Security policy and user awareness
-
News
19 Dec 2024
LockBit ransomware gang teases February 2025 return
An individual associated with the LockBit ransomware gang has broken cover to tease details of a new phase of the cyber criminal operation's activity, which they claim is set to begin in February 2025 Continue Reading
By- Alex Scroxton, Security Editor
-
News
19 Dec 2024
Latest attempt to override UK’s outdated hacking law stalls
Amendments to the Data Bill that would have given the UK cyber industry a boost by updating restrictive elements of the Computer Misuse Act have failed to progress beyond a Lords committee Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
07 Mar 2016
The problem with passwords: how to make it easier for employees to stay secure
An organisation’s IT security can be compromised if staff do not follow a strict policy of using strong passwords to access internal systems Continue Reading
By- Jeremy Bergsman, CEB
-
E-Zine
23 Feb 2016
Surviving broadband failure
In this week’s Computer Weekly, after the recent BT broadband outage, we examine the options to keep your communications in place in the event of a failure, to ensure business continuity. We look at the prospects for the OpenStack open source cloud platform in the enterprise. And we see how Ireland is making progress on delivering a digital health service. Read the issue now. Continue Reading
-
News
23 Feb 2016
Social engineering confirmed as top information security threat
Cyber attackers shifted away from automated exploits in 2015 and instead tricked people into doing the dirty work, Proofpoint researchers found Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
16 Feb 2016
How AstraZeneca saved $350m by insourcing IT
In this week’s Computer Weekly, we talk to pharmaceutical giant AstraZeneca to find out why it brought its outsourced IT back in-house, and how it saved $350m per year as a result. As the data protection debate rages around Europe, we ask if the new EU/US Privacy Shield agreement will protect citizens’ data. And we examine the relative merits of datacentre colocation and the cloud. Read the issue now. Continue Reading
-
News
04 Feb 2016
Google’s Chrome to flag deceptive embedded content
Browser will warn of any embedded content such as ads that pretend to act like, and look and feel like, a trusted entity Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Jan 2016
HSBC online services hit by DDoS attack
HSBC was hit by a distributed denial of service (DDoS) attack, which targeted its online personal banking services. Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
E-Zine
21 Jan 2016
CW Europe - January 2016
This month, CW Europe looks in-depth at an issue that is set to affect people across all 28 European Union member states – the abolition of mobile roaming charges, set for mid-2017. Continue Reading
-
News
19 Jan 2016
Most Android devices running outdated versions
Nearly a third of Android devices in enterprises today are running version 4.0 or older of the operating system, leaving them highly susceptible to vulnerabilities, a study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Jan 2016
UK not involved in mass surveillance, says Theresa May
Coffee shops and libraries could be the target of interception warrants, Theresa May tells MPs and peers Continue Reading
By- Julia Gregory
-
News
06 Jan 2016
UK IoT research hub opens with support from academic world
A consortium of nine UK universities have come together to work alongside the Engineering and Physical Sciences Research Council on research into the internet of things Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
05 Jan 2016
Interview: James Bamford on surveillance, Snowden and technology companies
Investigative journalist and documentary maker James Bamford was among the first to uncover the secrets of the US National Security Agency and its global surveillance Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
17 Dec 2015
National security ‘not affected’ by failed e-Borders programme, says Home Office
Despite the key Warnings Index system suffering an average of two high-priority incidents a week – such as a system component not being available – Home Office officials deny it causes risk to national security Continue Reading
By- Bryan Glick, Editor in chief
-
E-Zine
08 Dec 2015
The most influential people in UK IT 2015
In this week’s Computer Weekly, we announce our sixth annual UKtech50 list of the 50 most influential people in UK IT, and talk to this year’s winner – BT chief executive Gavin Patterson, about the challenges facing the telecoms giant in 2016. Also, we find out how the genomics industry is pushing big data technology to its limits. Read the issue now. Continue Reading
-
News
07 Dec 2015
Cyber attacks an increasing concern for Asean countries
Organisations in the Association of Southeast Asian Nations are increasingly the targets for cyber criminals, according to a report focused on the region Continue Reading
By -
News
03 Dec 2015
Workday ringfences support in Europe after Safe Harbour ruled unsafe
US cloud HR and financial services provider reponds to Safe Harbour failure by ringfencing European data Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
26 Nov 2015
Dridex banking Trojan regains strength to mount attacks on the UK
Fresh Dridex banking Trojan campaigns target the US, UK and France – despite a recent law enforcement takedown operation – warn security researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Nov 2015
UAE recognises importance of cyber security, says official
Like the UK, the UAE federal government has identified the importance of creating an environment in which it is safe to do business online Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
15 Oct 2015
The true cost of a cyber security breach in Australia
The costs of cyber security breaches can quickly add up with fines, reputational damage and overhauls to network security all hitting the coffers. The case of one Australian firm shows why paying a ransom to a hacker might be tempting. Continue Reading
-
News
13 Oct 2015
Cyber security innovation is crucial, says security evangelist
Visibility and automation are key areas of cyber security innovation, but firms should concentrate first on the basics and not overlook the human element of security Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
09 Oct 2015
The security dangers of home networks
Most companies take reasonable steps to protect their networks from virus attacks, but one area of vulnerability that is often overlooked is infection from employees’ home networks Continue Reading
-
Feature
09 Oct 2015
How to ensure strong passwords and better authentication
Five steps to ensure stronger passwords and better authentication to reduce the threat of business data theft Continue Reading
By- Peter Wood, First Base Technologies LLP
-
News
22 Sep 2015
Is Microsoft Office 2016 reliable enough for business?
A day after a major Skype outage, Microsoft unveils Office 2016, which, ironically, offers tight integration with Skype Continue Reading
By- Cliff Saran, Managing Editor
-
News
11 Sep 2015
Security industry welcomes GCHQ password guidelines
GCHQ's guidance on password policy covers some of the most pressing issues facing UK businesses and employees today, according to Skyhigh Networks Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Sep 2015
US State Department plans cyber security playbook
The US State Department issues a request for information to determine the capabilities of commercial industry to provide and maintain a cyber security playbook Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
25 Aug 2015
Life’s a breach: How to handle the press after a hacking attack
Emily Dent, specialist in crisis PR, offers some advice to organisations that unexpectedly find themselves in the headlines Continue Reading
By- Emily Dent
-
News
16 Aug 2015
Mobile phone users at risk as hackers bug and track victims
An investigation by Australian TV show 60 Minutes demonstrates how hackers based thousands of miles away in Germany were able to record the calls of an Australian senator and track his movements Continue Reading
By- Ross Coulthart, 60 Minutes Australia
-
News
29 Jul 2015
A third of employees will sell company data if the price is right, study reveals
For £5,000, a quarter of employees polled said they would sell confidential company data, and risk both their job and criminal convictions Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Jul 2015
UK sales teams are the most exposed to cyber attacks, study reveals
UK sales staff, callcentre agents and customer services teams are among the most highly targeted by cyber attacks, yet few firms give these groups IT security training, a study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
29 Jun 2015
The legacy IT challenge for CIOs
In this week’s Computer Weekly, CIOs in financial services hoping to fight off challenger banks face a huge hindrance from their legacy IT – we assess the difficulties and reveal a diagram that shows the scale of the problem. We look at how to prepare for information security audits and why they are so vital. And we ask if HM Revenue & Customs’ plan for online tax accounts will make tax more taxing for the digitally excluded taxpayer. Read the issue now. Continue Reading
-
News
02 Jun 2015
The drivers and inhibitors of cyber security evolution
A study shows a shift in IT security spending to detection and response – but why are most organisations falling way behind the more enlightened front runners? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 May 2015
Data classification key to IP protection, says Titus
Data classification can help organisations get more value out of encryption and data loss prevention systems Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 May 2015
Social engineering attacks more complex than ever, says expert
Expert warns attackers are starting to use increasingly sophisticated ways to get people in organisations to help them circumvent security controls Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
26 May 2015
How to reduce the risk of social engineering attacks
Implement simple checks to reduce the risk of the main types of social engineering attacks Continue Reading
By- Peter Wood, First Base Technologies LLP
-
News
18 May 2015
Wi-Fi Global Congress: Hotspot 2.0 standard addresses wireless security holes
At Wi-Fi Global Congress, Ruckus Wireless announces it will be first to market with the second release of Hotspot 2.0 Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 May 2015
PSNGB rebrands to drive information sharing across PSN
PSNGB, the trade association set up to promote the Public Services Network, rebrands itself as Innopsis and says its work is far from over Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
27 Apr 2015
Top tips for remote and mobile workers to improve their cyber security
Steps remote and mobile workers can take to improve cyber security on mobile devices, using public Wi-Fi and computers, and handling USB devices Continue Reading
By- Peter Wood, First Base Technologies LLP
-
Feature
25 Apr 2015
Bill Binney, the ‘original’ NSA whistleblower, on Snowden, 9/11 and illegal surveillance
Always a patriot: Computer Weekly talks to Bill Binney, the senior NSA official who blew the whistle before Edward Snowden Continue Reading
-
News
22 Apr 2015
Collaboration key to cyber security, says US homeland security chief
Collaboration between governments and with the private sector key to improving global cyber security Continue Reading
By- Warwick Ashford, Senior analyst
-
News
14 Apr 2015
Security risk potential linked to young, mobile users
A study conducted by wireless supplier Aruba Networks has identified a distinct cohort of high-risk, security-agnostic workers Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Mar 2015
How to ensure your hot-desking colleagues keep their data secure
Once hot-desking is implemented, data security suddenly demands greater attention Continue Reading
By- Christian Cawley
-
Feature
06 Mar 2015
How to secure the SDN infrastructure
As more enterprises look to deploy software-defined networking, the need for security from the ground up should not be underestimated Continue Reading
By -
News
27 Feb 2015
Case study: Norwegian insurer invests in Darktrace machine-learning cyber defence
Shipping insurance company DNK hopes to inspire the rest of the shipping industry to adopt Darktrace’s cyber defence system Continue Reading
-
News
06 Feb 2015
Symantec continues cloud investment in spite of poor Q3 results
Symantec has reported third quarter 2015 revenue of $1.64bn, a drop of 4% compared with $1.70bn over the same period in 2014 Continue Reading
By- Cliff Saran, Managing Editor
-
E-Zine
26 Jan 2015
Why we need cyber war games
In this week’s Computer Weekly, the UK and US are starting a cyber war on each other – all in the name of testing each other’s defences. We look at why the cyber war games are needed. We examine what IT managers can learn from the car industry to improve supplier relationship management. And we find out why innovation should be top of the IT agenda in 2015. Read the issue now. Continue Reading
-
News
13 Jan 2015
Obama calls for single US data breach notification law
The US president is calling for a single US data breach notification law as part of proposed legislation to improve data security Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Jan 2015
Traditional security putting UK businesses at risk, study shows
Traditional approaches to security are exposing UK businesses to heightened risk of attack, a study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
05 Jan 2015
CW Europe – January 2015 Edition
As we start another new year we look back at what technology has been playing a vital role in keeping Europe safe. Headlines are regularly filled with threats about cyber wars and attacks which, although are important to bring to light, can sometimes overshadow the role technology plays in keeping us safe. Continue Reading
-
News
05 Jan 2015
Hackers can exploit free mobile apps to steal data, study shows
Hackers can access private data by exploiting vulnerabilities mainly in free mobile apps, according to security researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Dec 2014
Cabinet Office begins procurement for next stage of Gov.uk Verify
The Cabinet Office has submitted a tender notice for a £150m three-year framework for the provision of identity assurance services Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
15 Dec 2014
Lloyd’s Register Foundation grants £10m to Alan Turing Institute
The Lloyd’s Register Foundation has announced £10m in funding over five years to support research by the Alan Turing Institute Continue Reading
By- Brian McKenna, Senior Analyst, Business Applications
-
News
10 Dec 2014
Social media threats to business on the rise, says report
Social media threats to business are increasing, according to the first in-depth analysis covering Fortune 100 companies Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Nov 2014
CGI secures communications between pilots and air traffic control
Satellite communications firm Inmarsat has outsourced the provision of security IT and services to CGI Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
27 Nov 2014
BSI urges UK businesses to bolster cyber security
UK businesses are at risk of reputational damage due to lack of awareness on how to protect their data assets, BSI research shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Oct 2014
Many firms still unprepared for cyber attack, EY survey shows
More than a third of organisastions have no real-time insight on cyber risks necessary to combat rising threats, a survey has shown Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Oct 2014
Cloud providers rush to build European datacentres over data sovereignty
Cloud providers IBM and Google build datacentres in the EU as enterprises insist on keeping their data in Europe Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
E-Zine
27 Oct 2014
Securing critical industrial systems
In this week’s Computer Weekly, we examine the security threats to the industrial control systems that power the UK’s critical national infrastructure, and ask what can be done to better protect them. We look at the key considerations when choosing an infrastructure as a service supplier. And we compare six of the top hybrid flash array products from the leading storage hardware providers. Read the issue now. Continue Reading
-
News
15 Oct 2014
Cyber security failing in execution, says ex-US cyber czar
Cyber security suffers from a lack of execution, former White House cyber security co-ordinator Howard Schmidt has said. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Oct 2014
Azure CTO Mark Russinovich's top ten public cloud security risks
Microsoft Azure cloud CTO Mark Russinovich identified ten key security risks of public cloud services Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
News
08 Oct 2014
Malware being used to steal cash from ATMs
Criminals are using malware to steal cash from ATMs without debit and credit cards Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
E-Zine
06 Oct 2014
The future of digital government in the UK
In this week’s Computer Weekly, as the last political party conferences before the election come to an end, we examine the future of digital government in the UK, featuring interviews with Whitehall’s digital chief Mike Bracken and Labour’s policy leader Chi Onwurah. Also, we look at the growth of the open-source cloud computing platform Openstack, and find out what it’s like to be on the receiving end of a data breach. Read the issue now. Continue Reading
-
E-Zine
03 Oct 2014
CW Europe - October 2014 Edition
BYOD policies: What’s allowed and what’s banned? As IT departments still try to come to terms with the notion of BYOD, CW Europe takes a look at what policies are being implemented to keep security under control. Continue Reading
-
E-Zine
29 Sep 2014
Hacking IT from the inside
In this week’s Computer Weekly, car giant Daimler talks about its IT security strategy and the benefits of having its own in-house hacking team. App developers are under fire for collecting too much personal data – we examine the latest best practice. Our new buyer’s guide looks at virtualisation backup. And our review of Microsoft’s Surface Pro 3 tablet asks whether it can replace the laptop. Read the issue now. Continue Reading
-
News
26 Aug 2014
Local authorities can improve data protection, says ICO audit
There is room for improvement in how local authorities protect personal data, says an audit report by the ICO Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Aug 2014
Load balancing supports Kent County Council's VDI project
Kent County Council picks Kemp Technologies load balancers to support a deployment of VMware Horizon View and Workspace across its estate Continue Reading
By- Alex Scroxton, Security Editor
-
News
14 Jul 2014
Info sharing key to cyber defence, says financial services firm
Threat information sharing is key to success in combating cyber attacks, says the Depository Trust and Clearing Corporation Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Jul 2014
Barclays passes government’s ‘internet-born threat’ test
Barclays Bank has been awarded the government’s cyber security certificate for digital banking services after independent tests of services such as Pingit Continue Reading
-
E-Zine
22 Apr 2014
Adapting to life after Heartbleed
In this week’s Computer Weekly, we investigate the most significant flaw in recent history to impact the internet. The Heartbleed bug in OpenSSL leaves millions of internet servers vulnerable to attack. Hackers have already exploited Heartbleed to steal passwords from the Mumsnet parenting site. What can websites do to foil future attacks? Continue Reading
-
News
04 Apr 2014
Cabinet Office vetoed Home Office plans for 'critical' e-Borders replacement
Home Office plans for IT systems to replace ageing border security systems that contain “critical vulnerabilities” were vetoed by the Cabinet Office Continue Reading
By- Bryan Glick, Editor in chief
-
Feature
14 Mar 2014
Hacktivism: good or evil?
IT lawyer Dai Davis looks at the rise of hacktivism and its impact on business and international politics Continue Reading
By- Dai Davis, Percy Crow Davis & Co
-
News
04 Mar 2014
IT Security Salary Index (UK)
Are you being paid the right rate for the job? Check out this IT Security salary index from Acumin. Continue Reading
-
News
26 Feb 2014
Indian CISOs to develop more business skills to succeed
Organizations require Chief Information Security Officers (CISOs) to be much more than just a technical expert but also possess business skills in today’s growing technology driven Indian market Continue Reading
By- Shaleen Sinha
-
News
19 Feb 2014
UK firms see 1,000+ internal data breaches a day, study finds
Internal threats are not a high priority for UK firms despite more than 1,000 internal data breaches a day Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Feb 2014
Bank of England publishes Waking Shark II cyber security exercise results
Bank of England publishes the results of its Waking Shark II security exercise, which tested financial institutions' contingency plans for cyber attack Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
17 Jan 2014
Internet at risk of 'cybergeddon' says WEF
Internet is at risk of fragmenting amid concerns over spying and cyber crime, says World Economic Forum Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
14 Jan 2014
Top European IT initiative to support business in 2014?
Expanding IT to support business growth is one of the biggest areas of focus for IT departments in 2014, so what does this mean? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Jan 2014
Security considerations for UK enterprises
This Research Snapshot from Vanson Bourne looks at IT security spending trends, awareness of cyber-threats, and the factors perceived as the biggest security risks for organisations. Continue Reading
-
News
07 Jan 2014
Security Think Tank: Information security strategy should support the business
How should Edward Snowden's revelations about the NSA and GCHQ influence future information security strategies in the UK? Continue Reading
By- Adrian Davis, (ISC)²
-
News
30 Dec 2013
Bank robberies down 90% thanks to technology, says report
Robberies at British banks have fallen by over 90% in two decades, according to a report by the British Bankers’ Association Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
E-Zine
16 Dec 2013
Can BlackBerry restore its business appeal?
In this week’s issue of Computer Weekly, we examine whether former Sybase chief, John Chen, will be able to stem the decline of BlackBerry and reinvent the the smartphone maker as a software business for the “bring your own device” (BYOD) era. Our buyer’s guide to the internet of things concludes with a look at how universal connectivity will yield insights in fields as diverse as aviation and hospitality. And we analyse Google’s attempts to compete with Amazon Web Services in public cloud. Continue Reading
-
News
04 Dec 2013
Proof-of-concept malware jumps air gap with sound card
Researchers demonstrate proof-of-concept malware exfiltrating data using high-frequency transmissions inaudible to humans Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Dec 2013
The Guardian denies Snowden stories damaged national security
Guardian editor Alan Rusbridger defends decision to publish stories on documents leaked by whistleblower Edward Snowden Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Dec 2013
UK proposes formal talks on cyber security with China
Prime minister David Cameron has called on China to be more open about cyber security Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Nov 2013
EU calls on US to rebuild trust in post-Snowden era
The EC has called on the US to provide guarantees to restore trust in the wake of spying revelations Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Nov 2013
European Parliament closes Wi-Fi after man-in-the-middle attack
A number of mailboxes have been compromised and users’ smartphones could be at risk following a man-in-the-middle attack on the European Parliament’s public Wi-Fi Continue Reading
By- Jennifer Scott, TechTarget
-
News
26 Nov 2013
FTSE 350 firms complete cyber risk assessment
Most FTSE 350 companies put cyber risk on the board agenda, but many need to improve how they manage that risk Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Nov 2013
Facebook authentication - Like?
As Cisco teams up with Facebook to offer authentication for public Wi-Fi, is this option safe for businesses? Continue Reading
By -
News
12 Nov 2013
Mass surveillance a bad idea, says Information Commissioner Christopher Graham
Information Commissioner Christopher Graham says issues of national security must not overshadow concerns of legitimate public interest Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Nov 2013
Global profiles of the fraudster
Computers, rather than conmen, are set to be the future face of fraud, as criminals turn to robotics in an effort to avoid detection, this report from KPMG reveals. Continue Reading
-
News
29 Oct 2013
Analysis: RSA says security needs to change, but what does that mean?
RSA executive chairman Art Coviello has issued a call to action to the security industry to improve technology and collaboration Continue Reading
-
News
15 Oct 2013
The ICO issues BYOD warning after breach
The ICO is calling on organisations to ensure data protection policies reflect how employees are using personal devices for work Continue Reading
By- Warwick Ashford, Senior analyst
-
Photo Story
15 Oct 2013
10 security reasons to upgrade to iOS 7
Even if it did not include numerous security fixes, iOS 7 has compelling reasons for corporates to adopt it to improve their security Continue Reading
By- Rob Buckley
-
News
14 Oct 2013
Is India’s cyber policy all words and no action?
The Indian government is trying to strengthen cyber security with the new cyber policy, but little is yet understood about how the ambitious proposals will be put in place Continue Reading
By- Viraj V Desai
-
Opinion
03 Oct 2013
Privacy concerns in the digital world
Considering the full spectrum of privacy, people need to ask themselves if they are comfortable with all their characteristics in the public domain Continue Reading
By- Yves Le Roux, (ISC)2
-
News
19 Sep 2013
NSA reveals how Snowden accessed secret Prism files
Prism whistleblower Edward Snowden accessed secret documents through a file-share, the NSA has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Sep 2013
NSA and GCHQ unlock online privacy encryption
UK and US intelligence agencies have unlocked the technology used to encrypt online services, including email, online banking and medical records. Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
05 Sep 2013
Windows 2012 Server Network Security
This book chapter offers an introduction to Windows 8 and Windows Server 2012 network security and IPv6. It includes a 30% discount code for Computer Weekly readers. Continue Reading
-
News
05 Sep 2013
Windows Server 2012 Security from End to Edge and Beyond
This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask. Continue Reading
-
News
05 Sep 2013
Printing: a false sense of security?
Louella Fernandes and Bob Tarzey show how secure printing technology can provide authentication, authorisation and accounting capabilities, helping businesses improve document security and meet compliance regulations. Continue Reading
-
Photo Story
29 Aug 2013
Rapid7 United 2013 Security Summit
View the pics from Rapid7’s recent security summit in Boston. Continue Reading
By- Kayleigh Bateman, Computer Weekly
-
News
21 Aug 2013
Case study: Keeping it private at Beth Israel Deaconess after the Boston Marathon Attacks
Doctor and healthcare CIO shares his lessons learned from the Boston Marathon attacks and how to protect patient data Continue Reading
By- Kayleigh Bateman, Computer Weekly