing to secure virtual environments, study finds
Most UK businesses are failing to secure data in virtual environments, a survey of IT decision makers has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Jun 2013
Telefonica Digital forms security group Eleven Paths
The business division of mobile operator Telefonica launches Eleven Paths, an independent company working on security issues in the workplace Continue Reading
By- Jennifer Scott, TechTarget
-
News
16 May 2013
Most IT environments immature, Microsoft reveals
Most business IT environments are immature, analysis of data from Microsoft’s Cloud Security Readiness Tool has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 May 2013
Computer Weekly European User Awards for Security: Winners
The winners are in for the Computer Weekly European User Awards for Security. See who made the top spots. Continue Reading
By- Kayleigh Bateman, Computer Weekly
-
News
01 May 2013
CW buyer's guide: context-aware security
This 11-page Computer Weekly buyer's guide looks at how organisations should approach context-aware security technologies and what business benefits they can deliver. Continue Reading
-
News
01 May 2013
CW Special Report on CSC
This 16-page report from Computer Weekly analyses the challenges facing CSC, its financial performance, the services it offers, its place in the IT market and its future strategy. Continue Reading
-
Opinion
25 Mar 2013
Securing the hypervisor: expert tips
There are many potential security issues with the various components of a virtualised infrastructure, and nowhere is this more of a concern than with the hypervisor platforms that host virtual systems and application instances Continue Reading
By- Dave Shackleford, Voodoo Security
-
News
22 Mar 2013
Six security issues to tackle before encrypting cloud data
Concern about security and privacy is likely to drive adoption of cloud encryption, but there are six security issues businesses should tackle Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
04 Mar 2013
How to tackle big data from a security point of view
Before leaping into big data, companies must be clear what they are trying to achieve, otherwise their investment will be wasted Continue Reading
By- Peter Wood, First Base Technologies LLP
-
News
26 Feb 2013
Virtualization Security: Protecting Virtualized Environments
This extract from the book Virtualization Security, includes a 30% discount for Computer Weekly readers. Continue Reading
-
News
15 Feb 2013
Bad outsourcing decisions cause 63% of data breaches
Bad outsourcing decisions nearly two-thirds of data breaches investigated by security firm Trustwave in the past year Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Feb 2013
Business avoids cloud over fear of government snooping
Almost half of IT professionals are deterred from keeping sensitive data in the cloud because of fear of government intervention and possible legal action, a survey has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Feb 2013
Twitter resets a quarter of a million accounts after hacker attack
Twitter has reset the passwords of 250,000 accounts after detecting and shutting down a hacker attack last week. Continue Reading
By- Warwick Ashford, Senior analyst
-
Photo Story
28 Jan 2013
IT Security Purchasing Intentions 2013 - Europe
TechTarget surveyed 250+ IT pros about security media purchasing in Europe. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Jan 2013
Encryption is safe bet, says SafeNet
Encryption is the only thing that can give peace of mind to CIOs and CISOs, says Dave Hansen, president and CEO of security firm SafeNet Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Dec 2012
VMworld Europe Case Study: Bull SAS
Bull SAS collaborated with suppliers to build a private cloud platform capable of keeping sensitive data secure. Continue Reading
-
News
03 Dec 2012
IT Security Purchasing Intentions 2013
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe. Continue Reading
-
News
13 Nov 2012
The Global State of Information Security Survey 2013: Key Findings
This global study examines the state of cyber-security and the impact of cyber crime and offers advice to businesses on reducing the risks. Continue Reading
-
News
12 Nov 2012
Gartner: BYOD will encourage self-support
Self-support communities will offset the cost and manpower of providing a helpdesk for staff who use their own devices, according to Gartner Continue Reading
By- Cliff Saran, Managing Editor
-
News
16 Oct 2012
Organisations need alternative data protection as security models fail
Organisations' security models are failing - so could it be time to adopt an intelligence-led approach to data protection and fighting cyber crime? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Oct 2012
RSA Europe: Thousands of unprotected virtual servers exposed to the web
Organisations are failing to protect data in virtual environments, says Jason Hart, vice-president cloud solutions, SafeNet Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Oct 2012
RSA Europe: Cloud key to future information security, says Qualys
Cloud computing is an opportunity information security professionals should not miss, says Philippe Courtot, CEO of security firm Qualys Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Sep 2012
EC sets out strategy for EU cloud data and standards
The European Commission (EC) has unveiled a strategy for standards and a legal framework for cloud computing in European Union (EU) states Continue Reading
By- Cliff Saran, Managing Editor
-
News
24 Apr 2012
Investigation reveals serious cloud computing data security flaws
Context Information Security found that data stored by a cloud customer could be accessed by the next customer to spin up a VM on the same disk. Continue Reading
By -
News
29 Dec 2011
Is it the end of the line for antivirus signatures?
Traditional antimalware can't keep up with the threat landscape. Are antivirus signatures destined for the rubbish bin? Continue Reading
By