Backup Collaboration Mobile Security Storage Strategy Virtualisation
ALL | CAD | Cloud Hosting | Construction | Document | Green | Networking | Security | Storage

Article Index: Security>(Topic)>(Company)>(Product)>(Editorial)>(Date)      

Sort Articles By :    Most Popular           Latest     

Current Page: 1        | 1 | 2 | 3 |        1266 Article(s)  Total Views of these articles: 1617216

Arxan sets a new standard for rapid mobile and web app protection

Type: News       Published: 02-2019      Views: 26   
Description: App Protection with Real-Time Threat Reporting that Easily Integrates into DevOps & CI/CD Processes

A picture is worth a thousand words when it comes to extracting rapid, actionable cyber-intelligenc

Type: News       Published: 01-2019      Views: 102   
Description: Richard Benson, CEO of Xanadata explains how augmented visualisation of IOC data from billions of security control log files enables rapid network threat investigations in hours rather than days or weeks

John Bromhead Joins Xanadata Advisory Board

Type: News       Published: 01-2019      Views: 76   
Description: London, UK January 15, 2019 Xanadata, providers of ultra high speed cyber network security analytics, are pleased to announce the appointment of John Bromhead to their Advisory Board

Almost half of companies still cant detect IoT device breaches, finds Gemalto

Type: News       Published: 01-2019      Views: 110   
Description: A new study from Gemalto has found that only around half (48%) of businesses can detect if any of their IoT devices suffers a breach. This comes despite companies having an increased focus on IoT security

The certainty of uncertain times ahead         

Type:       Published: 01-2019      Views: 52   
Description: Computing Security asks those in the know to do some future-gazing and give us their top predictions for cybersecurity in 2019. Here's what they have to say

AlienVault USM Anywhere         

Type: Review       Published: 01-2019      Views: 24   
Description: Organisations that want their threat detection, incident response and compliance management centralised in one place need look no further than AlienVault, an AT&T company

Brought down to earth         

Type:       Published: 01-2019      Views: 65   
Description: Cybercriminals who carried out a hack on British Airways compromised the data of around 380,000 passengers

Cloud adoption: a blessing, not a curse, for IT security         

Type: Masterclass       Published: 01-2019      Views: 63   
Description: Nigel Hawthorn, data privacy expert at McAfee, and Charlotte Gurney, marketing manager at Brookcourt Solutions, consider how cloud can be the most secure environment for business, despite increasingly sophisticated threats and growing cybercriminal interest

Are your employees the weakest link when it comes to your data security?         

Type:       Published: 01-2019      Views: 25   
Description: By Emma Charlton - Security & Authentication Division LeadCardwave Services Ltd

Hackers exploiting simple oversight         

Type: Comment       Published: 01-2019      Views: 27   
Description: Security web scans and analysis on over 80,000 European Magento websites - the most popular e-commerce platform globally - reveal 80% are at risk from cyber criminals. That is a startling and worrying figure, and should leave those at the sharp edge deeply concerned for their own safety

Sporting Chance         

Type:       Published: 01-2019      Views: 21   
Description: Recent figures suggest that over the last year there has been a 50% increase in online attacks on volunteer-run sports and leisure clubs

Powerful alliance         

Type:       Published: 01-2019      Views: 67   
Description: CYJAX has been working closely for some time now with Oxford University and the Centre for Doctoral Training in Cyber Security - and these 'Deep Dive Days' are really paying off

Cloud sinks lower         

Type:       Published: 01-2019      Views: 28   
Description: 'Cloud' has been all the rage for some time now, but its predominance has been challenged of late. might its status have to be re-evaluated somewhat?

Biometric breakthrough         

Type:       Published: 01-2019      Views: 17   
Description: Bank of Cyprus customers are set to be first to enjoy biometric convenience on a contactless payment card, while protecting users data privacy at the same time

Understanding Cyber Kill Chain Model to stop Advanced Persistent Threats         

Type:       Published: 01-2019      Views: 21   
Description: AltuG ASik, senior software specialist, ICterra Information and Communication Technologies, looks at APTs and how to detect and prevent them

Waging War Against Cyberattacks         

Type:       Published: 01-2019      Views: 32   
Description: Identity and access management, anti-malware software, network and mobile security, IT security services and financial transaction security - these are all driving sector growth

The quantum threat to cybersecurity         

Type:       Published: 01-2019      Views: 119   
Description: By Rodney Joffe, SVP and Fellow, Neustar, and Chairman of the Neustar International Security Council (NISC)

The Importance of Effective Incident Response Planning         

Type:       Published: 01-2019      Views: 46   
Description: By David Gray, Senior Manager Incident Response Practice Lead EMEA, NTT Security

Printer hacking in the age of the IoT         

Type:       Published: 01-2019      Views: 28   
Description: Print and be damned? If the right security measures aren't in place, that could well be an organisation's fate

Don't pass go!         

Type:       Published: 01-2019      Views: 192   
Description: Passwords are a never-ending headache for organisations everywhere - and a boon for hackers looking for easy access to someone's data. Samantha Humphries of Rapid7 offers her insights into this thorny topic

Three cybersecurity tips for manufacturers         

Type:       Published: 01-2019      Views: 182   
Description: Adrian Jones, CEO of Swivel Secure, offers three essential tips for manufacturers that will help to keep their sensitive data out of grasping hands

Life Inside the Perimeter: Understanding the Modern CISO

Type: News       Published: 01-2019      Views: 31   
Description: Major Global Study of Senior Cyber Security Professionals reveals increasing pressure, workload and budgetary deficits

Tis the season to be wary hackers switching tactics for Christmas to spread festive fear

Type: News       Published: 12-2018      Views: 109   
Description: Bromium data shows resurgence in number of malicious email attachments being used by hackers to bypass enterprise defenses

Secure and smart choice for TMX Recruit

Type:       Published: 11-2018      Views: 102   
Description: TXM Recruit has been a FuseMail customer for many years. We took a few minutes to catch up with TXMs Global IT Strategic Manager Brian Cook

Target practice

Type: Feature       Published: 11-2018      Views: 133   
Description: When a perpetrator launches a targeted attack, patience is their game as they seek to know their victims intimately - and then bypass any protective security controls

An IT hierarchy of needs         

Type: Masterclass       Published: 11-2018      Views: 221   
Description: Charlotte Gurney, Marketing Manager, Brookcourt Solutions, opens a window on Enterprise DNS - a platform which enables a wide range of business transformation

Here's health - or is it?         

Type: Comment       Published: 11-2018      Views: 73   
Description: Following a recent spate of aggressive phishing attacks on NHSmail - the email service approved by the Department of Health and Social Care for sharing patient identifiable and sensitive information -cyber-security provider Cofense has shared US client data it has tracked to clarify just how much of a danger future phishing attacks may become in the UK

Billions of records left exposed         

Type: Feature       Published: 11-2018      Views: 153   
Description: A new global database of public data breaches reveals that 945 data breaches led to 4.5 billion data records being compromised worldwide in the first half of 2018

Tailored service - outstanding solution         

Type: Case Study       Published: 11-2018      Views: 138   
Description: A FTSE 100 luxury goods retailer, headquartered in London with a global footprint, needed the right solution to a security challenge

NHS breach - the true cost         

Type: Research       Published: 11-2018      Views: 104   
Description: The WannaCry attack that hit the NHS last year, is estimated to have cost the health service a massive 92million. Could such hard-nosed reckoning help in ensuring the NHS is more resilient in future?

9 million Brits fall victim to cybercrime         

Type: Special Focus       Published: 11-2018      Views: 115   
Description: Consumers increasingly feel companies should be responsible for protecting victims - but is that simply surrendering responsibility?

Facing up to the facts         

Type: Opinion       Published: 11-2018      Views: 177   
Description: Should we be using facial recognition technology? It's currently a hot topic in the US, where Amazon has asked for government input, while civil liberties groups in both the UK and US are fundamentally opposed to it

The million pound gamble         

Type: Research       Published: 11-2018      Views: 104   
Description: New research reveals that UK businesses would have to spend on average 1 million to recover from a breach

Always on - always exposed

Type: Feature       Published: 11-2018      Views: 204   
Description: With always-connected mobile users everywhere and so many organisations turning to the cloud, exposure to threats is a given at any moment

Computing Security Awards 2018         

Type: Awards       Published: 11-2018      Views: 66   

Anti Spam Solution of the Year Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 66   
Description: WINNER: FuseMail - SecureSMART

Anti Malware Solution of the Year Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 60   
Description: WINNER: Heimdal Security - Thor Enterprise

Threat Intelligence Award Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 65   
Description: WINNER: Cyjax - Cyjax Portal

Network Security Solution of the Year Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 70   
Description: WINNER: Celestix Networks - SecureAccess Platform

Encryption Solution of the Year Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 71   
Description: WINNER: Egress Software Technologies - Egress Platform

DLP Solution of the Year Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 73   
Description: WINNER: Kingston Technology - Ironkey D300

Mobile Security Solution of the Year Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 72   
Description: WINNER: Wandera - Secure Mobile Gateway

Identity and Access Management Solution of the Year Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 65   
Description: WINNER: Swivel Secure - Authentication

Anti Phishing Solution of the Year Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 65   
Description: WINNER: Rapid7 - InsightPhishing

Cloud Security Solution of the Year Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 74   
Description: WINNER: AlienVault - USM Anywhere

Anti Ransomware / Anti DDos Solution of the Year Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 67   
Description: WINNER: F5 Networks - Silverline

Advanced Persistent Threat (APT) Solution of the Year Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 70   
Description: WINNER: Malwarebytes - Endpoint Protection

Secure Data Erasure Company of the Year Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 66   
Description: WINNER: Computer Disposals

Security Recruitment Company of the Year Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 63   
Description: WINNER: Finlay James

Education and Training Provider of the Year Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 62   
Description: WINNER: Cyjax

Pen Testing Solution of the Year Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 64   
Description: WINNER: Redscan - Redscan Pen Testing

Web Application Firewall of the Year Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 57   
Description: WINNER: Rohde & Schwarz Cybersecurity - R&SWeb Application Firewall

Security Service Provider of the Year Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 61   
Description: WINNER: Performanta

Security Distributor of the Year Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 64   
Description: WINNER: Nuvias

Security Reseller of the Year Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 61   
Description: WINNER: Brookcourt Solutions

SME Security Solution of the Year Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 68   
Description: WINNER: Kaspersky Lab - Kaspersky Endpoint Security for Business

Enterprise Security Solution of the Year Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 64   
Description: WINNER: Titania - Paws Studio

The Compliance Award Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 62   
Description: WINNER: Computer Disposals

Security Project of the Year -Health and Education category Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 62   
Description: WINNER: Mediclinic / Vectra

Security Project of the Year - Multi Sector category Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 53   
Description: WINNER: Virtus / OryxAlign

The Customer Service Award Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 55   
Description: WINNER: Brookcourt Solutions

New Product of the Year Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 66   
Description: WINNER: Cardwave Services - SafeToGo SOLO

Editor's Choice Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 61   
Description: WINNER: My1Login - Enterprise IAM

The Contribution to CyberSecurity Award Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 65   
Description: WINNER: Rodney Joffe, Neustar

The 'One to Watch' Security Company Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 60   
Description: WINNER: ICterra

Security Company of the Year Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 69   
Description: WINNER: Computer Disposals

Computing Security Awards 2018 - meet the winners!         

Type: Awards       Published: 10-2018      Views: 282   
Description: A gala night on Thursday 11th October in London saw the 2018 Computing Security Awards winners duly honoured for their outstanding performances across the past 12 months.

The ransomware demands hitting businesses

Type: Opinion       Published: 10-2018      Views: 142   
Description: By David Higgins, Director of Customer Development EMEA, CyberArk

Award winning managed SOC services for a Luxury Goods Retailer

Type: Case Study       Published: 10-2018      Views: 111   
A FTSE 100 luxury goods retailer, headquartered in London, with a global footprint

New security research reveals password inadequacy still a top threat

Type: News       Published: 09-2018      Views: 231   
Description: New research from the WatchGuard Threat Lab shows the emergence of the Mimikatz credential-stealing malware as a top threat and the growing popularity of brute force login attacks against web applications.

Ivanti Patch for Windows Achieves Common Criteria EAL 2+ Certification

Type:       Published: 09-2018      Views: 138   
Description: Common Criteria Certification Renewed, Ensuring Ivanti Patch for Windows Meets High and Consistent Security Standards for IT Products

AlienVault USM Anywhere         

Type: Review       Published: 09-2018      Views: 260   
Description: Organisations that want their threat detection, incident response, and compliance management centralised in one place need look no further than AlienVault, an AT&T company

Building a solid foundation for security in the Cloud         

Type: Opinion       Published: 09-2018      Views: 464   
Description: Dealing with cloud environments all comes down to understanding, assessing and balancing risk, as Javvad Malik, security advocate, AlienVault, explains

You can't prevent what you can't see         

Type: Masterclass       Published: 09-2018      Views: 1639   
Description: Charlotte Gurney, Marketing Manager, Brookcourt Solutions, and Marvin Josif, from Cix Software, look at the criticality of full visibility when facing advanced persistent threats

Fine-tuning the cloud         

Type: Feature       Published: 09-2018      Views: 306   
Description: Will Secure Access Orchestration solutions that holistically manage the overall multi-cloud environment overcome fears around security issues?

Loss leaders         

Type: Comment       Published: 09-2018      Views: 119   
Description: When I misplace something - phone, house keys, bank card etc - it tends not to have devastating consequences for thousands of other people

Time for leaders to step forward         

Type: Feature       Published: 09-2018      Views: 305   
Description: Cyber security has become a vital part of any businesses well-being and defences. But what leading role is government taking to co-ordinate a meaningful response?

Factoring In Your Security         

Type: Feature       Published: 09-2018      Views: 312   
Description: Sounds familiar? More employee accounts were accessed when hackers breached the two-factor authentication used to confirm log-in. 'Groundhog Day' comes to mind

Good news, bad news         

Type: Editor\       Published: 09-2018      Views: 228   
Description: Identity fraud has fallen for the first time in four years - which is a real positive. At the same time, there is an acute shortage of cyber security skills in-house to deal with threats against the business

IoT attacks surge ahead         

Type: Industry Focus       Published: 09-2018      Views: 166   
Description: IoT-based attacks are hitting organisations at an alarming and ever-increasing rate, with global spending on IOT security forecast to hit $1.5 billion next year

Education, Education, Education - And Phishing!         

Type: Feature       Published: 09-2018      Views: 404   
Description: An organisations worst enemy can still be its staff when it comes phishing attacks.

United - and threatened         

Type: Feature       Published: 09-2018      Views: 298   
Description: The Internet of Things turns information into actions that create new capabilities, richer experiences and real economic opportunity. But beware of the 'dark side'

When hype and hope collide         

Type: Industry Focus       Published: 09-2018      Views: 278   
Description: The rhetoric around Artificial Intelligence (AI) and Machine Learning (ML) in the battle against cyber security has reached something of a fever pitch. But how accurate is it?

What is the (end)point?         

Type: Feature       Published: 09-2018      Views: 165   
Description: Many organisations can't even agree on what an endpoint is, suggesting a serious disconnect in the age of the Industrial Internet of Things

Health hazards         

Type: Feature       Published: 09-2018      Views: 247   
Description: A huge data breach in Singapore recently resulted in the personal data of 1.5m people - a quarter of the country's population - being stolen from a government health database.

Vectra Cognito         

Type: Review       Published: 09-2018      Views: 236   
Description: Traditional intrusion detection and prevention systems (IDPS) are struggling to cope, as cyber-criminals become ever more imaginative

CFO Phishing / Fraud Attacks BEC (Business Email Compromise)

Type: White Paper       Published: 08-2018      Views: 168   
Description: BEC (Business Email Compromise) incidents are on the rise, costing companies more than 9.5 billion over the last 5 years

Announcement: Shearwater Group PLC Conditional agreement to acquire Brookcourt

Type: News       Published: 08-2018      Views: 236   
Description: Over the past 13 years Brookcourt has continuously grown to become a leader in our space

The fight against mal-adjustment!         

Type: Opinion       Published: 07-2018      Views: 274   
Description: How do you stop malicious applications from entering the network? Computing Security asks Mikko Rntynen, director of product marketing at F-Secure, for his thoughts

The danger beneath your fingertips         

Type: Feature       Published: 07-2018      Views: 515   
Description: Email is being labelled the number one threat vector facing organisations, with a rising tide of new attacks grabbing the headlines

Can you rely on a Human Firewall as your Last Line of Defence in the fight against Ransomware?         

Type: Masterclass       Published: 07-2018      Views: 539   
Description: Charlotte Gurney, Marketing Manager, Brookcourt Solutions, and Morten Gammelgard, from Bullwall, have clear advice for those who may be hit by ransomware that evades existing security solutions

Data security for your mobile workforce         

Type: Industry View       Published: 07-2018      Views: 279   
Description: We live in a flexible, mobile world that is constantly reinventing itself. Paul Norbury, Chief Executive, Cardwave Services, steps inside for a closer view

Always at your disposal         

Type: Interview       Published: 07-2018      Views: 184   
Description: Computer Disposals Ltd (CDL) is one of the UK's leading I.T. disposal companies, with many of the UK's leading companies amongst its client portfolio. Computing Security interviewS Jean-Pierre Naylor, managing director and owner, to find out what lies behind that success

Celestix SecureAccess Platform         

Type: Product Review       Published: 07-2018      Views: 381   
Description: Remote access to the corporate network is now an essential requirement and many businesses use Microsoft's DirectAccess as it's easy to deploy and provides tight security

Password apathy - but who's most to blame?         

Type: Comment       Published: 07-2018      Views: 181   
Description: It would appear that many leading websites, including Amazon and Wikipedia, are failing to support users with advice on how to securely protect their data

Securing the Cloud: The future of Authentication         

Type: Opinion       Published: 07-2018      Views: 278   
Description: Neil Langridge, Marketing Director, e92plus, offers his insights on a massive data security challenge that's now facing organisations everywhere

Ins and outs of cyber resilience         

Type: Industry Focus       Published: 07-2018      Views: 258   
Description: The European Union is planning to enhance its cyber resilience with a new EU-wide certification framework. In our pre-Brexit state, what are the 'ins' and 'outs' of this?

Backup confidence on the up and up         

Type: Research       Published: 07-2018      Views: 198   
Description: In all of the doom and gloom that often dominates the news around security, it is to be welcomed when there are stats surfacing to buck that trend

Full-on visibility         

Type: Feature       Published: 07-2018      Views: 1552   
Description: When fast-growing company HubSpot needed to gain better visibility of devices on their network and track down potential malicious activity, it turned to ForeScout

Polishing up the chrome         

Type: Feature       Published: 07-2018      Views: 759   
Description: Millions of unencrypted websites may receive security warnings for visitors using Google Chrome browsers, now Chrome 68 stable updates have gone live

Partitioning the responsibilities in information security         

Type: Opinion       Published: 07-2018      Views: 538   
Description: Mustafa Fikret Ottekin, Advisor to CEO in ICterra, reflects on the vital roles to be played by managements and IT departments regarding security

A meeting of minds         

Type: Events       Published: 07-2018      Views: 240   
Description: Infosecurity Europe brought together a vast array of international exhibitors and almost 20,000 visitors for an action-packed three days at Olympia london

Time to share the pain         

Type: Feature       Published: 07-2018      Views: 2818   
Description: Is the cloud right for everyone? That, says one leading observer, is the wrong question. "Like any evolutionary development, it's our current reality." But woe betide those who fail to take every security measure along the way

My1Login Enterprise IAM         

Type: Product Review       Published: 07-2018      Views: 263   
Description: With the GDPR (General Data Protection Regulation) now in force, it's never been more important for businesses to have a robust identity and access management (IAM) solution in place

Time for a deep health check         

Type: Research       Published: 07-2018      Views: 182   
Description: In our hyper-connected, technology-driven world, data breaches and cyber-attacks remain a significant threat to organisations and a lack of awareness of the risks is often to blame. A newly revised standard may help

Alarm sounds on encrypted threats         

Type: Feature       Published: 07-2018      Views: 285   
Description: Cyber security specialist SonicWall has revealed disturbing new findings on malware, ransomware, encrypted threats and chip-based attacks

Damage limitation         

Type: Analysis       Published: 07-2018      Views: 295   
Description: Analysis suggests that the takedown of a single cloud provider could cause $50 billion to $120 billion of economic damage

The search for the security champions of 2018

Type: Awards       Published: 06-2018      Views: 428   
Description: Time to make your nominations - we ask you now to tell us who and what has impressed you the most

Libraesva keeps your businesses safe and secure

Type: Case Study       Published: 06-2018      Views: 303   
Description: SecureFort is a new breed of security business

A Hefty Data Centre Security Challenge

Type: Case Study       Published: 06-2018      Views: 240   
Description: VIRTUS Data Centres is the UK's fastest-growing data centre provider that owns, designs, builds and operates the country's most efficient and flexible data centres

NHS Digital enhances its Cyber Security Operations Centre with IBM

Type: News       Published: 06-2018      Views: 271   
Description: NHS Digital has entered into a three-year strategic partnership with IBM to provide a range of new and improved services to health and care organisations. These services will enhance data security and cyber security response and provide additional defence against increasingly complex, evolving threats.

Organisations struggling with cyber security should learn from NHS guidance, suggests Databarracks

Type: News       Published: 05-2018      Views: 354   
Description: Organisations struggling to improve cyber security defences, should take note of the recommendations proposed by a select committee report into last year’s WannaCry ransomware epidemic. This is according to Peter Groucutt, managing director of Databarracks.

SolarWinds MSP launches Security Resource Center

Type: News       Published: 05-2018      Views: 362   
Description: SolarWinds MSP, has launched its Security Resource Center, designed to make it quick and easy for MSPs to get the information they need about current security issues and trends, as well as recommended best practices  to help ensure their business and customers are protected.

Exponential‐e launches Cyber Security Operations Centre

Type: News       Published: 05-2018      Views: 413   
Description: Exponential‐e, the British cloud and network provider, has launched its Cyber Security Operations Centre (CSOC) with a view to making defence in‐depth the default standard for the mid‐market.

UK the most breached country in Europe, but organisations aren’t feeling the threat

Type: News       Published: 05-2018      Views: 301   
Description: Thales has announced the results of its 2018 Thales Data Threat Report, European Edition, revealing the UK as Europe’s most breached country of last year.

Security Management Solution from AlgoSec         

Type: Review       Published: 05-2018      Views: 309   
Description: As enterprise networks grow in complexity and move deeper into the cloud, businesses can no longer rely on inefficient and error-prone manual processes to manage their security policies

How machine learning can help you monitor insider threats         

Type: Masterclass       Published: 05-2018      Views: 445   
Description: Charlotte Gurney, Marketing Manager, Brookcourt Solutions, looks at the role that machine learning-based solutions can play in preventing potentially devastating consequences

Cardwave SafeToGo hardware encrypted USBs         

Type: Review       Published: 05-2018      Views: 453   
Description: The long-awaited EU GDPR (General Data Protection Regulation) finally took effect in May this year, so businesses that process personally identifiable information of EU citizens must demonstrate compliance or face punitive fines for security breaches

Computer Disposals Ltd         

Type: Review       Published: 05-2018      Views: 307   
Description: With the GDPR (General Data Protection Regulation) in full force from 25 May, businesses must show compliance or face potentially crippling fines for data breaches

Are we back to working from the office?         

Type: Opinion       Published: 05-2018      Views: 386   
Description: Simply put, the answer to the question above is 'No'. Despite a handful of large and very prominent IT companies stating they are going to be trying to move away from this, we have reached a point of no return, says Pavel Duddell, head of sales EMEA, Celestix

Council of War         

Type: Comment       Published: 05-2018      Views: 184   
Description: Every NHS trust that has been tested against cyber security standards since 2017's WannaCry attack has failed, NHS Digital has revealed, with plans now in place for surprise inspections at hospitals

Authentication failures leave dark hole         

Type: Opinion       Published: 05-2018      Views: 413   
Description: New approaches to cloud access are seen as a way to help alleviate 'dark hole' issues

Cryptojacking - the spiralling cyber threat         

Type: Comment       Published: 05-2018      Views: 393   
Description: Criminal gangs are literally coining it in by mining digital currencies through secretly infiltrating someone's computing device

ForeScout Technologies CounterACT 8         

Type: Review       Published: 05-2018      Views: 295   
Description: Network infrastructures are now in a constant state of flux, forcing enterprises to re-evaluate their security postures

Tomorrow's Security Today!         

Type: Events       Published: 05-2018      Views: 325   
Description: This year's Infosecurity Europe show will reflect the need for the information security industry to get one step ahead of the cyber adversary, in the never-ending battle to stay safe

Everyone's talking about GDPR - are you?         

Type: Masterclass       Published: 05-2018      Views: 234   
Description: Christine Jackson, partner at law firm Wright Hassall, outlines what the GDPR means for your business and the rules around storing customer data

Sun or rain, bring it on!         

Type: Opinion       Published: 05-2018      Views: 2208   
Description: Is the cloud right for everyone? That, says one leading observer, is the wrong question. "Like any evolutionary development, it's our current reality." But woe betide those who fail to take every security measure

Wake up to the risk of server-side encryption         

Type: Opinion       Published: 05-2018      Views: 367   
Description: The use of client-side encryption should be a key criterion in the selection of any vendor who stores sensitive data on your behalf, says Stewart McSporran, CTO, My1Login

Targeting the vulnerable         

Type: Opinion       Published: 05-2018      Views: 370   
Description: The Internet of Things is dissolving the wall between the physical and virtual worlds. Yotam Gutman, VP, marketing, SecuriThings, considers how this is leaving the young at risk from predators

Time to face up         

Type:       Published: 05-2018      Views: 489   
Description: Reacting after an attack is way too late. The damage is done. So, what strategy will keep your organisation safe and not prove an illusion?

The case for investing in people         

Type: Opinion       Published: 05-2018      Views: 345   
Description: Cyber security affects us all. And while technology plays a big part in protecting the business, so does ensuring staff have the right levels of skills and training

New LogMeIn report reveals the harsh realities of endpoint management

Type: News       Published: 05-2018      Views: 291   
Description: LogMeIn has released the findings of a new global report, “Uncovering the Harsh Realities of Endpoint Management: Bridging the gaps in multi-device security” revealing current market trends and business threats driving the need for IT professionals to make endpoint management a priority.

ADISA launches key UK Conference

Type: News       Published: 04-2018      Views: 394   
Description: With the General Data Protection Regulation (GDPR) being enshrined into UK law on 25 May, there is a growing appreciation that GDPR and data protection as a whole require a thorough understanding of all aspects that could lead to non-compliance and/or data breach, and therefore put organisations at risk of being in breach of the new legislation

Libra ESVA protects students from dangerous cyber threats

Type: News       Published: 04-2018      Views: 305   
Description: Libra ESVA was chosen as the best solution for a top UK school, due to its comprehensive protection from spam, malicious content and ease of deployment within the existing infrastructure

AI versus a human hacker         

Type: Feature       Published: 03-2018      Views: 479   
Description: How does machine learning and artificial intelligence (AI) impact cyber security?

Deadly game of Hide 'n' Seek         

Type: Research       Published: 03-2018      Views: 456   
Description: Bitdefender researchers have uncovered an emerging botnet that uses advanced communication techniques to exploit victims and build its infrastructure

How to underpin security transformation with complete visibility of your attack surface         

Type: Masterclass       Published: 03-2018      Views: 954   
Description: Charlotte Gurney, Marketing Manager, Brookcourt Solutions, provides key insights on a crucial issue that challenges so many enterprises

I.T. disposal: selecting the best         

Type: Opinion       Published: 03-2018      Views: 440   
Description: Legislation regarding IT recycling & disposal, not to mention the forthcoming GDPR regulation, is complicated enough. Jean-Pierre Naylor, director, Computer Disposals Ltd, offers his thoughts on choosing the right I.T. disposal company

Council of War         

Type: Research       Published: 03-2018      Views: 218   
Description: A new and deeply disturbing report from Big Brother Watch reveals that UK councils are severely unprepared for cybersecurity threats, with 25% of these authorities experiencing a data breach in the last five years

Driving into the unknown         

Type: Feature       Published: 03-2018      Views: 435   
Description: Tackling the many cybersecurity and other safety issues around connected cars has become an imperative

The dark destroyers         

Type: Research       Published: 03-2018      Views: 328   
Description: Over one million leaked and hacked credentials found on the Dark Web

It's time to be very ready!         

Type: Feature       Published: 03-2018      Views: 658   
Description: When the General Data Protection Regulation (GDPR) comes into force this May, it will overhaul how organisations store, secure and manage their customers' data. Swingeing penalties await those who fail to comply

Evolving your security for the cloud         

Type: Analysis       Published: 03-2018      Views: 547   
Description: How does an organisation migrate to the cloud, while keeping security top of mind and staying safe?

Everyone is at risk         

Type: Opinion       Published: 03-2018      Views: 495   
Description: From spear phishing to ransomware and the ever-present threat of bots, companies of all sizes have reason to lose sleep at night. Elizabeth Sheldon, Chairman, Evidence Talks, considers what that means for organisations everywhere

Protecting data to protect patients         

Type: Opinion       Published: 03-2018      Views: 373   
Description: Cyber criminals are netting massive financial returns from ransomware and other crippling cyberattacks against healthcare providers. How can they be stopped? Mark Sangster, VP and industry security strategist with eSentire, offers his insights

An urgent call to arms         

Type: Feature       Published: 03-2018      Views: 474   
Description: In this second part of our top predictions for cybersecurity in 2018, several experts reveal what may be lying in wait. And it doesn't always make for easy reading

A taste of things to come         

Type: Opinion       Published: 03-2018      Views: 369   
Description: Rahul Powar and Randal Pinto, CEO and COO of London-based tech start-up Red Sift, single out the three tech trends that they believe will dominate in 2018

Risk and reward in the big city         

Type: Feature       Published: 03-2018      Views: 323   
Description: Back in the 1960s, Disneyland had a ride called 'Utopia'. It was a glimpse into the future of human cities and gave us a taste of what smart cities could be. Alastair Hartrup, Global CEO, Network Critical, takes up the story

Titania Paws Studio 3.2.2         

Type: Product Review       Published: 03-2018      Views: 367   
Description: SMEs daunted by data protection regulations and the looming GDPR (General Data Protection Regulation) can rest easy with Titania's Paws Studio

Cardwave launches SafeToGo Solo, a new GDPR compliant hardware encrypted USB

Type:       Published: 03-2018      Views: 266   
Description: Cardwave, a leading expert in flash memory technology solutions has expanded its SafeToGo® USB security range with a new GDPR compliant AES-256 bit XTS hardware encrypted USB 3.0

TEISS cracking cyber security

Type:       Published: 03-2018      Views: 274   
Description: The European Information Security Summit 2018

700% surge in highly paid data protection jobs

Type: News       Published: 03-2018      Views: 285   
Description: With just two months to go until the UK’s biggest overhaul of data protection law for two decades, data protection professionals are enjoying a jobs opportunity surge - according to new figures released by the world’s largest job site, Indeed.

City, University of London, selects PhishMe for phishing and ransomware protection

Type: News       Published: 02-2018      Views: 363   
Description: University employs human behavioural conditioning techniques designed to build student and staff resilience to phishing

Bitdefender and NETGEAR collaborate on IoT security

Type: News       Published: 01-2018      Views: 421   
Description: Bitdefender and NETGEAR have announced a technology licensing agreement that allows NETGEAR to include Bitdefender’s breakthrough IoT security technology on certain of its networking devices.

Radware report highlights rise in ransomware attacks

Type: News       Published: 01-2018      Views: 724   
Description: Untraceable ransom payments can be a lucrative opportunity for hackers as cryptocurrencies increase in value

Application-Layer DDoS Attacks: Bad Things Come in Small Packages         

Type: Masterclass       Published: 01-2018      Views: 1178   
Description: Distributed Denial of Service (DDoS) attacks come in many flavours. Here, Charlotte Gurney, Marketing Manager, Brookcourt Solutions, considers one in particular

Cyber-Attacks Concealed         

Type: Comment       Published: 01-2018      Views: 228