Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by William Knight.
Infosecurity | 2008
William Knight
Mobile devices can keep business ticking over when human diseases strike, but the devices have viruses of their own, finds William Knight
Infosecurity | 2008
William Knight
On 14 February 2008 the UK and Chip and PIN will celebrate their second anniversary. William Knight asks what has been learnt about the technologys fidelity
Infosecurity | 2009
William Knight
Ethical hacking seems to be a contradiction in terms, but what better way of making enterprises pay attention to their security flaws, than by acting like criminals? William Knight investigates
Infosecurity | 2009
William Knight
With 200 million internet users in China, and a predicted annual growth rate of 17% for the information security market until 2013, why would security vendors want to go anywhere else?
Infosecurity | 2009
William Knight
Virtualisation is a welcome medicine for many of ITs irritating symptoms. But is there a risk that basic hygiene will suffer as a result? William Knight investigates
Infosecurity | 2009
William Knight
Sometimes considered more an irritant than prophylactic, has the traditional anti-virus file checker been assigned to the recycle bin of computer history? William Knight scratches beneath the surface to ask where all that scanning technology will end up
Infosecurity | 2009
William Knight
Once poison found only in email accounts, spam is now polluting every form of electronic communication from IM to SMS and from blogs to tweets. But how well is it doing outside its natural domain? William Knight takes a look at non-email spam
Infosecurity | 2008
William Knight
We all want cheaper security solutions, but is commoditisation of the anti-malware industry supporting enough innovation to win the arms race with malware writers? Are we so busy swatting flies that we cannot afford to research ultimate weapons? William Knight takes a look
Infosecurity | 2008
William Knight
VoIP is inevitable. Even if your organisation has not yet adopted the system, you will be making VoIP calls in one way or another before very long. But should we be concerned? William Knight investigates
Infosecurity | 2008
William Knight
Usability and context are often more important than the absolute effectiveness of authentication. Its why the simple password refuses to die, reports William Knight