Security technology

Security vs performance

balance566
Imposing security from above can make IT the ‘Department of No’, writes John Leonard, meaning it’s important to strike the right balance
21 Jul 2014

Blackphone: BlackBerry 'compromised its integrity' in security years ago, and has no right to criticise us

blackphone-demo
Super-secure smartphone maker describes BlackBerry’s criticism as 'slinging mud'
17 Jul 2014

Connecting risk management to cyber security

Connected security
Danny Palmer investigates how businesses can protect themselves against uncertain cyber threats in light of the increasing number of connected devices in the world
14 Jul 2014

Biffa still using Windows XP across the company, 'no business case' for Windows 7 says IT director

Migration planned, but firewalls are enough for now says David Gooding
09 Jul 2014

The smartphone as universal access device

Entrust's Mark Reeves talks mobile authentication and access management to the Enterprise Security and Risk Management Summit
01 Jul 2014

Advanced Persistent Threats 'absolutely exist' says Palo Alto Networks

'This kind of thing is happening all the time now' says systems engineering manager Sherlow
01 Jul 2014

BBC board wary of security projects, says info security manager

'It’s all about reputation, availability and staying on the telly' reveals Cooper
01 Jul 2014

No more castle building - enterprise security and risk management

Research for Enterprise Security & Risk Management Summit 2014 finds IT moving away from a protect-at-all-costs mentality
01 Jul 2014

Ten per cent of IT leaders deliberately compromise on security

Computing Research finds troubling holes in data centre security.
01 Jul 2014

Android is secure for business, says Samsung enterprise mobile director

Samsung director of enterprise mobile Phil Lander tells Computing that business users shouldn't have security fears over Android devices
26 Jun 2014

If you can’t get business done, tight data centre security is worthless, warns Trend Micro

Think about the application of technology as well as the capability, says VP of cloud
17 Jun 2014

Enterprise Mobility Summit 2014: Complete MDM solutions 'will not be available from any single vendor' says BlueCat CTO

'There's something fundamentally wrong with the market definition' says Wertkin
13 Jun 2014

Google must prevent illegal access to our content, says News Corp

Phone-hacking media giant unhappy about with Google search algorithms that let downloaders 'steal' its TV shows
09 Jun 2014

Enterprise Cloud Forum: Almost half of enterprises 'prehistoric' with respect to BYOD, says Oracle security VP

'We need a whole new industry to prevent us slowing down' says Hartwell
27 May 2014

Blitzkrieg - changing tactics in the email security wars

Agari CEO Patrick Peterson explains how attackers go in under the radar
23 May 2014

German government will no longer deal with companies who give data to NSA

Meanwhile, Harvard and MIT students devise 'NSA-proof' email service
19 May 2014

CISOs of top firms suggest strategy changes for security teams

Security leaders from the likes of Coca-Cola, eBay and Walmart urge security teams to "look three years ahead"
14 May 2014

Infosec 2014: What did we learn?

Join Computing staff for a discussion on our main takehomes from this year's conference
02 May 2014

UK Border Force IT glitch causes overnight travel hell

Reported disruptions included Heathrow, Gatwick, Stansted, Birmingham
01 May 2014

Infosec 2014: BlackBerry customers showing “tremendous interest” in new BES migration scheme

Expects scheme to be "very successful", according to BlackBerry VP
30 Apr 2014

Why the enterprise must ensure it has a proper security policy

In today's connected world a business must ensure that its mobile and web-based software is secure. This means that application security needs to be a core competence in any organisation's security strategy
15 Apr 2014

Microsoft Build 2014: Windows 8 Phone security protocol “many, many years old” and full of bugs, admits Phone 8.1 security manager

“And our OEM partners are still our biggest weakness,” says Geir Olsen
04 Apr 2014

Microsoft Build 2014: Microsoft announces MDM-friendly Windows Phone 8.1, and new devices from Qualcomm and Prestigio

Per-app management, enterprise profiles and an AI assistant all coming
02 Apr 2014

Google to encrypt searches in response to NSA surveillance claims

Encryption intended to evade snooping by NSA, GCHQ and Chinese authorities
13 Mar 2014