Backup Collaboration Mobile Security Storage Strategy Virtualisation
ALL | CAD | Cloud Hosting | Construction | Document | Green | Networking | Security | Storage

Article Index: Security>(Topic)>(Company)>(Product)>(Editorial)>(Date)      

Sort Articles By :    Most Popular           Latest     

Current Page: 1        | 1 | 2 | 3 |        1200 Article(s)  Total Views of these articles: 1542989

Computing Security Awards 2018 - meet the winners!

Type: Awards       Published: 10-2018      Views: 152   
Description: A gala night on Thursday 11th October in London saw the 2018 Computing Security Awards winners duly honoured for their outstanding performances across the past 12 months.

The ransomware demands hitting businesses

Type: Opinion       Published: 10-2018      Views: 65   
Description: By David Higgins, Director of Customer Development EMEA, CyberArk

Award winning managed SOC services for a Luxury Goods Retailer

Type: Case Study       Published: 10-2018      Views: 41   
Description: CLIENT BACKGROUND
A FTSE 100 luxury goods retailer, headquartered in London, with a global footprint


New security research reveals password inadequacy still a top threat

Type: News       Published: 09-2018      Views: 118   
Description: New research from the WatchGuard Threat Lab shows the emergence of the Mimikatz credential-stealing malware as a top threat and the growing popularity of brute force login attacks against web applications.

Ivanti Patch for Windows Achieves Common Criteria EAL 2+ Certification

Type:       Published: 09-2018      Views: 76   
Description: Common Criteria Certification Renewed, Ensuring Ivanti Patch for Windows Meets High and Consistent Security Standards for IT Products

AlienVault USM Anywhere         

Type: Review       Published: 09-2018      Views: 135   
Description: Organisations that want their threat detection, incident response, and compliance management centralised in one place need look no further than AlienVault, an AT&T company

Building a solid foundation for security in the Cloud         

Type: Opinion       Published: 09-2018      Views: 363   
Description: Dealing with cloud environments all comes down to understanding, assessing and balancing risk, as Javvad Malik, security advocate, AlienVault, explains

You can't prevent what you can't see         

Type: Masterclass       Published: 09-2018      Views: 98   
Description: Charlotte Gurney, Marketing Manager, Brookcourt Solutions, and Marvin Josif, from Cix Software, look at the criticality of full visibility when facing advanced persistent threats

Fine-tuning the cloud         

Type: Feature       Published: 09-2018      Views: 162   
Description: Will Secure Access Orchestration solutions that holistically manage the overall multi-cloud environment overcome fears around security issues?

Loss leaders         

Type: Comment       Published: 09-2018      Views: 48   
Description: When I misplace something - phone, house keys, bank card etc - it tends not to have devastating consequences for thousands of other people

Time for leaders to step forward         

Type: Feature       Published: 09-2018      Views: 173   
Description: Cyber security has become a vital part of any businesses well-being and defences. But what leading role is government taking to co-ordinate a meaningful response?

Factoring In Your Security         

Type: Feature       Published: 09-2018      Views: 208   
Description: Sounds familiar? More employee accounts were accessed when hackers breached the two-factor authentication used to confirm log-in. 'Groundhog Day' comes to mind

Good news, bad news         

Type: Editor\       Published: 09-2018      Views: 114   
Description: Identity fraud has fallen for the first time in four years - which is a real positive. At the same time, there is an acute shortage of cyber security skills in-house to deal with threats against the business

IoT attacks surge ahead         

Type: Industry Focus       Published: 09-2018      Views: 57   
Description: IoT-based attacks are hitting organisations at an alarming and ever-increasing rate, with global spending on IOT security forecast to hit $1.5 billion next year

Education, Education, Education - And Phishing!         

Type: Feature       Published: 09-2018      Views: 242   
Description: An organisations worst enemy can still be its staff when it comes phishing attacks.

United - and threatened         

Type: Feature       Published: 09-2018      Views: 160   
Description: The Internet of Things turns information into actions that create new capabilities, richer experiences and real economic opportunity. But beware of the 'dark side'

When hype and hope collide         

Type: Industry Focus       Published: 09-2018      Views: 62   
Description: The rhetoric around Artificial Intelligence (AI) and Machine Learning (ML) in the battle against cyber security has reached something of a fever pitch. But how accurate is it?

What is the (end)point?         

Type: Feature       Published: 09-2018      Views: 64   
Description: Many organisations can't even agree on what an endpoint is, suggesting a serious disconnect in the age of the Industrial Internet of Things

Health hazards         

Type: Feature       Published: 09-2018      Views: 147   
Description: A huge data breach in Singapore recently resulted in the personal data of 1.5m people - a quarter of the country's population - being stolen from a government health database.

Vectra Cognito         

Type: Review       Published: 09-2018      Views: 149   
Description: Traditional intrusion detection and prevention systems (IDPS) are struggling to cope, as cyber-criminals become ever more imaginative

CFO Phishing / Fraud Attacks BEC (Business Email Compromise)

Type: White Paper       Published: 08-2018      Views: 111   
Description: BEC (Business Email Compromise) incidents are on the rise, costing companies more than 9.5 billion over the last 5 years

Announcement: Shearwater Group PLC Conditional agreement to acquire Brookcourt

Type: News       Published: 08-2018      Views: 148   
Description: Over the past 13 years Brookcourt has continuously grown to become a leader in our space

The fight against mal-adjustment!         

Type: Opinion       Published: 07-2018      Views: 196   
Description: How do you stop malicious applications from entering the network? Computing Security asks Mikko Rntynen, director of product marketing at F-Secure, for his thoughts

The danger beneath your fingertips         

Type: Feature       Published: 07-2018      Views: 385   
Description: Email is being labelled the number one threat vector facing organisations, with a rising tide of new attacks grabbing the headlines

Can you rely on a Human Firewall as your Last Line of Defence in the fight against Ransomware?         

Type: Masterclass       Published: 07-2018      Views: 400   
Description: Charlotte Gurney, Marketing Manager, Brookcourt Solutions, and Morten Gammelgard, from Bullwall, have clear advice for those who may be hit by ransomware that evades existing security solutions

Data security for your mobile workforce         

Type: Industry View       Published: 07-2018      Views: 191   
Description: We live in a flexible, mobile world that is constantly reinventing itself. Paul Norbury, Chief Executive, Cardwave Services, steps inside for a closer view

Always at your disposal         

Type: Interview       Published: 07-2018      Views: 116   
Description: Computer Disposals Ltd (CDL) is one of the UK's leading I.T. disposal companies, with many of the UK's leading companies amongst its client portfolio. Computing Security interviewS Jean-Pierre Naylor, managing director and owner, to find out what lies behind that success

Celestix SecureAccess Platform         

Type: Product Review       Published: 07-2018      Views: 270   
Description: Remote access to the corporate network is now an essential requirement and many businesses use Microsoft's DirectAccess as it's easy to deploy and provides tight security

Password apathy - but who's most to blame?         

Type: Comment       Published: 07-2018      Views: 112   
Description: It would appear that many leading websites, including Amazon and Wikipedia, are failing to support users with advice on how to securely protect their data

Securing the Cloud: The future of Authentication         

Type: Opinion       Published: 07-2018      Views: 194   
Description: Neil Langridge, Marketing Director, e92plus, offers his insights on a massive data security challenge that's now facing organisations everywhere

Ins and outs of cyber resilience         

Type: Industry Focus       Published: 07-2018      Views: 186   
Description: The European Union is planning to enhance its cyber resilience with a new EU-wide certification framework. In our pre-Brexit state, what are the 'ins' and 'outs' of this?

Backup confidence on the up and up         

Type: Research       Published: 07-2018      Views: 120   
Description: In all of the doom and gloom that often dominates the news around security, it is to be welcomed when there are stats surfacing to buck that trend

Full-on visibility         

Type: Feature       Published: 07-2018      Views: 1319   
Description: When fast-growing company HubSpot needed to gain better visibility of devices on their network and track down potential malicious activity, it turned to ForeScout

Polishing up the chrome         

Type: Feature       Published: 07-2018      Views: 627   
Description: Millions of unencrypted websites may receive security warnings for visitors using Google Chrome browsers, now Chrome 68 stable updates have gone live

Partitioning the responsibilities in information security         

Type: Opinion       Published: 07-2018      Views: 446   
Description: Mustafa Fikret Ottekin, Advisor to CEO in ICterra, reflects on the vital roles to be played by managements and IT departments regarding security

A meeting of minds         

Type: Events       Published: 07-2018      Views: 165   
Description: Infosecurity Europe brought together a vast array of international exhibitors and almost 20,000 visitors for an action-packed three days at Olympia london

Time to share the pain         

Type: Feature       Published: 07-2018      Views: 2325   
Description: Is the cloud right for everyone? That, says one leading observer, is the wrong question. "Like any evolutionary development, it's our current reality." But woe betide those who fail to take every security measure along the way

My1Login Enterprise IAM         

Type: Product Review       Published: 07-2018      Views: 180   
Description: With the GDPR (General Data Protection Regulation) now in force, it's never been more important for businesses to have a robust identity and access management (IAM) solution in place

Time for a deep health check         

Type: Research       Published: 07-2018      Views: 104   
Description: In our hyper-connected, technology-driven world, data breaches and cyber-attacks remain a significant threat to organisations and a lack of awareness of the risks is often to blame. A newly revised standard may help

Alarm sounds on encrypted threats         

Type: Feature       Published: 07-2018      Views: 202   
Description: Cyber security specialist SonicWall has revealed disturbing new findings on malware, ransomware, encrypted threats and chip-based attacks

Damage limitation         

Type: Analysis       Published: 07-2018      Views: 206   
Description: Analysis suggests that the takedown of a single cloud provider could cause $50 billion to $120 billion of economic damage

The search for the security champions of 2018

Type: Feature       Published: 06-2018      Views: 356   
Description: Time to make your nominations - we ask you now to tell us who and what has impressed you the most

Libraesva keeps your businesses safe and secure

Type: Case Study       Published: 06-2018      Views: 229   
Description: SecureFort is a new breed of security business

A Hefty Data Centre Security Challenge

Type: Case Study       Published: 06-2018      Views: 172   
Description: VIRTUS Data Centres is the UK's fastest-growing data centre provider that owns, designs, builds and operates the country's most efficient and flexible data centres

NHS Digital enhances its Cyber Security Operations Centre with IBM

Type: News       Published: 06-2018      Views: 205   
Description: NHS Digital has entered into a three-year strategic partnership with IBM to provide a range of new and improved services to health and care organisations. These services will enhance data security and cyber security response and provide additional defence against increasingly complex, evolving threats.

Organisations struggling with cyber security should learn from NHS guidance, suggests Databarracks

Type: News       Published: 05-2018      Views: 280   
Description: Organisations struggling to improve cyber security defences, should take note of the recommendations proposed by a select committee report into last year’s WannaCry ransomware epidemic. This is according to Peter Groucutt, managing director of Databarracks.

SolarWinds MSP launches Security Resource Center

Type: News       Published: 05-2018      Views: 278   
Description: SolarWinds MSP, has launched its Security Resource Center, designed to make it quick and easy for MSPs to get the information they need about current security issues and trends, as well as recommended best practices  to help ensure their business and customers are protected.

Exponential‐e launches Cyber Security Operations Centre

Type: News       Published: 05-2018      Views: 339   
Description: Exponential‐e, the British cloud and network provider, has launched its Cyber Security Operations Centre (CSOC) with a view to making defence in‐depth the default standard for the mid‐market.

UK the most breached country in Europe, but organisations aren’t feeling the threat

Type: News       Published: 05-2018      Views: 243   
Description: Thales has announced the results of its 2018 Thales Data Threat Report, European Edition, revealing the UK as Europe’s most breached country of last year.

Security Management Solution from AlgoSec         

Type: Review       Published: 05-2018      Views: 225   
Description: As enterprise networks grow in complexity and move deeper into the cloud, businesses can no longer rely on inefficient and error-prone manual processes to manage their security policies

How machine learning can help you monitor insider threats         

Type: Masterclass       Published: 05-2018      Views: 339   
Description: Charlotte Gurney, Marketing Manager, Brookcourt Solutions, looks at the role that machine learning-based solutions can play in preventing potentially devastating consequences

Cardwave SafeToGo hardware encrypted USBs         

Type: Review       Published: 05-2018      Views: 363   
Description: The long-awaited EU GDPR (General Data Protection Regulation) finally took effect in May this year, so businesses that process personally identifiable information of EU citizens must demonstrate compliance or face punitive fines for security breaches

Computer Disposals Ltd         

Type: Review       Published: 05-2018      Views: 226   
Description: With the GDPR (General Data Protection Regulation) in full force from 25 May, businesses must show compliance or face potentially crippling fines for data breaches

Are we back to working from the office?         

Type: Opinion       Published: 05-2018      Views: 303   
Description: Simply put, the answer to the question above is 'No'. Despite a handful of large and very prominent IT companies stating they are going to be trying to move away from this, we have reached a point of no return, says Pavel Duddell, head of sales EMEA, Celestix

Council of War         

Type: Comment       Published: 05-2018      Views: 122   
Description: Every NHS trust that has been tested against cyber security standards since 2017's WannaCry attack has failed, NHS Digital has revealed, with plans now in place for surprise inspections at hospitals

Authentication failures leave dark hole         

Type: Opinion       Published: 05-2018      Views: 335   
Description: New approaches to cloud access are seen as a way to help alleviate 'dark hole' issues

Cryptojacking - the spiralling cyber threat         

Type: Comment       Published: 05-2018      Views: 327   
Description: Criminal gangs are literally coining it in by mining digital currencies through secretly infiltrating someone's computing device

ForeScout Technologies CounterACT 8         

Type: Review       Published: 05-2018      Views: 216   
Description: Network infrastructures are now in a constant state of flux, forcing enterprises to re-evaluate their security postures

Tomorrow's Security Today!         

Type: Events       Published: 05-2018      Views: 252   
Description: This year's Infosecurity Europe show will reflect the need for the information security industry to get one step ahead of the cyber adversary, in the never-ending battle to stay safe

Everyone's talking about GDPR - are you?         

Type: Masterclass       Published: 05-2018      Views: 169   
Description: Christine Jackson, partner at law firm Wright Hassall, outlines what the GDPR means for your business and the rules around storing customer data

Sun or rain, bring it on!         

Type: Opinion       Published: 05-2018      Views: 2060   
Description: Is the cloud right for everyone? That, says one leading observer, is the wrong question. "Like any evolutionary development, it's our current reality." But woe betide those who fail to take every security measure

Wake up to the risk of server-side encryption         

Type: Opinion       Published: 05-2018      Views: 281   
Description: The use of client-side encryption should be a key criterion in the selection of any vendor who stores sensitive data on your behalf, says Stewart McSporran, CTO, My1Login

Targeting the vulnerable         

Type: Opinion       Published: 05-2018      Views: 288   
Description: The Internet of Things is dissolving the wall between the physical and virtual worlds. Yotam Gutman, VP, marketing, SecuriThings, considers how this is leaving the young at risk from predators

Time to face up         

Type:       Published: 05-2018      Views: 409   
Description: Reacting after an attack is way too late. The damage is done. So, what strategy will keep your organisation safe and not prove an illusion?

The case for investing in people         

Type: Opinion       Published: 05-2018      Views: 275   
Description: Cyber security affects us all. And while technology plays a big part in protecting the business, so does ensuring staff have the right levels of skills and training

New LogMeIn report reveals the harsh realities of endpoint management

Type: News       Published: 05-2018      Views: 221   
Description: LogMeIn has released the findings of a new global report, “Uncovering the Harsh Realities of Endpoint Management: Bridging the gaps in multi-device security” revealing current market trends and business threats driving the need for IT professionals to make endpoint management a priority.

ADISA launches key UK Conference

Type: News       Published: 04-2018      Views: 312   
Description: With the General Data Protection Regulation (GDPR) being enshrined into UK law on 25 May, there is a growing appreciation that GDPR and data protection as a whole require a thorough understanding of all aspects that could lead to non-compliance and/or data breach, and therefore put organisations at risk of being in breach of the new legislation

Libra ESVA protects students from dangerous cyber threats

Type: News       Published: 04-2018      Views: 239   
Description: Libra ESVA was chosen as the best solution for a top UK school, due to its comprehensive protection from spam, malicious content and ease of deployment within the existing infrastructure

AI versus a human hacker         

Type: Feature       Published: 03-2018      Views: 385   
Description: How does machine learning and artificial intelligence (AI) impact cyber security?

Deadly game of Hide 'n' Seek         

Type: Research       Published: 03-2018      Views: 367   
Description: Bitdefender researchers have uncovered an emerging botnet that uses advanced communication techniques to exploit victims and build its infrastructure

How to underpin security transformation with complete visibility of your attack surface         

Type: Masterclass       Published: 03-2018      Views: 880   
Description: Charlotte Gurney, Marketing Manager, Brookcourt Solutions, provides key insights on a crucial issue that challenges so many enterprises

I.T. disposal: selecting the best         

Type: Opinion       Published: 03-2018      Views: 361   
Description: Legislation regarding IT recycling & disposal, not to mention the forthcoming GDPR regulation, is complicated enough. Jean-Pierre Naylor, director, Computer Disposals Ltd, offers his thoughts on choosing the right I.T. disposal company

Council of War         

Type: Research       Published: 03-2018      Views: 156   
Description: A new and deeply disturbing report from Big Brother Watch reveals that UK councils are severely unprepared for cybersecurity threats, with 25% of these authorities experiencing a data breach in the last five years

Driving into the unknown         

Type: Feature       Published: 03-2018      Views: 336   
Description: Tackling the many cybersecurity and other safety issues around connected cars has become an imperative

The dark destroyers         

Type: Research       Published: 03-2018      Views: 255   
Description: Over one million leaked and hacked credentials found on the Dark Web

It's time to be very ready!         

Type: Feature       Published: 03-2018      Views: 547   
Description: When the General Data Protection Regulation (GDPR) comes into force this May, it will overhaul how organisations store, secure and manage their customers' data. Swingeing penalties await those who fail to comply

Evolving your security for the cloud         

Type: Analysis       Published: 03-2018      Views: 454   
Description: How does an organisation migrate to the cloud, while keeping security top of mind and staying safe?

Everyone is at risk         

Type: Opinion       Published: 03-2018      Views: 386   
Description: From spear phishing to ransomware and the ever-present threat of bots, companies of all sizes have reason to lose sleep at night. Elizabeth Sheldon, Chairman, Evidence Talks, considers what that means for organisations everywhere

Protecting data to protect patients         

Type: Opinion       Published: 03-2018      Views: 279   
Description: Cyber criminals are netting massive financial returns from ransomware and other crippling cyberattacks against healthcare providers. How can they be stopped? Mark Sangster, VP and industry security strategist with eSentire, offers his insights

An urgent call to arms         

Type: Feature       Published: 03-2018      Views: 362   
Description: In this second part of our top predictions for cybersecurity in 2018, several experts reveal what may be lying in wait. And it doesn't always make for easy reading

A taste of things to come         

Type: Opinion       Published: 03-2018      Views: 292   
Description: Rahul Powar and Randal Pinto, CEO and COO of London-based tech start-up Red Sift, single out the three tech trends that they believe will dominate in 2018

Risk and reward in the big city         

Type: Feature       Published: 03-2018      Views: 251   
Description: Back in the 1960s, Disneyland had a ride called 'Utopia'. It was a glimpse into the future of human cities and gave us a taste of what smart cities could be. Alastair Hartrup, Global CEO, Network Critical, takes up the story

Titania Paws Studio 3.2.2         

Type: Product Review       Published: 03-2018      Views: 286   
Description: SMEs daunted by data protection regulations and the looming GDPR (General Data Protection Regulation) can rest easy with Titania's Paws Studio

Cardwave launches SafeToGo Solo, a new GDPR compliant hardware encrypted USB

Type:       Published: 03-2018      Views: 218   
Description: Cardwave, a leading expert in flash memory technology solutions has expanded its SafeToGo® USB security range with a new GDPR compliant AES-256 bit XTS hardware encrypted USB 3.0

TEISS cracking cyber security

Type:       Published: 03-2018      Views: 220   
Description: The European Information Security Summit 2018

700% surge in highly paid data protection jobs

Type: News       Published: 03-2018      Views: 221   
Description: With just two months to go until the UK’s biggest overhaul of data protection law for two decades, data protection professionals are enjoying a jobs opportunity surge - according to new figures released by the world’s largest job site, Indeed.

City, University of London, selects PhishMe for phishing and ransomware protection

Type: News       Published: 02-2018      Views: 296   
Description: University employs human behavioural conditioning techniques designed to build student and staff resilience to phishing

Bitdefender and NETGEAR collaborate on IoT security

Type: News       Published: 01-2018      Views: 345   
Description: Bitdefender and NETGEAR have announced a technology licensing agreement that allows NETGEAR to include Bitdefender’s breakthrough IoT security technology on certain of its networking devices.

Radware report highlights rise in ransomware attacks

Type: News       Published: 01-2018      Views: 646   
Description: Untraceable ransom payments can be a lucrative opportunity for hackers as cryptocurrencies increase in value

Application-Layer DDoS Attacks: Bad Things Come in Small Packages         

Type: Masterclass       Published: 01-2018      Views: 1104   
Description: Distributed Denial of Service (DDoS) attacks come in many flavours. Here, Charlotte Gurney, Marketing Manager, Brookcourt Solutions, considers one in particular

Cyber-Attacks Concealed         

Type: Comment       Published: 01-2018      Views: 171   
Description: It is worrying to hear that some UK banks still aren't telling regulators about all the cyber-attacks wreaked on the financial services industry, despite a 10-fold increase in reports to the Financial Conduct Authority (FCA) over the last four years

It's war - and it's now         

Type:       Published: 01-2018      Views: 1031   
Description: Cyber warfare is a real threat - and happening somewhere now, as this is being written

Laptops Blitzed in under 30 seconds         

Type:       Published: 01-2018      Views: 305   
Description: What if your laptop could be 'backdoored' via a technology almost everyone uses and trusts: Intel. It's not simply a possibility, however - it's been reported as happening on a massive scale

Hacking on the cheap         

Type:       Published: 01-2018      Views: 415   
Description: A team of experts bypassed an iPhone's fingerprint sensor and manipulated facial and voice recognition security systems on various banking apps. Cost of the 'technology' to do this? Around £45

Taking the fight to the enemy         

Type:       Published: 01-2018      Views: 281   
Description: David Ferbrache, chief technology officer in KPMG's cyber security practice, takes a close look at key areas where organisations should focus their attention in the 12 months ahead

Real solutions, not band-aids!         

Type:       Published: 01-2018      Views: 511   
Description: Enterprise I.T. is faced with a treadmill of challenges fuelled by new cloud and mobile initiatives. How can these be engaged with at the highest level and overcome?

First small steps… .. but a long way to go         

Type:       Published: 01-2018      Views: 613   
Description: NHS Digital is investing £20m in a new Cyber Defence Unit to protect critical systems and sensitive patient data from the threat of hackers. Is it enough, though?

Armed to fight back         

Type:       Published: 01-2018      Views: 268   
Description: Cybercriminals have never had so many technology weapons at their fingertips with which to attack organisations. Having the right protection skills and knowledge is vital

Through the glass, darkly         

Type: Feature       Published: 01-2018      Views: 579   
Description: Computing Security asked those in the know to do some future-gazing and give us their top predictions for cybersecurity in 2018. Here's what they had to say

The Vital Link         

Type:       Published: 01-2018      Views: 421   
Description: Predictive analytics is not a miracle cure. But it can help to alter how organisations look at security operations and incident response workflow, when properly embraced

Titania Nipper Studio 2.5         

Type: Review       Published: 01-2018      Views: 452   
Description: Network routers, firewalls and switches are essential to business operations and yet their very complexity makes them easy targets for cyber criminals

Concerned about GDPR compliance? VTL could be part of the solution

Type: Feature       Published: 12-2017      Views: 2158   
Description: By now, you have probably heard that we’re set to see the biggest change to data privacy legislation in decades with the introduction of the General Data Protection Regulation (GDPR) on 25th May 2018. But do you know how it will affect different areas of your business, and are you sure that you’ll be compliant by the May deadline?

CYJAX Achieves ISO 27001 Certification

Type: Feature       Published: 12-2017      Views: 311   
Description: CYJAX, the award-winning cyber threat intelligence company, has become what is said to be the first organisation of its type in the world to achieve ISO 27001 certification

75% of organisations report no strategy to manage and secure DevOps secrets

Type: News       Published: 11-2017      Views: 386   
Description: DevOps and security professionals have worrying knowledge gaps about where privileged accounts and secrets exist across the IT infrastructure, according to the first findings to be released from CyberArk’s Advanced Threat Landscape 2018 report. When offered several options ranging from PCs / laptops to microservices, cloud environments and containers, nearly all (99%) failed to identify all places where privileged accounts or secrets exist.

Cyber Security Lessons from Nursery

Type:       Published: 11-2017      Views: 576   
Description: By Alastair Hartrup, Global CEO of Network Critical

Evidence Talks steps up fight against insider fraud

Type: Product News       Published: 11-2017      Views: 413   
Description: In the modern business climate, a multitude of malicious threats are testing every aspect of an organisation’s defences. However, one of the biggest challenges faced is not external – it comes from the threat within

Data security a major concern for businesses in 2017 ahead of GDPR, finds new Kaseya research

Type: News       Published: 11-2017      Views: 446   
Description: A new piece of research commissioned by IT systems management provider Kaseya has revealed that attempting to secure data and privacy has proven to be one of the biggest challenges in 2017, as voted for by 44% of IT executives.

Things To Consider When Choosing A Cyber Security Vendor

Type:       Published: 11-2017      Views: 397   
Description: By Ian McGregor, CRO, Invinsec

Mission? Detection!         

Type: Opinion       Published: 11-2017      Views: 547   
Description: New variations of advanced persistent threats continue to make the headlines. Now organisations are increasingly focused on fighting them off

Checkmate         

Type: Feature       Published: 11-2017      Views: 1159   
Description: Attacks against applications have now reached new heights of intensity and sophistication. Just how do you keep the attackers at arm's length?

Mighty storm unleashed         

Type: Feature       Published: 11-2017      Views: 522   
Description: New cyber-storm clouds are gathering, threatening even more potential damage than the fearsome Mirai botnet of 2016

SWIFT Customer Security Controls Compliance: An Application-Centric Approach to Cybersecurity         

Type: Masterclass       Published: 11-2017      Views: 1008   
Description: Charlotte Gurney, Group Marketing manager at Brookcourt Solutions & Partner (Cix Software), outlines how organisations need to change their approach to cybersecurity to meet the SWIFT customer security programme mandate

China Crackdown         

Type: Feature       Published: 11-2017      Views: 446   
Description: Censorship controls on social media are rife in China, as it enforces new draconian cybersecurity laws, posing serious problems for businesses active in the country

Paradise lost?         

Type: Comment       Published: 11-2017      Views: 265   
Description: The breach of the Appleby law firm, now dubbed the 'Paradise Papers', has seen a raft of salacious information pour out into the public domain, with the private documents of the rich and famous laid bare for all to see

Back to Basics         

Type: Feature       Published: 11-2017      Views: 574   
Description: Demanding that greater powers should be given to regulators to prevent cybercrime may simply be putting the cart before the horse

GDPR: The Silver Lining         

Type: Opinion       Published: 11-2017      Views: 1196   
Description: Are there four letters presently capable of generating greater fear and anxiety for organisations around the world than GDPR? Colin Tankard, managing director, Digital Pathways, seeks to alleviate those concerns

Life on the cutting edge         

Type: Opinion       Published: 11-2017      Views: 373   
Description: The way must now be paved for the adoption of cutting-edge technologies, tackling the barriers that businesses are facing, says the CBI

Uniting forces to tackle cyber risk         

Type: Feature       Published: 11-2017      Views: 356   
Description: The level of cyber exposure to which an organisation is liable can be a major concern - especially as many have no idea how large or dangerous that might prove

Leading the fightback through the power of I0T         

Type: Feature       Published: 11-2017      Views: 469   
Description: The level of cyber exposure to which an organisation is liable can be a major concern - especially as many have no idea how large or dangerous that might be

Computing Security Awards 2017         

Type: Awards       Published: 11-2017      Views: 225   
Description: Excellence Shines Through

Anti Spam Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 276   
Description: WINNER: LibraEsva - Libra ESVA

Anti Malware Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 302   
Description: WINNER: Malwarebytes - Endpoint Security

Threat Intelligence Award – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 262   
Description: WINNER: Cyjax - Cyber Threat Intelligence

Content Security Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 350   
Description: WINNER: Trend Micro

Network Security Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 237   
Description: WINNER: Titania

Encryption Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 232   
Description: WINNER: WinMagic

DLP Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 245   
Description: WINNER: GhangorCloud - Information Security Enforcer

Mobile Security Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 270   
Description: WINNER: Wandera - Secure Mobile Gateway

Identity and Access Management Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 283   
Description: WINNER: My1Login

Anti Phishing Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 277   
Description: WINNER: Red Sift - OnDMARC

Network Access Control Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 241   
Description: WINNER: Portnox - Portnox Core

Cloud Security Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 261   
Description: WINNER: Egress Software Technologies - Egress Switch

Anti Ransomware/ Anti DDos Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 241   
Description: WINNER: Rohde and Schwarz Cybersecurity - Browser in the Box

Advanced Persistent Threat (APT) Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 320   
Description: WINNER: Performanta - TrapX

Secure Data Erasure Company of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 243   
Description: WINNER: Computer Disposals

Security Recruitment Company of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 228   
Description: WINNER: Evolution Recruitment Solutions

Education and Training Provider of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 259   
Description: WINNER: ZeroDayLab

Pen Testing Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 249   
Description: WINNER: Redscan - Redscan Pen Testing

Web Application Firewall of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 221   
Description: WINNER: F5 Networks - Application Security Manager

Security Service Provider of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 224   
Description: WINNER: Brookcourt Solutions

Security Distributor of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 243   
Description: WINNER: Nuvias –formerly Wick Hill

Security Reseller of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 210   
Description: WINNER: Brookcourt Solutions

SME Security Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 247   
Description: WINNER: Winmagic

Enterprise Security Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 264   
Description: WINNER: Arbor Networks - Arbor Cloud

The Compliance Award – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 229   
Description: WINNER: Kingston Technology

Security Project of the Year - Private Sector – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 236   
Description: WINNER: Borussia Dortmund / Cyjax

Security Project of the Year - Public / Not for Profit Sector – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 240   
Description: WINNER: Peabody Trust / Egress

New Product of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 253   
Description: WINNER: Digital Pathways

Editor’s Choice – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 260   
Description: WINNER: Malwarebytes

The Contribution to Cyber Security Award – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 294   
Description: WINNER: Phil Richards (Ivanti)

The ‘One to Watch’ Security Company – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 249   
Description: WINNER: Capita Cyber Security

Anti Cybercrime Award – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 236   
Description: WINNER: RSA

Security Company of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 230   
Description: WINNER: Malwarebytes

APCON expands product portfolio

Type:       Published: 11-2017      Views: 173   
Description: Copper Bypass TAP Appliance, a fail-safe security and traffic visibility solution, supports five inline network security tools

Email best-practices have never been more essential

Type: Feature       Published: 10-2017      Views: 318   
Description: By Dr.Rois Ni Thuama, head of cybersecurity governance partnerships and legal at email security firm OnDMARC

Sophos adds Synchronized App Control to the latest version of XG Firewall

Type: News       Published: 10-2017      Views: 315   
Description: Sophos has announced the latest version of its next-generation Sophos XG Firewall that delivers a breakthrough in network traffic visibility.

Computing Security Awards 2017 - The Winners!

Type: Awards       Published: 10-2017      Views: 374