Read more about related IT security topics:
- Secure Coding and Application Programming
- Cloud security
- Data Breach Incident Management and Recovery
- Risk management
- Network Security Management
- Data protection
- Compliance Regulation and Standard Requirements
- Security policy and user awareness
- Web Application Security
News: Endpoint security
July 06, 2015
Gemalto’s M2M unit is developing an ambitious project with agricultural science firm Eltopia and the University of Minnesota. The objective: to save the honeybee from extinction
July 03, 2015
Bobbejaanland, one of the largest theme parks in Belgium, is using a Fortinet Wi-Fi network to offer visitors access on the go, and improve its management capabilities
June 29, 2015
Cisco unveils 15 products to address the growing complexity of internet of things deployments
June 24, 2015
Security updates for Adobe Flash Player for Windows, Macintosh and Linux address vulnerability CVE-2015-3113 that allows attackers to control the system
In Depth: Endpoint security
A small business owner tells the story of how a cyber attacker nearly brought down her firm, and the expert who helped her highlights the lessons learned Continue Reading
As network hardware supplier Huawei enters the services game, we consider if the West is ready to buy IT services from China Continue Reading
Steps remote and mobile workers can take to improve cyber security on mobile devices, using public Wi-Fi and computers, and handling USB devices Continue Reading
Opinion: Endpoint security
The report of the Intelligence and Security Committee was like a piece of bad theatre Continue Reading
Email is one of the earliest services created on the internet and, arguably, remains the most important Continue Reading
With users increasingly taking IT decisions into their own hands, businesses need to try harder to keep up Continue Reading
Photo Stories: Endpoint security
The life of Alan Turing is being celebrated on the big screen this month. The Imitation Game from Studio Canal opens on November 14th 2014 and tells the story of the war hero who’s achievements until recently were largely unknown.
Computer Weekly research reveals the IT spending priorities for UK and European organisations in 2014.
How to secure Mac OS X Server using global password policies and data loss prevention
Videos: Endpoint security
In this CW500 video, Martijn Verbree, Director of Information Protection, KPMG, discusses the growing challenges of expanding access management to third parties and avoiding the potential pitfalls.
In this CW500 Club video, Christoph Burtscher, CEO, Be2Change Consultancy, talks to Computer Weekly editor in chief Bryan Glick about the challenges of IT governance in an era of shadow IT.
In this CW500 Security Club video, Ray Cabrera, Security and Compliance Manager, Lebara Mobile, talks about the emerging challenges of endpoint security and how organisations can ensure data is safe.