Latest News
Judge rejects FBI's bid to hack computer of suspect in attempted cyberheist
A federal court in Houston has rejected an FBI request for a warrant to hack into the computer of a suspect in an attempted cyberheist. read more »
InfoSec: Understanding business goals is key to embedding company-wide security practices
Information security managers need to better align themselves with company business goals help embed security practices in an organisation, according to speakers at InfoSec 2013. read more »
Vulnerable terminal servers could let bad guys hack stoplights, gas pumps
Thousands of older systems, including those used to manage traffic lights, fuel pumps, point-of-sale terminals and building automation can be tampered with because they're insecurely connected to the Internet. read more »
Chinese industrial espionage now a major cause of data breaches, Verizon report finds
Industrial espionage by Chinese “state-affiliated actors” was responsible for one in five data breaches reported to Verizon by customers and through a range of global police forces, the company’s annual Data Breach Investigations Report (DBIR) has found. read more »
Botnets target social networks with spam
Life for a phony profile on Twitter may be short, but it isn't deterring spammers from continuing to work their scams on social networkers, says one security researcher. read more »
more news ..
What people are saying about...
BlackBerry
RT @BlackBerryTH: ปลุก #BlackBerryZ10 ให้ตื่นได้ง่ายๆเพียง สไลด์จากโลโก้ #BlackBerry ขึ้นไปด้านบนครับ http://t.co/exWUElF8hr
I'm playing #THKLive on #BlackBerry at a $5K table.
#BlackBerry Q10 Gets Keyboard Optimised #Skype and #WhatsApp | TechWeekEurope UK http://t.co/lXU4NyjEOK
@G_a_b_s Jajajaja otro que cae!!
#BlackBerry ?? Ni qué fuera albañil
Realising Business Value In The Cloud
Join this live discussion for authoritative content & advice on delivering enterprise applications in the cloud.
Google Nexus series
The latest news, features and slideshows about Google's Nexus series, including the Nexus 4 smartphone and Nexus 10 tablet.
Accelerate Your IT Efficiency
View the latest capacity management resources including white papers, videos and news.
Windows 8
Check out our latest articles on Microsoft's next-generation operating system.
In Depth
Ten tips to win security programme funding
Ask any cyber security specialist what their biggest challenge is, and you will get a variety of answers -- ranging from strengthening network security, to managing internal threats, to protecting against cyber espionage. But upon further investigation, you may be surprised to learn that for manythe biggest challenge is simply getting the funding necessary to carry out a security programme. read more »
Security Manager's Journal: A little housecleaning
Our manager finds the time and opportunity to cross a few nagging items off of his to-do list. read more »
Three simple steps to determine risk tolerance
For Chief Information Security Offiers, in addition to deciding what policies, processes, or technology an organisation should have in place, an even more significant challenge is successfully negotiating disputed risk issues. read more »
Cyber confusion at the heart of Government
Last week the Conservative chairman of the Defence Select Committee took the extraordinary step of writing to the Government to blast its response to the Committee’s recent report on cyber security. James Arbuthnot said the Government exaggerated the amount of money going to the Defence Science and Technology Laboratory’s Cyber and Influence Centre, was not acting quickly enough to secure military supply chains and were basically passing the civil cyber security buck. read more »
Security Manager's Journal: Spam makes a comeback
Out of the blue, phishing attacks previously caught in the spam filter are getting through to employee inboxes. read more »
more in depth ..Editor's Pick
Box brings in Yahoo! CISO to build trust
Researchers warn malware targeting online stock trading software
Barclays tackles complex regulatory environment with Splunk
DDOS attacks increased in number and size this year
Most Popular in Security
Ten tips to win security programme funding
CIO for Los Angeles World Airports outlines ten essential tips for getting your financial team on board with your security funding requests
15 free security tools you should try
Here are some of the best-known free security tools you can try inside your own network
Security Manager's Journal: A little housecleaning
IT risk assessment frameworks: real-world experience
How to manage information security risks
Chinese industrial espionage now a major cause of data breaches, Verizon report finds
'State-affiliated actors' looking for IP
How to hack an iPad
Prevent access with a four-digit PIN code or beware - your device can be hacked!
12 useful websites for IT security
From Microsoft and Cisco to the National Institute of Standards and Technology, we look at some of the most useful IT security websites
BT security chief: We are ‘struggling and overly conservative’ on BYOD and cloud
Jill Knesek was speaking this week at CA’s annual conference in Las Vegas
White Papers
Avoiding the 7 Deadly Sins of IT Security
Prevention is more important than detection read more »
What Do You Mean My Cloud Data Isn’t Secure?
Understanding your level of data protection read more »
more white papers ..Blogs
more blogs ..Also in slideshows :
ComputerworldUK Poll
Solution Centres
Business IT Hub
View the latest exclusive content, including interactive video, opinion and whitepapers Read more...
HP Data Protection Zone
HP Data Protection Zone is your source for software downloads, video, whitepapers and news on how you can keep your business data safe. Read more...
Accelerate Your IT Efficiency
View the latest capacity management resources including white papers, videos and news.
















