Network security strategy
-
News
05 Dec 2025
Cloudflare fixes second outage in a month
A change to web application firewall policies at Cloudflare caused problems across the internet less than three weeks after another major outage at the service, but no cyber attack is suspected Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Dec 2025
Black Hat MEA: Saudi Vision 2030 fuels surge in cyber security innovation
Global cyber firms are racing to support the Kingdom’s mega-projects, but building trusted partnerships remains key, says Exabeam CEO Pete Harteveld Continue Reading
By- Andrea Benito , Computer Weekly
-
News
20 Mar 2013
Case study: Hamilton Fraser embraces BYOD with MobileIron
How insurance firm Hamilton Fraser is using MobileIron to enable employees to bring their own devices while following company policy Continue Reading
By- Jennifer Scott, TechTarget
-
News
18 Mar 2013
Underexposed risks of public Wi-Fi hotspots
This article in our Royal Holloway Information Security series assess the hidden security risks of public Wi-Fi hotspots. Continue Reading
— ComputerWeekly -
News
01 Feb 2013
Computer Weekly User Awards
The deadline for the Computer Weekly European User Awards for Networking has been extended to 8th February. Get the recognition you deserve! Continue Reading
— computerweekly.com -
News
25 Oct 2012
ICO hits Stoke-on-Trent City Council with £120,000 fine
Stoke City Council has breached the Data Protection Act, for the second time in two years, after details of a child protection legal case were emailed to the wrong person. Continue Reading
By- Jennifer Scott, TechTarget
-
News
22 Oct 2012
Cyber attacks launched at London 2012 Olympic Games every day
The IT supporting the London 2012 Olympics was hit by cyber attacks every day during the Games, says London 2012 CIO Gerry Pennell Continue Reading
By- Bryan Glick, Editor in chief
-
News
17 Oct 2012
ZTE targets local government for UK growth
Despite security controversy, Chinese firm ZTE’s UK head of sales tells Computer Weekly one of its first targets will be local government Continue Reading
By- Jennifer Scott, TechTarget
-
News
16 Oct 2012
Organisations need alternative data protection as security models fail
Organisations' security models are failing - so could it be time to adopt an intelligence-led approach to data protection and fighting cyber crime? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Oct 2012
Patchy uptake hinders Public Service Network roll-out
Key players involved in deploying the Public Service Network (PSN) say progress is being made, but different approaches are slowing it down Continue Reading
By- Jennifer Scott, TechTarget
-
News
11 Sep 2012
Gartner: Prepare for context-aware security
Cloud computing, IT consumerisation and the evolving threat landscape are forcing IT departments to rethink security Continue Reading
By- Cliff Saran, Managing Editor
-
News
24 Aug 2012
VMware users can protect against virtual machine malware, says Trend Micro
New malware that attacks VMware virtual machines is no cause for undue concern, but users can take basic steps to protect data, says Trend Micro Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Aug 2012
The Olympics in technology stats
Computer Weekly takes a look at how we experienced “the most connected Games ever” with our round-up of key technology stats Continue Reading
By- Kathleen Hall, TechTarget
-
News
26 Jul 2012
Australian telco AAPT confirms Anonymous data breach
Australian telecoms firm AAPT confirms business customer data was breached by hacktivist group Anonymous at an external service provider Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Jul 2012
Many global firms unaware of online risk, finds KPMG
Many global organisations could do a lot more to protect their private data and reduce exposure to attacks by hackers, according to KPMG Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Jul 2012
Government-sponsored hackers target commercial secrets
Government-sponsored organisations are increasingly turning to hacking techniques to steal commercial secrets from businesses, KPMG has warned Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
16 Jul 2012
Sophos combines endpoint security and UTM
Security firm Sophos combines endpoint protection and unified threat management (UTM) products into a single physical or virtual appliance Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Jul 2012
Special Report on Cisco
This special seven-page report from Computer Weekly analyses the challenges facing Cisco, its financial performance, the services it offers, its place in the IT market and its future strategy. Continue Reading
— ComputerWeekly.com -
Opinion
11 Jul 2012
The history of the next-generation firewall
Security expert Rik Ferguson explains how next-generation firewalls were developed and what protection they provide businesses. Continue Reading
By- Rik Ferguson
-
Opinion
09 Jul 2012
Tackling the challenges of the next-generation firewall
Security expert Brian Honan shares top tips on installing and maintaining a next-generation firewall Continue Reading
By- Brian Honan
-
News
04 Jul 2012
BT extends cyber security agreement with MoD
BT is to extend its cyber security agreement with the Ministry of Defence (MoD) in a deal to expand its cyber defence service Continue Reading
By- Warwick Ashford, Senior analyst
-
Answer
28 Jun 2012
Securing big data: Architecture tips for building security in
Expert Matt Pascucci advises a reader on securing big data with tips for building security into enterprise big data architectures. Continue Reading
-
News
27 Jun 2012
Network security: Is new technology bypassing traditional controls?
Network security practices are among the most mature, but can businesses be sure network traffic is not sneaking past traditional controls? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Jun 2012
FTC sues Wyndham Worldwide hotel group over data breaches
The US Federal Trade Commission (FTC) is suing hotel group Wyndham Worldwide over claims it failed to secure customer data Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Jun 2012
Flame malware gets kill command
The controllers of Flame, the most powerful cyber weapon discovered to date, have recently sent a kill command that removes the malware from some infected computers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Jun 2012
Top 10 tips for IPv6 security
Many organisations are being misled about the complexities surrounding IPv6 security, according to security firm Stonesoft Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 May 2012
Security researchers discover powerful cyber espionage weapon 'Flame'
Security researchers have discovered a cyber espionage weapon, dubbed 'Flame', with a functionality greater than any other known threat Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 May 2012
Mobile threats demand focus on data protection, says Websense
Business needs to focus on data protection as cyber criminals turn to mobile malware, says Websense. Continue Reading
-
News
30 Apr 2012
Half of UK networks vulnerable to APTs
Many UK corporate networks are vulnerable to advanced persistent threats (APTs), a survey has revealed. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
24 Apr 2012
2012 Information Security Breaches Survey
Security breaches cost the UK billions over the last 12 months as cyber attacks reached record levels. Continue Reading
— computerweekly.com -
News
01 Mar 2012
RSA 2012: IT security experts urge enterprises to ban smartphone BYOD schemes
Enterprises should ban employees from using their own smartphones for work, a panel of IT security practitioners told the RSA Conference 2012 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Feb 2012
Does the PSN need to happen before the cloud?
The deployment of public services networks (PSN) will need to happen before widespread uptake of CloudStore services occur, IT heads said at a roundtable meeting. Continue Reading
By- Kathleen Hall, TechTarget
-
News
29 Dec 2011
Networking 2012: Vendors predict what's ahead for the industry
Senior vendor executives offer SearchNetworkingUK their Networking 2012 predictions for the challenges ahead, including addressing the transition to a mobile workforce. Continue Reading
By- Joe Fernandez, News Editor
-
News
13 Dec 2011
Network reliability to win over innovation in 2012, says Cisco survey
Cisco’s first TechWatch 2012 report finds network reliability as opposed to innovation or performance is the most important factor for network architects in the new year ahead. Continue Reading
By- Joe Fernandez, News Editor
-
Tutorial
14 Oct 2011
vSwitch best practices: Know what powers your virtualised network
Virtual switches in a virtualised network offer high agility, yet potential management and design issues as well. These vSwitch best practices explore those problems and solutions. Continue Reading
By- Rachel Shuster, TechTarget
-
News
22 Aug 2011
Unified network management: Wired and wireless together for good?
With an integrated network management vision, two organizations improved security and reliability, and have made steps towards a fully integrated network. But will we get there? Continue Reading
By- Lynn Haber, Contributor
-
News
17 Aug 2011
Cisco hardening guides for IOS, IOS-XR and NX-OS devices
Patching routing and switching infrastructure in any organisation is often delayed, sometimes due to the potential impact on production systems and sometimes because the IT resources are simply too busy fighting fires. Continue Reading
By- Stephen Gillies, editor
-
News
02 Jun 2011
Using network management and monitoring systems across IT and buildings
Bolton College linked its buildings facilities to the campus network and is using a network monitoring and management system that sees both buildings and IT resources. Continue Reading
By- Tracey Caldwell, Contributor
-
News
10 Mar 2011
Secure remote access enables virtual desktops, mobility
St. Richard’s Catholic College in East Sussex implemented secure remote access to allow mobile access to network resources while rolling out virtual desktop learning tools. Continue Reading
By- Tracey Caldwell
