Backup Collaboration Mobile Security Storage Strategy Virtualisation
ALL | CAD | Cloud Hosting | Construction | Document | Green | Networking | Security | Storage

Article Index: Security>Cloud>(Company)>(Product)>(Editorial)>(Date)      

Sort Articles By :    Most Popular           Latest     

Current Page: 1        | 1 |        146 Article(s)  Total Views of these articles: 292302

You've got mail: a digitised mailroom that's fit for the return to work         

Type: Product Focus       Published: 05-2020      Views: 106   
Description: Working from home is here to stay. Stay connected in the new normal

COVID-19: A new level of threat

Type: Comment       Published: 03-2020      Views: 143   
Description: We are all well aware of the 'enemies at the gate': the hackers and attackers looking for every opportunity to seize data by exploiting weaknesses in your defences. Breaches have reached new heights, with no organisation, however large or small, immune from such assaults

Cloud Protection for Salesforce from F-Secure

Type: Review       Published: 03-2020      Views: 228   
Description: Cloud-based services have caught on fast, offering a range of benefits to organisations of every kind.

Malwarebytes Launches Enhanced Cloud Platform, MSP Premier Partner Program

Type: News       Published: 02-2020      Views: 289   
Description: Simplified dashboards enable easy deployment, reporting and operational control

nCipher unveils cloud-first architecture, bringing security and control to public & private clouds

Type: News       Published: 01-2020      Views: 213   
Description: New web services APIs and container technology streamline integration of nShield HSMs with cloud environments, bringing high assurance security to enterprise cloud migration

Enterprise Mobile Security: How to reduce the cybersecurity threat

Type: Opinion       Published: 12-2019      Views: 641   
Description: Tom Davison, EMEA Technical Director at Lookout examines how modern businesses can scale up their mobile security. As employees using company devices become an ever more attractive target for attack how can companies protect their endpoints?

Forescout Transforms Enterprise-Wide Network Segmentation with Release of Cloud-Based eyeSegment

Type: News       Published: 11-2019      Views: 469   
Description: Forescout eyeSegment ties together fragmented segmentation point solutions in a scalable approach across campus, data centre, cloud and OT
Enables a Zero Trust approach to implementing granular security controls and reducing operational complexity of network segmentation projects

Caught in an endless struggle         

Type: Industry Focus       Published: 11-2019      Views: 432   
Description: Nearly 80% of organisations rank cyber risk as a top-five concern, yet only 11% have a high degree of confidence in their ability to assess cyber threats, prevent cyber-attacks and respond effectively

Over 40% of UK organisations believe they cannot stop cyber attacks

Type: News       Published: 07-2019      Views: 640   
Description: According to a new global survey from CyberArk, 43 percent of UK organisations believe attackers can infiltrate their networks each time they try. As organisations increase investments in automation and agility, a general lack of awareness about the existence of privileged credentials across DevOps, robotic process automation (RPA) and in the cloud is compounding risk.

Leading scale-ups boost cyber security future         

Type: Special Focus       Published: 07-2019      Views: 503   
Description: Twenty fast-growth cyber scale-ups have been accepted on to the first national cyber security growth programme - and they mean business

Malware Malaise

Type: Security Update       Published: 05-2019      Views: 554   
Description: Could it be that new malware features matter less than you might think - and that what really matters is behaviour? Computing Security gets some of the industrys views.

Cyber-attacks: a major global risk

Type: Industry Focus       Published: 05-2019      Views: 516   
Description: By Scott Gordon (CSSP), CMO, Pulse Secure

Rapid7 swoops in         

Type: Market Focus       Published: 05-2019      Views: 1327   
Description: Rapid7 has acquired NetFort, which provides end-to-end network traffic visibility and analytics across cloud, virtual and physical networks

R&S Trusted Gate from Rohde & Schwarz Cybersecurity

Type: Product Review       Published: 05-2019      Views: 1923   
Description: A cybersecurity strategy to address specific threat profiles can be demanding, but central to each one is the protection of data, the most prized asset

Cloud Wars

Type:       Published: 04-2019      Views: 413   
Description: Ever wondered what the operational differences are between multi-cloud, hybrid-cloud and public cloud are? Here are the expert views and insights of those in the know

Multi-factor authentication in six takes         

Type: Opinion       Published: 03-2019      Views: 728   
Description: Your organisation is going down the multi-factor authentication path, but how does it know it's the right one? Adrian Jones, CEO of Swivel Secure, offers some insights into solving that challenge

The certainty of uncertain times ahead         

Type:       Published: 01-2019      Views: 691   
Description: Computing Security asks those in the know to do some future-gazing and give us their top predictions for cybersecurity in 2019. Here's what they have to say

Cloud adoption: a blessing, not a curse, for IT security         

Type: Masterclass       Published: 01-2019      Views: 903   
Description: Nigel Hawthorn, data privacy expert at McAfee, and Charlotte Gurney, marketing manager at Brookcourt Solutions, consider how cloud can be the most secure environment for business, despite increasingly sophisticated threats and growing cybercriminal interest

Cloud sinks lower         

Type: Feature       Published: 01-2019      Views: 500   
Description: 'Cloud' has been all the rage for some time now, but its predominance has been challenged of late. Might its status have to be re-evaluated somewhat?

The quantum threat to cybersecurity         

Type: Opinion       Published: 01-2019      Views: 818   
Description: By Rodney Joffe, SVP and Fellow, Neustar, and Chairman of the Neustar International Security Council (NISC)

An IT hierarchy of needs         

Type: Masterclass       Published: 11-2018      Views: 656   
Description: Charlotte Gurney, Marketing Manager, Brookcourt Solutions, opens a window on Enterprise DNS - a platform which enables a wide range of business transformation

Always on - always exposed

Type: Feature       Published: 11-2018      Views: 610   
Description: With always-connected mobile users everywhere and so many organisations turning to the cloud, exposure to threats is a given at any moment

Cloud Security Solution of the Year Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 498   
Description: WINNER: AlienVault - USM Anywhere

Pen Testing Solution of the Year Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 476   
Description: WINNER: Redscan - Redscan Pen Testing

Building a solid foundation for security in the Cloud         

Type: Opinion       Published: 09-2018      Views: 952   
Description: Dealing with cloud environments all comes down to understanding, assessing and balancing risk, as Javvad Malik, security advocate, AlienVault, explains

Fine-tuning the cloud         

Type: Feature       Published: 09-2018      Views: 769   
Description: Will Secure Access Orchestration solutions that holistically manage the overall multi-cloud environment overcome fears around security issues?

United - and threatened         

Type: Feature       Published: 09-2018      Views: 770   
Description: The Internet of Things turns information into actions that create new capabilities, richer experiences and real economic opportunity. But beware of the 'dark side'

The fight against mal-adjustment!         

Type: Opinion       Published: 07-2018      Views: 703   
Description: How do you stop malicious applications from entering the network? Computing Security asks Mikko Rntynen, director of product marketing at F-Secure, for his thoughts

Data security for your mobile workforce         

Type: Industry View       Published: 07-2018      Views: 763   
Description: We live in a flexible, mobile world that is constantly reinventing itself. Paul Norbury, Chief Executive, Cardwave Services, steps inside for a closer view

Securing the Cloud: The future of Authentication         

Type: Opinion       Published: 07-2018      Views: 731   
Description: Neil Langridge, Marketing Director, e92plus, offers his insights on a massive data security challenge that's now facing organisations everywhere

A meeting of minds         

Type: Events       Published: 07-2018      Views: 719   
Description: Infosecurity Europe brought together a vast array of international exhibitors and almost 20,000 visitors for an action-packed three days at Olympia london

Time to share the pain         

Type: Feature       Published: 07-2018      Views: 4017   
Description: Is the cloud right for everyone? That, says one leading observer, is the wrong question. "Like any evolutionary development, it's our current reality." But woe betide those who fail to take every security measure along the way

My1Login Enterprise IAM         

Type: Product Review       Published: 07-2018      Views: 853   
Description: With the GDPR (General Data Protection Regulation) now in force, it's never been more important for businesses to have a robust identity and access management (IAM) solution in place

Damage limitation         

Type: Analysis       Published: 07-2018      Views: 686   
Description: Analysis suggests that the takedown of a single cloud provider could cause $50 billion to $120 billion of economic damage

Exponential‐e launches Cyber Security Operations Centre

Type: News       Published: 05-2018      Views: 895   
Description: Exponential‐e, the British cloud and network provider, has launched its Cyber Security Operations Centre (CSOC) with a view to making defence in‐depth the default standard for the mid‐market.

Security Management Solution from AlgoSec         

Type: Review       Published: 05-2018      Views: 792   
Description: As enterprise networks grow in complexity and move deeper into the cloud, businesses can no longer rely on inefficient and error-prone manual processes to manage their security policies

Authentication failures leave dark hole         

Type: Opinion       Published: 05-2018      Views: 850   
Description: New approaches to cloud access are seen as a way to help alleviate 'dark hole' issues

ForeScout Technologies CounterACT 8         

Type: Review       Published: 05-2018      Views: 804   
Description: Network infrastructures are now in a constant state of flux, forcing enterprises to re-evaluate their security postures

Sun or rain, bring it on!         

Type: Opinion       Published: 05-2018      Views: 3451   
Description: Is the cloud right for everyone? That, says one leading observer, is the wrong question. "Like any evolutionary development, it's our current reality." But woe betide those who fail to take every security measure

New LogMeIn report reveals the harsh realities of endpoint management

Type: News       Published: 05-2018      Views: 758   
Description: LogMeIn has released the findings of a new global report, “Uncovering the Harsh Realities of Endpoint Management: Bridging the gaps in multi-device security” revealing current market trends and business threats driving the need for IT professionals to make endpoint management a priority.

Evolving your security for the cloud         

Type: Analysis       Published: 03-2018      Views: 996   
Description: How does an organisation migrate to the cloud, while keeping security top of mind and staying safe?

Application-Layer DDoS Attacks: Bad Things Come in Small Packages         

Type: Masterclass       Published: 01-2018      Views: 1610   
Description: Distributed Denial of Service (DDoS) attacks come in many flavours. Here, Charlotte Gurney, Marketing Manager, Brookcourt Solutions, considers one in particular

Through the glass, darkly         

Type: Feature       Published: 01-2018      Views: 1162   
Description: Computing Security asked those in the know to do some future-gazing and give us their top predictions for cybersecurity in 2018. Here's what they had to say

75% of organisations report no strategy to manage and secure DevOps secrets

Type: News       Published: 11-2017      Views: 912   
Description: DevOps and security professionals have worrying knowledge gaps about where privileged accounts and secrets exist across the IT infrastructure, according to the first findings to be released from CyberArk’s Advanced Threat Landscape 2018 report. When offered several options ranging from PCs / laptops to microservices, cloud environments and containers, nearly all (99%) failed to identify all places where privileged accounts or secrets exist.

Encryption Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 663   
Description: WINNER: WinMagic

Identity and Access Management Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 775   
Description: WINNER: My1Login

Cloud Security Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 729   
Description: WINNER: Egress Software Technologies - Egress Switch

SME Security Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 701   
Description: WINNER: Winmagic

Enterprise Security Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 702   
Description: WINNER: Arbor Networks - Arbor Cloud

Security Project of the Year - Public / Not for Profit Sector – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 677   
Description: WINNER: Peabody Trust / Egress

Unclouded thinking         

Type: Feature       Published: 07-2017      Views: 1816   
Description: With the financial penalties and loss of reputation facing companies that fall victim to a data breach, moving your private data to an external provider is even more challenging

Managing complexity is the top security challenge highlighted by FireMon’s annual firewall report

Type: News       Published: 05-2017      Views: 1649   
Description: FireMon has released its 3rd Annual State of the Firewall Report that surveyed more than 400 organisations about their current security infrastructure and management challenges as well as adoption and impact of emerging technologies such as SDN, cloud, microsegmentation and the Internet of Things (IoT).

Threat detection - and response         

Type: Feature       Published: 03-2017      Views: 1168   
Description: Many companies' endpoints represent under-secured, unnecessary risks. A new cloud-based service is aiming to help remedy that

The main event         

Type: Event       Published: 03-2017      Views: 1172   
Description: Cloud Expo, Europe's biggest and best attended cloud and digital transformation show took place recently in London's ExCel: Cloud Hosting magazine was there to report back

Offerings that go beyond         

Type: News       Published: 11-2016      Views: 868   
Description: BeyondTrust has expanded its cloud offerings

Partnership promises cloud silver lining         

Type: News       Published: 11-2016      Views: 979   
Description: Niu Solutions has entered into a strategic partnership with Alert Logic to further enhance its security offering in the cloud

More attacks unleashed         

Type: News       Published: 11-2016      Views: 1243   
Description: Akamai Technologies' latest 'State of the Internet/Security Report' (Second Quarter 2016) has highlighted the latest cloud security landscape, specifically trends with DDoS and web application attacks, as well as malicious traffic from bots

Encryption Solution of the Year - Computing Security Awards 2016

Type: Awards       Published: 11-2016      Views: 801   
Description: WINNER: WinMagic - SecureDoc Cloud VM

Network Access Control Solution of the Year - Computing Security Awards 2016

Type: Awards       Published: 11-2016      Views: 745   
Description: WINNER: F5 Networks - Access Policy Manager

Cloud Security Solution of the Year - Computing Security Awards 2016

Type: Awards       Published: 11-2016      Views: 726   
Description: WINNER: Egress Software Technologies - Egress Switch

Advanced Persistent Threat (APT) Solution of the Year - Computing Security Awards 2016

Type: Awards       Published: 11-2016      Views: 777   
Description: WINNER: WatchGuard - APT Blocker

Editor’s Choice - Computing Security Awards 2016

Type: Awards       Published: 11-2016      Views: 744   
Description: WINNER: GhangorCloud - Information Security Enforcer

New Product of the Year - Computing Security Awards 2016

Type: Awards       Published: 11-2016      Views: 688   
Description: WINNER: WinMagic - SecureDoc Cloud VM

Battle for Cloud domination         

Type:       Published: 07-2016      Views: 2376   
Description: The biggest concern in cloud right now is security. According to Oracle executive chairman Larry Ellison: "We need much better security. We need a next-generation of security, because… we are losing a lot of these cyber battles. We haven't lost the war. But we're losing battles."

Compromised credentials         

Type: News       Published: 05-2016      Views: 1253   
Description: What is still the biggest cause of all data breaches? Compromised credentials, claims a new report

Encryption to amaze         

Type: Industry Focus       Published: 05-2016      Views: 2390   
Description: Truly effective encryption that actually protects data wherever it may reside is an absolute must for any business or organisation dealing with sensitive data

Gateway to safety         

Type: Opinion       Published: 03-2016      Views: 1614   
Description: Rarely does a single cloud have the silver lining of offering all the applications that enterprise I.T. needs to deliver... enter Identity and Access Management

Chasing away the turbulent clouds         

Type:       Published: 09-2015      Views: 4631   
Description: Security skills are in limited supply and, as such, cost and retention of security teams can be a significant challenge. this is a major factor now driving the growing race to the cloud – though it’s far from the only one, as computing security reports

CoSoSys in move to secure Macs

Type: News       Published: 09-2015      Views: 1805   
Description: CoSoSys has now released Mobile Device Management (MDM) features for OS X. Organisations incorporating Macs through BYOD or by issuing Mac computers to the employees can now secure confidential data and manage these computers on different levels.

Success at InfoSec         

Type: Events       Published: 07-2015      Views: 3439   
Description: Infosec 2015 bustled and thrived for three days in June at its new London base OF Olympia. Computing Security was there to catch all the action.

Under pressure, taking control         

Type:       Published: 07-2015      Views: 2670   
Description: Managed security services providers may promise the expertise, knowledge and infrastructure you need to secure your information assets from Internet attacks, often at a fraction of the cost of in-house security resources. But does the reality actually live up to the promises?

Symantec names new VP & MD FOR Northern Europe          

Type: News       Published: 07-2015      Views: 2342   
Description: Symantec has further strengthened its growth by appointing industry veteran Keith Bird as vice president & managing director for Northern Europe with responsibility for UK, Ireland and the Nordic region

Advanced integration with cloud storage apps         

Type: News       Published: 07-2015      Views: 1907   
Description: CoSoSys has announced the development of Endpoint Protector 4 to include new integrations with Dropbox for Business and Box to strengthen data security policies and prevent data losses and theft through employee's data transfers made to cloud-based storage applications

Acunetix Online Vulnerability Scanner         

Type: Review       Published: 05-2015      Views: 11234   
Description: In today's competitive global markets, SMBs need to protect their web sites from hackers just as much as enterprises do, but few have the financial resources to ensure they are totally secure

Top 3 data security threats         

Type: Opinion       Published: 05-2015      Views: 2492   
Description: Roman Foeckl, CEO and founder of CoSoSys, offers his insights on how to mitigate threats through a sound data security plan

Gemalto SafeNet ProtectV 2.0         

Type: Review       Published: 05-2015      Views: 7718   
Description: The cost benefits alone make moving virtualised data centres into the cloud a no-brainer, but concerns about security are still a major stumbling block

Staying ahead of threats         

Type: News       Published: 05-2015      Views: 2216   
Description: AlienVault is to work with HP to broaden the reach of cyber threat intelligence sharing

Invisible infrastructure and access management from Cryptzone

Type: News       Published: 04-2015      Views: 1520   
Description: AppGate Secure Access Enables Organizations to Adopt Software Defined Perimeter Approach for Granular Security Control

Negotiating the more slippery slopes

Type:       Published: 01-2015      Views: 1676   
Description: With the average cost of security breaches to large organisations increasing to between £600k-£1.15m* in the last year, the role of the security architect has become critical

Technologies to keep you safe         

Type: Opinion       Published: 01-2015      Views: 2555   
Description: With attacks increasing in frequency and sophistication, which are the technologies that can best protect your organisation? Global analyst Gartner offers some insights.

Cloud gets personal         

Type:       Published: 01-2015      Views: 3214   
Description: IBM has patented the design for a data privacy engine that can help businesses protect personal data as it is shared between countries, including across private clouds.

Seeking out hidden threats         

Type:       Published: 01-2015      Views: 2196   
Description: Predictive analytics is an emerging detection capability that can help security professionals seek out the enemy when they attack their systems.

BAE Systems' silver lining          

Type: News       Published: 01-2015      Views: 1977   
Description: BAE Systems has completed the acquisition of Perimeter Internetworking Corp, which trades as SilverSky, a commercial cyber service provider

What keeps digital leaders awake at night?         

Type: News       Published: 01-2015      Views: 1602   
Description: Security, loss of data and cloud security are the top things that keep digital leaders awake at night, according to a survey from BCS, The Chartered Institute for IT

Cloud Security Solution of the Year - 2014

Type: Awards       Published: 11-2014      Views: 1971   
Description: WINNER: Assuria - Assuria Log Manager MSP

Cloud and the 'Everywhere Enterprise'

Type:       Published: 11-2014      Views: 2281   
Description: The market of public cloud services is expanding rapidly, radically changing demands driven by the business. Against that backdrop, staying safe has never been more of a challenge for organisations everywhere, and of all sizes.

Massive Attacks - We're Still in Denial

Type: Opinion       Published: 11-2014      Views: 1988   
Description: The enterprise perimeter does not exist anymore - and a much more proactive approach to security is needed, says Bill Strain, CTO of cloud company iomart.

Cloud security threats challenged

Type: News       Published: 11-2014      Views: 1626   
Description: The perceived security threats associated with cloud services become less of an issue as businesses adopt more cloud services

Feel the fear - and take to the clouds anyway!

Type:       Published: 09-2014      Views: 9395   
Description: The worldwide market for cloud computing is expected to top $57.4 billion by the end of this year - double that of only a few years ago. Does this signal a brave new world of 'cloud without borders'?

Bare essentials for Cyber Fightback

Type:       Published: 09-2014      Views: 2136   
Description: With the cost of cybercrime to the UK put at a staggering £27bn per annum, what is being done to protect UK businesses? Is it enough? Or are the ‘enemy’ getting the upperhand?

Kaseya acquires Scorpion Software

Type: News       Published: 08-2014      Views: 2409   
Description: Kaseya has acquired Scorpion Software, providers of integrated two factor authentication, single sign on and password management solutions.

UKFast CEO pledges £1m to keep businesses safe online

Type: News       Published: 07-2014      Views: 1474   
Description: The CEO of cloud and hosting firm UKFast has pledged £1m to keeping businesses safe online, as the threat from hackers and data thieves continues to grow.

Security? It's in Microsoft's DNA!

Type: Masterclass       Published: 05-2014      Views: 2650   
Description: While many rue what they see as the disappearance of Microsoft from the security business, Tim Ager argues the software giant has never been more committed to the cause

GFI WirelessSentry

Type: Review       Published: 05-2014      Views: 2748   
Description: GFI's WirelessSentry (WiSe) takes the expense out of wireless network monitoring by uniquely offering it as a cloud service

Celestix Networks seeks out an Edge

Type: News       Published: 05-2014      Views: 3186   
Description: Celestix Networks has recently launched its new Cloud Edge Security Appliance series to enable secure and seamless connectivity across physical, virtual and cloud based servers

Powerful updates for CoSoSys Endpoint Protector 4 platform

Type: News       Published: 05-2014      Views: 3203   
Description: CoSoSys, a leading provider of cross-platform data loss prevention (DLP), device control and mobile device management (MDM) solutions, has released a suite of powerful updates for the endpoint protector 4 platform

CenterTools DriveLock File Protection

Type: Review       Published: 05-2014      Views: 2703   
Description: Businesses dealing with sensitive or confidential information must take steps to protect it

GFI LanGuard 2014 R2

Type: Review       Published: 05-2014      Views: 3431   
Description: GFI clearly has a solid development program for its LanGuard software, as only a few months have passed since it launched version 2014 and already it has released a major R2 update

Heartbleed: the aftermath

Type: Industry Focus       Published: 05-2014      Views: 3195   
Description: While many reports around Heartbleed - the security bug discovered in the OpenSSL cryptography library - have been very much doom and gloom oriented, there are things you can do right away to protect yourself

Who Holds the Upper Hand?

Type: Industry Focus       Published: 05-2014      Views: 5689   
Description: With mobile devices now seemingly everywhere, and more and more applications flooding the market, mobile monitoring and device management have never been so vital.

Layer 7 attacks pinpointed

Type: News       Published: 05-2014      Views: 1685   
Description: DOSarrest has just released its latest generation of proprietary backend software that incorporates an all-new customer-facing portal

Attack incidents soar

Type: News       Published: 05-2014      Views: 1605   
Description: Drawing on data obtained from a customer base of 2,200, Alert Logic has found a significant increase in activity across cloud and hosting environments compared to last year's findings-brute force attacks climbed from 30% to 44% of customers and vulnerability scans increased from 27% to 44%

Code space closed by attack

Type: News       Published: 05-2014      Views: 2253   
Description: Source code hosting provider Code Space has suffered a devastating breach in which attackers have deleted swathes of customer data (hosted in the cloud), effectively now forcing the site out of business

100 million-plus attacks blocked

Type: News       Published: 03-2014      Views: 1769   
Description: FireHost has released its 2013 year in review Superfecta report

Akamai completes the deal

Type: News       Published: 03-2014      Views: 1879   
Description: Akamai Technologies has completed its acquisition of Prolexic Technologies

Samsung and Zscaler announce enterprise-ready mobile security solution

Type: News       Published: 02-2014      Views: 1922   
Description: Zscaler has entered a strategic partnership with Samsung to provide the industry’s first enterprise-ready mobile security solution

DDoS attacks wreak havoc upon data centres

Type: News       Published: 01-2014      Views: 2151   
Description: Recent Ponemon Institute research has shown that DDoS attacks are wreaking havoc on data centres.

Securing the Mobility Age through the Cloud

Type: Opinion       Published: 01-2014      Views: 2267   
Description: Employee mobility will be the rule, rather than the exception, in 2014. Michael Sutton, VP of security research at Zscaler, explains why

At your own risk…

Type: Industry Focus       Published: 01-2014      Views: 4010   
Description: Keeping business systems safe and protecting your data has never been more difficult to achieve. And it is only likely to become harder. Getting the right risk management strategy in place is critical

Guy’s and St Thomas’ NHS Foundation Trust adopts Egress Switch encryption

Type: News       Published: 01-2014      Views: 2418   
Description: Providing a full range of services for local residents, as well as offering specialist care for patients from further afield, staff at London-based Guy’s and St Thomas’ NHS Foundation Trust have more than two million patient contacts every year

Inside 2014

Type: Comment       Published: 01-2014      Views: 2332   
Description: Ask those in the know what will be the hot topics for security in 2014 and there is no shortage of response.

What will be Big in 2014?

Type: Industry View       Published: 01-2014      Views: 4592   
Description: The burning issues that organisations are in the throes of dealing with this year are already proving to be highly challenging, as we enter the second quarter of 2014. Brian Wall reports

Cloud's silver lining for the mobility age

Type: Industry Focus       Published: 01-2014      Views: 4073   
Description: Is a cloud-based security model the way forward - one that is not reliant on where users are or what devices they are using to access the web or cloud applications? Computing Security reports

K3 launches new cloud division

Type: News       Published: 01-2014      Views: 1578   
Description: K3 Business Technology Group (K3) has launched a new IT consultancy division to deploy and manage secure cloud services all over the world, with access to 300 international data centres

Digital leaders lack resources

Type: News       Published: 01-2014      Views: 1269   
Description: Only 10% of digital leaders feel that their organisation has enough resources to address the management issues and IT trends that their company has prioritised, according to the annual digital leaders survey from BCS, The Chartered Institute for IT

Mobile malware puts data at risk, as BYOD grows

Type: News       Published: 01-2014      Views: 2135   
Description: Research from Accellion has revealed that 73% of UK businesses have no formal BYOD policy - with basic functions left to unregulated third party apps

Questions - and answers

Type: News       Published: 01-2014      Views: 1587   
Description: Companies seeking to improve information security without incurring significant expense are increasingly turning to the cloud for security as a service (SecaaS), which promises low costs and high flexibility

The Internet's Light And Dark Sides

Type: Industry Focus       Published: 11-2013      Views: 6315   
Description: While the internet can be a positive force for good, it is also a haven for the very bad - and it doesn't get much worse than cybercrime. What is being done to protect UK businesses? Are the cybercriminals getting the upper-hand in a one-way battle? Brian Wall finds out

DDoS attacks – Potent Weapon

Type: News       Published: 11-2013      Views: 2680   
Description: Fraudsters are increasingly using DDoS attacks to distract institutions during account takeover and other fraudulent schemes, states Avivah Litan of analysts Gartner

New Factor in mobile security from IBM

Type: News       Published: 11-2013      Views: 2845   
Description: IBM scientists have developed a new mobile authentication security technology, based on the radio standard known as near-field communication (NFC)

Sun Shines On Cloud

Type: Industry Focus       Published: 09-2013      Views: 5568   
Description: The market for cloud, or Internet, computing is hitting the stratosphere. Market research firm IDC expects businesses worldwide to spend $57.4 billion by next year – with more to come. Brian Wall reports

IBM Steps Up Security Investment

Type: Industry Focus       Published: 09-2013      Views: 3887   
Description: IBM has closed the deal to acquire Trusteer, greatly furthering its investment in cloud-delivered software and services

Identity In Crisis

Type: Industry Focus       Published: 09-2013      Views: 5985   
Description: How do you ensure you have the right identity access management system in place that protects you from exposure to charges of non-compliance? Brian Wall finds out

EU calls for stronger cloud privacy standards

Type: News       Published: 09-2013      Views: 2246   
Description: Recent leaks of the US National Security Agency's (NSA) PRISM surveillance programme are the latest in a string of disclosures that have sparked growing data residency concerns for EU and global corporations regarding using US-headquartered cloud service providers.

Secure Mobile Workflows

Type: White Paper       Published: 08-2013      Views: 4120   
Description: The majority of employees now demand their choice of apps, collaboration spaces, and cloud storage. Each personalized, consumer-grade workspace enables productive collaboration: employees can efficiently navigate around their workdays and a host of smartphones and tablets.

Fantasy deal becomes reality for Securstore

Type: News       Published: 07-2013      Views: 1802   
Description: Securstore has recently been chosen by the Fantasy League to protect its business data

New services launched by Auriga

Type: News       Published: 07-2013      Views: 1815   
Description: Auriga Consulting has announced a new strategic initiative designed to align data and security solutions with client need

Policing your BYOD policy

Type: News       Published: 07-2013      Views: 2306   
Description: A new survey by Acronis of more than 4,000 IT professionals around the world has revealed that 75% of organisations don't have a policy in place around the use of public clouds for company files

Avoiding The Security Black Hole

Type: Industry Focus       Published: 05-2013      Views: 4172   
Description: In this second part of our focus on collaboration, we conclude our investigations into the ever-increasing sharing and utilisation of data across businesses.

Heading In The Right Direction

Type: Industry Focus       Published: 05-2013      Views: 4593   
Description: What are the key steps needed to get governance right, specifically where overall security is concerned? And what are the obstacles that can surface along the way?

Law unto itself - university opts for hybrid cloud solution

Type: News       Published: 05-2013      Views: 2690   
Description: The University of Law, the UK's leading professional law school with over a 100 year history, thousands of students and eight locations has today implemented Securstore's Hybrid Cloud solution

Clear Thinking In A Clouded World

Type: Masterclass       Published: 05-2013      Views: 2421   
Description: In his latest masterclass, celestix CEO tim ager explains How to deploy two-factor authentication successfully in a cloud-centric architecture

Losing Track Of Critical Data Means Trouble In Store

Type: News       Published: 03-2013      Views: 2731   
Description: Commenting on a New York Times story about the governance issues that portable devices and their leaky apps create for companies, Varonis Systems says that mobile access to cloud-based data - and replication to the device itself - has become the new corporate norm

Data security simplified and strengthened

Type: News       Published: 03-2013      Views: 1424   
Description: Pegasystems, provider of business process management and customer relationship management software solutions, has standardised on Vormetric Data Security to reassure its global customer base it is securing their data, based on security best practices and compliance requirements

Battling beebus-style threats

Type: News       Published: 03-2013      Views: 1404   
Description: Nexor has collaborated with Glasswall Solutions to provide a patented security product that directly addresses the Beebus style of threat

Password Protected: A Survey on Two-Factor Authentication

Type: White Paper       Published: 02-2013      Views: 4458   

Cloud-based services: Easing the IT burden while taking control

Type: White Paper       Published: 02-2013      Views: 3850   
Description: The potential benefits of employing cloud-based services, either in place of existing IT resources or alongside them, are undoubtedly significant. This white paper examines some of the benefits for IT administrators when their applications or services are moved to or managed via the cloud.

Cloud provokes mixed emotions and lack of trust

Type: News       Published: 01-2013      Views: 2367   
Description: A survey released by Lieberman Software Corporation has revealed that more than half (51%) of IT experts whose job roles focus on the cloud don’t trust the cloud for any of their personal data, such as contact lists, music, photos or Webmail

Sharp Eye On The Main Chance

Type: Industry Focus       Published: 11-2012      Views: 3437   
Description: Security compliance should mean exactly that - not something that can be worked around or ignored, especially by the 'privileged few'. But how do you set up your compliance processes in the first place? Brian Wall reports, in this second part of our focus !


Type: Review       Published: 09-2012      Views: 2117   
Description: Cloud email security offers so much more than on-premises solutions, as businesses can make big savings in time and money. As a result, there are a wide range of choices, but MailDistiller is one of the few providers to have developed their own solution.

Dropped In It By Employee Breach - This Is A Wake-Up Call

Type: News       Published: 09-2012      Views: 1824   

Cloud Fears Create Huge Challenge, Say Controlcircle

Type: News       Published: 09-2012      Views: 1606   
Description: UK CIOs see security and compliance as major hurdles to cloud implementation, according to a new survey.

Collaboration Without Compromise Singled Out As The Key

Type: News       Published: 06-2012      Views: 1961   
Description: Varonis Systems has launched Varonis DatAnywhere, which extends the usability of corporate file sharing infrastructure ...

Partnership aims to protect internet integrity

Type: News       Published: 06-2012      Views: 1224   
Description: A joint solution addresses common DNSSEC deployment challenges

Fit for purpose?

Type: Industry Focus       Published: 04-2012      Views: 1582   
Description: Claire Umney, General Manager at AEB International, asks if the cloud is really safe enough for technology dependent businesses to use

Security Class

Type: Masterclass       Published: 04-2012      Views: 1342   
Description: This Security Class series is in association with ActivIdentity. In this edition we examine the challenges to be met in securing mobility

Current Page: 1    | 1 |    Total Views of these articles: 292302