Active Directory, AS/400, Backup, Business Intelligence, Career Development, CIO, CRM, Data Management, Database, DataCenter, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Networking, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
Branded vulnerability marketing, such as in the case of Badlock, can raise challenges for responsible disclosure. Expert Nick Lewis explains the problems it creates.
Windows AppLocker lets you use rules to whitelist or block applications based on attributes such as publisher or path, but it's not a comprehensive application control tool.
Many organizations use a risk-based framework to help manage their cybersecurity program. Expert Mike O. Villegas discusses the development and benefits of current frameworks.
The COMS Group has opted for re-branding as it looks to grow its presence in the smart buildings market
Roundup: Microsoft EMET is vulnerable to exploit; it's time to update to v5.5.Plus; Dell, IBM and Gemalto research reports claim cybercriminals are getting smarter, bigger and faster.
The UK IT sector reacts with alarm, tempered by a calm pragmatism, to the British Referendum verdict to leave the European Union. Reporting by the Computer Weekly team
The majority of Asean business leaders acknowledge they lack a complete digital strategy, despite most believing it is important to have an agile, data-driven business
Enterprise cloud workloads can be better secured by using microsegmentation. Ed Moyle explains the best ways to plan and execute a segmentation strategy.
Inmates in Finland’s prisons will no longer need to use cash as a pre-paid card system is rolled out
Nick Booth highlights Germany’s top big data start up which could have a real impact in the UK channel.