Backup Collaboration Mobile Security Storage Strategy Virtualisation
ALL | CAD | Cloud Hosting | Construction | Document | Green | Networking | Security | Storage

Article Index: Security>(Topic)>(Company)>(Product)>(Editorial)>(Date)      

Sort Articles By :    Most Popular           Latest     

Current Page: 1        | 1 | 2 | 3 |        1182 Article(s)  Total Views of these articles: 1471896

New security research reveals password inadequacy still a top threat

Type: News       Published: 09-2018      Views: 55   
Description: New research from the WatchGuard Threat Lab shows the emergence of the Mimikatz credential-stealing malware as a top threat and the growing popularity of brute force login attacks against web applications.

Ivanti Patch for Windows Achieves Common Criteria EAL 2+ Certification

Type:       Published: 09-2018      Views: 21   
Description: Common Criteria Certification Renewed, Ensuring Ivanti Patch for Windows Meets High and Consistent Security Standards for IT Products

CFO Phishing / Fraud Attacks BEC (Business Email Compromise)

Type: White Paper       Published: 08-2018      Views: 80   
Description: BEC (Business Email Compromise) incidents are on the rise, costing companies more than 9.5 billion over the last 5 years

Announcement: Shearwater Group PLC Conditional agreement to acquire Brookcourt

Type: News       Published: 08-2018      Views: 89   
Description: Over the past 13 years Brookcourt has continuously grown to become a leader in our space

The fight against mal-adjustment!         

Type: Opinion       Published: 07-2018      Views: 117   
Description: How do you stop malicious applications from entering the network? Computing Security asks Mikko Rntynen, director of product marketing at F-Secure, for his thoughts

The danger beneath your fingertips         

Type: Feature       Published: 07-2018      Views: 231   
Description: Email is being labelled the number one threat vector facing organisations, with a rising tide of new attacks grabbing the headlines

Can you rely on a Human Firewall as your Last Line of Defence in the fight against Ransomware?         

Type: Masterclass       Published: 07-2018      Views: 272   
Description: Charlotte Gurney, Marketing Manager, Brookcourt Solutions, and Morten Gammelgard, from Bullwall, have clear advice for those who may be hit by ransomware that evades existing security solutions

Data security for your mobile workforce         

Type: Industry View       Published: 07-2018      Views: 110   
Description: We live in a flexible, mobile world that is constantly reinventing itself. Paul Norbury, Chief Executive, Cardwave Services, steps inside for a closer view

Always at your disposal         

Type: Interview       Published: 07-2018      Views: 77   
Description: Computer Disposals Ltd (CDL) is one of the UK's leading I.T. disposal companies, with many of the UK's leading companies amongst its client portfolio. Computing Security interviewS Jean-Pierre Naylor, managing director and owner, to find out what lies behind that success

Celestix SecureAccess Platform         

Type: Product Review       Published: 07-2018      Views: 197   
Description: Remote access to the corporate network is now an essential requirement and many businesses use Microsoft's DirectAccess as it's easy to deploy and provides tight security

Password apathy - but who's most to blame?         

Type: Comment       Published: 07-2018      Views: 58   
Description: It would appear that many leading websites, including Amazon and Wikipedia, are failing to support users with advice on how to securely protect their data

Securing the Cloud: The future of Authentication         

Type: Opinion       Published: 07-2018      Views: 146   
Description: Neil Langridge, Marketing Director, e92plus, offers his insights on a massive data security challenge that's now facing organisations everywhere

Ins and outs of cyber resilience         

Type: Industry Focus       Published: 07-2018      Views: 95   
Description: The European Union is planning to enhance its cyber resilience with a new EU-wide certification framework. In our pre-Brexit state, what are the 'ins' and 'outs' of this?

Backup confidence on the up and up         

Type: Research       Published: 07-2018      Views: 71   
Description: In all of the doom and gloom that often dominates the news around security, it is to be welcomed when there are stats surfacing to buck that trend

Full-on visibility         

Type: Feature       Published: 07-2018      Views: 309   
Description: When fast-growing company HubSpot needed to gain better visibility of devices on their network and track down potential malicious activity, it turned to ForeScout

Polishing up the chrome         

Type: Feature       Published: 07-2018      Views: 523   
Description: Millions of unencrypted websites may receive security warnings for visitors using Google Chrome browsers, now Chrome 68 stable updates have gone live

Partitioning the responsibilities in information security         

Type: Opinion       Published: 07-2018      Views: 195   
Description: Mustafa Fikret Ottekin, Advisor to CEO in ICterra, reflects on the vital roles to be played by managements and IT departments regarding security

A meeting of minds         

Type: Events       Published: 07-2018      Views: 107   
Description: Infosecurity Europe brought together a vast array of international exhibitors and almost 20,000 visitors for an action-packed three days at Olympia london

Time to share the pain         

Type: Feature       Published: 07-2018      Views: 1585   
Description: Is the cloud right for everyone? That, says one leading observer, is the wrong question. "Like any evolutionary development, it's our current reality." But woe betide those who fail to take every security measure along the way

My1Login Enterprise IAM         

Type: Product Review       Published: 07-2018      Views: 108   
Description: With the GDPR (General Data Protection Regulation) now in force, it's never been more important for businesses to have a robust identity and access management (IAM) solution in place

Time for a deep health check         

Type: Research       Published: 07-2018      Views: 68   
Description: In our hyper-connected, technology-driven world, data breaches and cyber-attacks remain a significant threat to organisations and a lack of awareness of the risks is often to blame. A newly revised standard may help

Alarm sounds on encrypted threats         

Type: Feature       Published: 07-2018      Views: 129   
Description: Cyber security specialist SonicWall has revealed disturbing new findings on malware, ransomware, encrypted threats and chip-based attacks

Damage limitation         

Type: Analysis       Published: 07-2018      Views: 119   
Description: Analysis suggests that the takedown of a single cloud provider could cause $50 billion to $120 billion of economic damage

The search for the security champions of 2018

Type: Feature       Published: 06-2018      Views: 280   
Description: Time to make your nominations - we ask you now to tell us who and what has impressed you the most

Libraesva keeps your businesses safe and secure

Type: Case Study       Published: 06-2018      Views: 169   
Description: SecureFort is a new breed of security business

A Hefty Data Centre Security Challenge

Type: Case Study       Published: 06-2018      Views: 137   
Description: VIRTUS Data Centres is the UK's fastest-growing data centre provider that owns, designs, builds and operates the country's most efficient and flexible data centres

NHS Digital enhances its Cyber Security Operations Centre with IBM

Type: News       Published: 06-2018      Views: 161   
Description: NHS Digital has entered into a three-year strategic partnership with IBM to provide a range of new and improved services to health and care organisations. These services will enhance data security and cyber security response and provide additional defence against increasingly complex, evolving threats.

Organisations struggling with cyber security should learn from NHS guidance, suggests Databarracks

Type: News       Published: 05-2018      Views: 232   
Description: Organisations struggling to improve cyber security defences, should take note of the recommendations proposed by a select committee report into last year’s WannaCry ransomware epidemic. This is according to Peter Groucutt, managing director of Databarracks.

SolarWinds MSP launches Security Resource Center

Type: News       Published: 05-2018      Views: 238   
Description: SolarWinds MSP, has launched its Security Resource Center, designed to make it quick and easy for MSPs to get the information they need about current security issues and trends, as well as recommended best practices  to help ensure their business and customers are protected.

Exponential‐e launches Cyber Security Operations Centre

Type: News       Published: 05-2018      Views: 296   
Description: Exponential‐e, the British cloud and network provider, has launched its Cyber Security Operations Centre (CSOC) with a view to making defence in‐depth the default standard for the mid‐market.

UK the most breached country in Europe, but organisations aren’t feeling the threat

Type: News       Published: 05-2018      Views: 210   
Description: Thales has announced the results of its 2018 Thales Data Threat Report, European Edition, revealing the UK as Europe’s most breached country of last year.

Security Management Solution from AlgoSec         

Type: Review       Published: 05-2018      Views: 180   
Description: As enterprise networks grow in complexity and move deeper into the cloud, businesses can no longer rely on inefficient and error-prone manual processes to manage their security policies

How machine learning can help you monitor insider threats         

Type: Masterclass       Published: 05-2018      Views: 283   
Description: Charlotte Gurney, Marketing Manager, Brookcourt Solutions, looks at the role that machine learning-based solutions can play in preventing potentially devastating consequences

Cardwave SafeToGo hardware encrypted USBs         

Type: Review       Published: 05-2018      Views: 316   
Description: The long-awaited EU GDPR (General Data Protection Regulation) finally took effect in May this year, so businesses that process personally identifiable information of EU citizens must demonstrate compliance or face punitive fines for security breaches

Computer Disposals Ltd         

Type: Review       Published: 05-2018      Views: 184   
Description: With the GDPR (General Data Protection Regulation) in full force from 25 May, businesses must show compliance or face potentially crippling fines for data breaches

Are we back to working from the office?         

Type: Opinion       Published: 05-2018      Views: 252   
Description: Simply put, the answer to the question above is 'No'. Despite a handful of large and very prominent IT companies stating they are going to be trying to move away from this, we have reached a point of no return, says Pavel Duddell, head of sales EMEA, Celestix

Council of War         

Type: Comment       Published: 05-2018      Views: 91   
Description: Every NHS trust that has been tested against cyber security standards since 2017's WannaCry attack has failed, NHS Digital has revealed, with plans now in place for surprise inspections at hospitals

Authentication failures leave dark hole         

Type: Opinion       Published: 05-2018      Views: 293   
Description: New approaches to cloud access are seen as a way to help alleviate 'dark hole' issues

Cryptojacking - the spiralling cyber threat         

Type: Comment       Published: 05-2018      Views: 287   
Description: Criminal gangs are literally coining it in by mining digital currencies through secretly infiltrating someone's computing device

ForeScout Technologies CounterACT 8         

Type: Review       Published: 05-2018      Views: 173   
Description: Network infrastructures are now in a constant state of flux, forcing enterprises to re-evaluate their security postures

Tomorrow's Security Today!         

Type: Events       Published: 05-2018      Views: 191   
Description: This year's Infosecurity Europe show will reflect the need for the information security industry to get one step ahead of the cyber adversary, in the never-ending battle to stay safe

Everyone's talking about GDPR - are you?         

Type: Masterclass       Published: 05-2018      Views: 125   
Description: Christine Jackson, partner at law firm Wright Hassall, outlines what the GDPR means for your business and the rules around storing customer data

Sun or rain, bring it on!         

Type: Opinion       Published: 05-2018      Views: 1777   
Description: Is the cloud right for everyone? That, says one leading observer, is the wrong question. "Like any evolutionary development, it's our current reality." But woe betide those who fail to take every security measure

Wake up to the risk of server-side encryption         

Type: Opinion       Published: 05-2018      Views: 229   
Description: The use of client-side encryption should be a key criterion in the selection of any vendor who stores sensitive data on your behalf, says Stewart McSporran, CTO, My1Login

Targeting the vulnerable         

Type: Opinion       Published: 05-2018      Views: 234   
Description: The Internet of Things is dissolving the wall between the physical and virtual worlds. Yotam Gutman, VP, marketing, SecuriThings, considers how this is leaving the young at risk from predators

Time to face up         

Type:       Published: 05-2018      Views: 332   
Description: Reacting after an attack is way too late. The damage is done. So, what strategy will keep your organisation safe and not prove an illusion?

The case for investing in people         

Type: Opinion       Published: 05-2018      Views: 158   
Description: Cyber security affects us all. And while technology plays a big part in protecting the business, so does ensuring staff have the right levels of skills and training

New LogMeIn report reveals the harsh realities of endpoint management

Type: News       Published: 05-2018      Views: 179   
Description: LogMeIn has released the findings of a new global report, “Uncovering the Harsh Realities of Endpoint Management: Bridging the gaps in multi-device security” revealing current market trends and business threats driving the need for IT professionals to make endpoint management a priority.

ADISA launches key UK Conference

Type: News       Published: 04-2018      Views: 290   
Description: With the General Data Protection Regulation (GDPR) being enshrined into UK law on 25 May, there is a growing appreciation that GDPR and data protection as a whole require a thorough understanding of all aspects that could lead to non-compliance and/or data breach, and therefore put organisations at risk of being in breach of the new legislation

Libra ESVA protects students from dangerous cyber threats

Type: News       Published: 04-2018      Views: 205   
Description: Libra ESVA was chosen as the best solution for a top UK school, due to its comprehensive protection from spam, malicious content and ease of deployment within the existing infrastructure

AI versus a human hacker         

Type: Feature       Published: 03-2018      Views: 333   
Description: How does machine learning and artificial intelligence (AI) impact cyber security?

Deadly game of Hide 'n' Seek         

Type: Research       Published: 03-2018      Views: 305   
Description: Bitdefender researchers have uncovered an emerging botnet that uses advanced communication techniques to exploit victims and build its infrastructure

How to underpin security transformation with complete visibility of your attack surface         

Type: Masterclass       Published: 03-2018      Views: 831   
Description: Charlotte Gurney, Marketing Manager, Brookcourt Solutions, provides key insights on a crucial issue that challenges so many enterprises

I.T. disposal: selecting the best         

Type: Opinion       Published: 03-2018      Views: 323   
Description: Legislation regarding IT recycling & disposal, not to mention the forthcoming GDPR regulation, is complicated enough. Jean-Pierre Naylor, director, Computer Disposals Ltd, offers his thoughts on choosing the right I.T. disposal company

Council of War         

Type: Research       Published: 03-2018      Views: 128   
Description: A new and deeply disturbing report from Big Brother Watch reveals that UK councils are severely unprepared for cybersecurity threats, with 25% of these authorities experiencing a data breach in the last five years

Driving into the unknown         

Type: Feature       Published: 03-2018      Views: 277   
Description: Tackling the many cybersecurity and other safety issues around connected cars has become an imperative

The dark destroyers         

Type: Research       Published: 03-2018      Views: 218   
Description: Over one million leaked and hacked credentials found on the Dark Web

It's time to be very ready!         

Type: Feature       Published: 03-2018      Views: 474   
Description: When the General Data Protection Regulation (GDPR) comes into force this May, it will overhaul how organisations store, secure and manage their customers' data. Swingeing penalties await those who fail to comply

Evolving your security for the cloud         

Type: Analysis       Published: 03-2018      Views: 403   
Description: How does an organisation migrate to the cloud, while keeping security top of mind and staying safe?

Everyone is at risk         

Type: Opinion       Published: 03-2018      Views: 329   
Description: From spear phishing to ransomware and the ever-present threat of bots, companies of all sizes have reason to lose sleep at night. Elizabeth Sheldon, Chairman, Evidence Talks, considers what that means for organisations everywhere

Protecting data to protect patients         

Type: Opinion       Published: 03-2018      Views: 236   
Description: Cyber criminals are netting massive financial returns from ransomware and other crippling cyberattacks against healthcare providers. How can they be stopped? Mark Sangster, VP and industry security strategist with eSentire, offers his insights

An urgent call to arms         

Type: Feature       Published: 03-2018      Views: 293   
Description: In this second part of our top predictions for cybersecurity in 2018, several experts reveal what may be lying in wait. And it doesn't always make for easy reading

A taste of things to come         

Type: Opinion       Published: 03-2018      Views: 256   
Description: Rahul Powar and Randal Pinto, CEO and COO of London-based tech start-up Red Sift, single out the three tech trends that they believe will dominate in 2018

Risk and reward in the big city         

Type: Feature       Published: 03-2018      Views: 204   
Description: Back in the 1960s, Disneyland had a ride called 'Utopia'. It was a glimpse into the future of human cities and gave us a taste of what smart cities could be. Alastair Hartrup, Global CEO, Network Critical, takes up the story

Titania Paws Studio 3.2.2         

Type: Product Review       Published: 03-2018      Views: 236   
Description: SMEs daunted by data protection regulations and the looming GDPR (General Data Protection Regulation) can rest easy with Titania's Paws Studio

Cardwave launches SafeToGo Solo, a new GDPR compliant hardware encrypted USB

Type:       Published: 03-2018      Views: 199   
Description: Cardwave, a leading expert in flash memory technology solutions has expanded its SafeToGo® USB security range with a new GDPR compliant AES-256 bit XTS hardware encrypted USB 3.0

TEISS cracking cyber security

Type:       Published: 03-2018      Views: 198   
Description: The European Information Security Summit 2018

700% surge in highly paid data protection jobs

Type: News       Published: 03-2018      Views: 199   
Description: With just two months to go until the UK’s biggest overhaul of data protection law for two decades, data protection professionals are enjoying a jobs opportunity surge - according to new figures released by the world’s largest job site, Indeed.

City, University of London, selects PhishMe for phishing and ransomware protection

Type: News       Published: 02-2018      Views: 257   
Description: University employs human behavioural conditioning techniques designed to build student and staff resilience to phishing

Bitdefender and NETGEAR collaborate on IoT security

Type: News       Published: 01-2018      Views: 303   
Description: Bitdefender and NETGEAR have announced a technology licensing agreement that allows NETGEAR to include Bitdefender’s breakthrough IoT security technology on certain of its networking devices.

Radware report highlights rise in ransomware attacks

Type: News       Published: 01-2018      Views: 611   
Description: Untraceable ransom payments can be a lucrative opportunity for hackers as cryptocurrencies increase in value

Application-Layer DDoS Attacks: Bad Things Come in Small Packages         

Type: Masterclass       Published: 01-2018      Views: 1053   
Description: Distributed Denial of Service (DDoS) attacks come in many flavours. Here, Charlotte Gurney, Marketing Manager, Brookcourt Solutions, considers one in particular

Cyber-Attacks Concealed         

Type: Comment       Published: 01-2018      Views: 144   
Description: It is worrying to hear that some UK banks still aren't telling regulators about all the cyber-attacks wreaked on the financial services industry, despite a 10-fold increase in reports to the Financial Conduct Authority (FCA) over the last four years

It's war - and it's now         

Type:       Published: 01-2018      Views: 990   
Description: Cyber warfare is a real threat - and happening somewhere now, as this is being written

Laptops Blitzed in under 30 seconds         

Type:       Published: 01-2018      Views: 253   
Description: What if your laptop could be 'backdoored' via a technology almost everyone uses and trusts: Intel. It's not simply a possibility, however - it's been reported as happening on a massive scale

Hacking on the cheap         

Type:       Published: 01-2018      Views: 363   
Description: A team of experts bypassed an iPhone's fingerprint sensor and manipulated facial and voice recognition security systems on various banking apps. Cost of the 'technology' to do this? Around £45

Taking the fight to the enemy         

Type:       Published: 01-2018      Views: 241   
Description: David Ferbrache, chief technology officer in KPMG's cyber security practice, takes a close look at key areas where organisations should focus their attention in the 12 months ahead

Real solutions, not band-aids!         

Type:       Published: 01-2018      Views: 466   
Description: Enterprise I.T. is faced with a treadmill of challenges fuelled by new cloud and mobile initiatives. How can these be engaged with at the highest level and overcome?

First small steps… .. but a long way to go         

Type:       Published: 01-2018      Views: 509   
Description: NHS Digital is investing £20m in a new Cyber Defence Unit to protect critical systems and sensitive patient data from the threat of hackers. Is it enough, though?

Armed to fight back         

Type:       Published: 01-2018      Views: 240   
Description: Cybercriminals have never had so many technology weapons at their fingertips with which to attack organisations. Having the right protection skills and knowledge is vital

Through the glass, darkly         

Type: Feature       Published: 01-2018      Views: 491   
Description: Computing Security asked those in the know to do some future-gazing and give us their top predictions for cybersecurity in 2018. Here's what they had to say

The Vital Link         

Type:       Published: 01-2018      Views: 343   
Description: Predictive analytics is not a miracle cure. But it can help to alter how organisations look at security operations and incident response workflow, when properly embraced

Titania Nipper Studio 2.5         

Type: Review       Published: 01-2018      Views: 310   
Description: Network routers, firewalls and switches are essential to business operations and yet their very complexity makes them easy targets for cyber criminals

Concerned about GDPR compliance? VTL could be part of the solution

Type: Feature       Published: 12-2017      Views: 2111   
Description: By now, you have probably heard that we’re set to see the biggest change to data privacy legislation in decades with the introduction of the General Data Protection Regulation (GDPR) on 25th May 2018. But do you know how it will affect different areas of your business, and are you sure that you’ll be compliant by the May deadline?

CYJAX Achieves ISO 27001 Certification

Type: Feature       Published: 12-2017      Views: 283   
Description: CYJAX, the award-winning cyber threat intelligence company, has become what is said to be the first organisation of its type in the world to achieve ISO 27001 certification

75% of organisations report no strategy to manage and secure DevOps secrets

Type: News       Published: 11-2017      Views: 335   
Description: DevOps and security professionals have worrying knowledge gaps about where privileged accounts and secrets exist across the IT infrastructure, according to the first findings to be released from CyberArk’s Advanced Threat Landscape 2018 report. When offered several options ranging from PCs / laptops to microservices, cloud environments and containers, nearly all (99%) failed to identify all places where privileged accounts or secrets exist.

Cyber Security Lessons from Nursery

Type:       Published: 11-2017      Views: 530   
Description: By Alastair Hartrup, Global CEO of Network Critical

Evidence Talks steps up fight against insider fraud

Type: Product News       Published: 11-2017      Views: 375   
Description: In the modern business climate, a multitude of malicious threats are testing every aspect of an organisation’s defences. However, one of the biggest challenges faced is not external – it comes from the threat within

Data security a major concern for businesses in 2017 ahead of GDPR, finds new Kaseya research

Type: News       Published: 11-2017      Views: 399   
Description: A new piece of research commissioned by IT systems management provider Kaseya has revealed that attempting to secure data and privacy has proven to be one of the biggest challenges in 2017, as voted for by 44% of IT executives.

Things To Consider When Choosing A Cyber Security Vendor

Type:       Published: 11-2017      Views: 365   
Description: By Ian McGregor, CRO, Invinsec

Mission? Detection!         

Type: Opinion       Published: 11-2017      Views: 481   
Description: New variations of advanced persistent threats continue to make the headlines. Now organisations are increasingly focused on fighting them off


Type: Feature       Published: 11-2017      Views: 1065   
Description: Attacks against applications have now reached new heights of intensity and sophistication. Just how do you keep the attackers at arm's length?

Mighty storm unleashed         

Type: Feature       Published: 11-2017      Views: 465   
Description: New cyber-storm clouds are gathering, threatening even more potential damage than the fearsome Mirai botnet of 2016

SWIFT Customer Security Controls Compliance: An Application-Centric Approach to Cybersecurity         

Type: Masterclass       Published: 11-2017      Views: 960   
Description: Charlotte Gurney, Group Marketing manager at Brookcourt Solutions & Partner (Cix Software), outlines how organisations need to change their approach to cybersecurity to meet the SWIFT customer security programme mandate

China Crackdown         

Type: Feature       Published: 11-2017      Views: 382   
Description: Censorship controls on social media are rife in China, as it enforces new draconian cybersecurity laws, posing serious problems for businesses active in the country

Paradise lost?         

Type: Comment       Published: 11-2017      Views: 224   
Description: The breach of the Appleby law firm, now dubbed the 'Paradise Papers', has seen a raft of salacious information pour out into the public domain, with the private documents of the rich and famous laid bare for all to see

Back to Basics         

Type: Feature       Published: 11-2017      Views: 514   
Description: Demanding that greater powers should be given to regulators to prevent cybercrime may simply be putting the cart before the horse

GDPR: The Silver Lining         

Type: Opinion       Published: 11-2017      Views: 1139   
Description: Are there four letters presently capable of generating greater fear and anxiety for organisations around the world than GDPR? Colin Tankard, managing director, Digital Pathways, seeks to alleviate those concerns

Life on the cutting edge         

Type: Opinion       Published: 11-2017      Views: 322   
Description: The way must now be paved for the adoption of cutting-edge technologies, tackling the barriers that businesses are facing, says the CBI

Uniting forces to tackle cyber risk         

Type: Feature       Published: 11-2017      Views: 310   
Description: The level of cyber exposure to which an organisation is liable can be a major concern - especially as many have no idea how large or dangerous that might prove

Leading the fightback through the power of I0T         

Type: Feature       Published: 11-2017      Views: 406   
Description: The level of cyber exposure to which an organisation is liable can be a major concern - especially as many have no idea how large or dangerous that might be

Computing Security Awards 2017         

Type: Awards       Published: 11-2017      Views: 194   
Description: Excellence Shines Through

Anti Spam Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 235   
Description: WINNER: LibraEsva - Libra ESVA

Anti Malware Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 254   
Description: WINNER: Malwarebytes - Endpoint Security

Threat Intelligence Award – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 226   
Description: WINNER: Cyjax - Cyber Threat Intelligence

Content Security Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 314   
Description: WINNER: Trend Micro

Network Security Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 201   
Description: WINNER: Titania

Encryption Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 195   
Description: WINNER: WinMagic

DLP Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 208   
Description: WINNER: GhangorCloud - Information Security Enforcer

Mobile Security Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 229   
Description: WINNER: Wandera - Secure Mobile Gateway

Identity and Access Management Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 239   
Description: WINNER: My1Login

Anti Phishing Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 239   
Description: WINNER: Red Sift - OnDMARC

Network Access Control Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 204   
Description: WINNER: Portnox - Portnox Core

Cloud Security Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 219   
Description: WINNER: Egress Software Technologies - Egress Switch

Anti Ransomware/ Anti DDos Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 207   
Description: WINNER: Rohde and Schwarz Cybersecurity - Browser in the Box

Advanced Persistent Threat (APT) Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 289   
Description: WINNER: Performanta - TrapX

Secure Data Erasure Company of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 212   
Description: WINNER: Computer Disposals

Security Recruitment Company of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 200   
Description: WINNER: Evolution Recruitment Solutions

Education and Training Provider of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 220   
Description: WINNER: ZeroDayLab

Pen Testing Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 212   
Description: WINNER: Redscan - Redscan Pen Testing

Web Application Firewall of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 192   
Description: WINNER: F5 Networks - Application Security Manager

Security Service Provider of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 195   
Description: WINNER: Brookcourt Solutions

Security Distributor of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 201   
Description: WINNER: Nuvias –formerly Wick Hill

Security Reseller of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 177   
Description: WINNER: Brookcourt Solutions

SME Security Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 205   
Description: WINNER: Winmagic

Enterprise Security Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 224   
Description: WINNER: Arbor Networks - Arbor Cloud

The Compliance Award – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 197   
Description: WINNER: Kingston Technology

Security Project of the Year - Private Sector – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 200   
Description: WINNER: Borussia Dortmund / Cyjax

Security Project of the Year - Public / Not for Profit Sector – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 208   
Description: WINNER: Peabody Trust / Egress

New Product of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 208   
Description: WINNER: Digital Pathways

Editor’s Choice – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 225   
Description: WINNER: Malwarebytes

The Contribution to Cyber Security Award – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 257   
Description: WINNER: Phil Richards (Ivanti)

The ‘One to Watch’ Security Company – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 209   
Description: WINNER: Capita Cyber Security

Anti Cybercrime Award – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 197   
Description: WINNER: RSA

Security Company of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 195   
Description: WINNER: Malwarebytes

APCON expands product portfolio

Type:       Published: 11-2017      Views: 153   
Description: Copper Bypass TAP Appliance, a fail-safe security and traffic visibility solution, supports five inline network security tools

Email best-practices have never been more essential

Type: Feature       Published: 10-2017      Views: 269   
Description: By Dr.Rois Ni Thuama, head of cybersecurity governance partnerships and legal at email security firm OnDMARC

Sophos adds Synchronized App Control to the latest version of XG Firewall

Type: News       Published: 10-2017      Views: 283   
Description: Sophos has announced the latest version of its next-generation Sophos XG Firewall that delivers a breakthrough in network traffic visibility.

Computing Security Awards 2017 - The Winners!

Type: Awards       Published: 10-2017      Views: 340   
Description: The winners of the 2017 Computing Security Awards were announced on 12th October at a gala ceremony in London. We'd like to thank everyone who took the time to vote online and once again congratulate all of this year's winners and runners-up!

Threat Intelligence gets to truth of Dortmund bombing

Type: Case Study       Published: 10-2017      Views: 191   
Description: The following case study illustrates the continued collaboration and convergence of logical and physical security, and demonstrates how the use of Cyber Threat Intelligence was used in a real-world situation to great positive effect

Pragmatism and computing security

Type: Opinion       Published: 09-2017      Views: 637   
Description: Rodolfo Saccani, Libraesva Security R&D manager, outlines the benefits of a pragmatic approach to email security

Machine Learning Applied to Cyber Security         

Type: Masterclass       Published: 09-2017      Views: 1037   
Description: Techniques in artificial intelligence (AI) and machine learning are changing our view of the world. Charlotte Gurney, group marketing manager, Brookcourt Solutions, discusses how cyber security has seen some of the widest-ranging and impacting implementations of machine learning, deep learning, natural language processing, and more

Bolstering Your Own Defences         

Type:       Published: 09-2017      Views: 284   
Description: Cyber-criminals usually trick users by positing their wares as legitimate downloads of new and popular applications. How do you thwart them and stay safe?

Behind the scenes at Capita Cyber Security         

Type: Interview       Published: 09-2017      Views: 596   
Description: Significant change is now taking place at Capita Cyber Security. CEO Kevin Gordon explains for Computing Security the major influences that are driving this success

Framework for a fightback         

Type: Comment       Published: 09-2017      Views: 202   
Description: I note that the Institute of Information Security Professionals (IISP) has released the first IISP Knowledge Framework as part of its commitment to improving the levels of understanding and professionalism in the face of a growing tide of cybercrime and attacks

Health check: a varied prognosis         

Type:       Published: 09-2017      Views: 305   
Description: The government's latest Cyber Governance Health Check Report is a mixed bag. While many businesses recognise the need for tight cyber security, there remain areas of real neglect

Securing email is essential         

Type:       Published: 09-2017      Views: 384   
Description: Colin Tankard, Managing Director, Digital Pathways, examines why email is now such an essential communications and collaboration tool for both employees and consumers

Harsh winds of change ahead         

Type:       Published: 09-2017      Views: 328   
Description: Proposed changes to UK data protection laws have been outlined by the government. Brian Wall has been gauging reaction from around industry on their likely repercussions

In the line of fire         

Type:       Published: 09-2017      Views: 317   
Description: A plethora of regulations are soon to hit UK businesses, imposing harsh penalties where there is overt failure to comply. Yet some organisations don't think the new rules even apply to them. Brian Wall reports

How easy is it to steal a friend's identity?         

Type:       Published: 09-2017      Views: 274   
Description: A new BBC TV drama shows JUST how easy it is to steal the identity of someone close to you. Now individuals are being urged to think carefully about where they share their personal information

Fear and loathing in cyberspace: the summer of ransomware         

Type: Opinion       Published: 09-2017      Views: 419   
Description: Infecting computers and holding businesses to ransom has become very big business. Malwarebytes VP, Anthony O'Mara, considers how organisations can fight back

Malwarebytes Endpoint Protection         

Type: Review       Published: 09-2017      Views: 402   
Description: Malwarebytes’ next-generation Endpoint Protection (MEP) places seven layers of detection technology on your endpoints. Called ‘multi-vector protection’, it employs a signature-less, rules-based approach, to protect against known and unknown malware.

Outside in         

Type:       Published: 09-2017      Views: 499   
Description: Do managed security services providers really have superior expertise and deliver this to a business at a fraction of the cost of in-house security resources?

The Rise and Rise of Ransomware         

Type: Opinion       Published: 09-2017      Views: 488   
Description: Javvad Malik, security advocate at AlienVault, reflects on how the digital revolution has made ransomware such a powerful and ominous presence

Red Sift OnDMARC         

Type: Review       Published: 09-2017      Views: 398   
Description: Email is the weapon of choice for cyber criminals, with phishing and spoofing attacks increasing exponentially. Red Sift’s OnDMARC aims to streamline the entire process of implementation, reporting and ongoing management to counteract these assaults.

You don't have to be a victim         

Type:       Published: 09-2017      Views: 436   
Description: Computing Security investigates how businesses can keep themselves safe from such pernicious assaults as targeted attacks

NHS IT leaders fear harm to patients from widespread hacking of confidential data

Type: News       Published: 09-2017      Views: 418