6,777 Results for:

  • Sort by: 

Younger employees 'main culprits' for security breaches

21 Jun 2018

UK senior decision makers believe younger workers are the biggest risk to cyber security, but are doing little to support them and reduce that risk, a report reveals Read More

Quicke? No that's not me.

18 Aug 2010

I'm busy collecting the deed poll details just in case any of my social networking activity embarrasses me so much I have to resort to changing my identity. Read More

Businesses urged to prepare for extortion campaigns

21 Feb 2019

C-level executives, lawyers and doctors are the top extortion targets of cyber criminals, a report by researchers tracking thousands of sextortion attempts reveals Read More

Computer Weekly Buyer's Guide to Big Data infrastructure

03 Jun 2013

In this 10-page buyer’s guide, Computer Weekly looks at the mindset and technology businesses need to analyse various forms of data, the low-cost solid state memory powering datastreams from social network feeds ... Read More

Pure Storage all-flash storage ready to zero in on AI and cloud

27 Aug 2019

Despite selling fewer systems of late, CEO Charles Giancarlo said Pure all-flash arrays remain in demand; FlashBlade AI adoption includes use cases such as life sciences and self-driving cars. Read More

Social networks must improve security controls, says Gartner

25 Sep 2008

Social network providers should enhance security controls available to users and businesses, says analyst firm Gartner. Read More

O2 powers customer-centric network with Nokia AI

15 Jan 2019

Mobile operator O2 claims Nokia’s AI-driven Service Operation Center platform will help it anticipate its customers’ problems before they know they have problems Read More

Zuckerberg calls for new internet regulation

01 Apr 2019

Facebook chief calls for new internet regulation in four key areas to define clear responsibilities for people, companies and governments, including more GDPR-aligned data protection rules Read More

How can IT address mobile device security risks?

12 Dec 2018

Mobile threat defense, when paired with EMM, can enhance a security strategy. Here's why an on-device security platform is necessary for today's mobile threat landscape. Read More

Computer Weekly Buyer's Guide features list 2019

06 Dec 2018

Here is our 2019 schedule of up-and-coming in-depth articles that will cover carefully selected topics to help IT leaders select the right technology for their organisation Read More