Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where William Knight is active.

Publication


Featured researches published by William Knight.


Infosecurity | 2008

Technology: Coughs and sneezes spread diseases

William Knight

Mobile devices can keep business ticking over when human diseases strike, but the devices have viruses of their own, finds William Knight


Infosecurity | 2008

Technology: The price of love

William Knight

On 14 February 2008 the UK and Chip and PIN will celebrate their second anniversary. William Knight asks what has been learnt about the technologys fidelity


Infosecurity | 2009

R&D: License to hack

William Knight

Ethical hacking seems to be a contradiction in terms, but what better way of making enterprises pay attention to their security flaws, than by acting like criminals? William Knight investigates


Infosecurity | 2009

Zone: Information security in China: A license to print money

William Knight

With 200 million internet users in China, and a predicted annual growth rate of 17% for the information security market until 2013, why would security vendors want to go anywhere else?


Infosecurity | 2009

R&D: High noon for virtualisation

William Knight

Virtualisation is a welcome medicine for many of ITs irritating symptoms. But is there a risk that basic hygiene will suffer as a result? William Knight investigates


Infosecurity | 2009

Technology: The evolution of AV

William Knight

Sometimes considered more an irritant than prophylactic, has the traditional anti-virus file checker been assigned to the recycle bin of computer history? William Knight scratches beneath the surface to ask where all that scanning technology will end up


Infosecurity | 2009

Technology: Spamming the socially active

William Knight

Once poison found only in email accounts, spam is now polluting every form of electronic communication from IM to SMS and from blogs to tweets. But how well is it doing outside its natural domain? William Knight takes a look at non-email spam


Infosecurity | 2008

Technology: Strength in numbers

William Knight

We all want cheaper security solutions, but is commoditisation of the anti-malware industry supporting enough innovation to win the arms race with malware writers? Are we so busy swatting flies that we cannot afford to research ultimate weapons? William Knight takes a look


Infosecurity | 2008

R&D: A little less conversation, a little more security please

William Knight

VoIP is inevitable. Even if your organisation has not yet adopted the system, you will be making VoIP calls in one way or another before very long. But should we be concerned? William Knight investigates


Infosecurity | 2008

Technology: The right tools for the job

William Knight

Usability and context are often more important than the absolute effectiveness of authentication. Its why the simple password refuses to die, reports William Knight

Collaboration


Dive into the William Knight's collaboration.

Researchain Logo
Decentralizing Knowledge