Backup Collaboration Mobile Security Storage Strategy Virtualisation
ALL | CAD | Cloud Hosting | Construction | Document | Green | Networking | Security | Storage

Article Index: Security>(Topic)>(Company)>(Product)>(Editorial)>(Date)      

Sort Articles By :    Most Popular           Latest     

Current Page: 1        | 1 | 2 |        954 Article(s)  Total Views of these articles: 1029579

Five FTP Server Security Fails: FTP Issues and How to Avoid Them         

Type:       Published: 01-2015      Views: 32634   
Description: When Patrick Clark, network analyst, higher education, Greenville, NC, asked fellow analysts and engineers for their thoughts on how FTP servers could be more secure, the prevalent response was: "Don't use them." Here follows his own take on this

Female techie boosts cyber security team         

Type: News       Published: 10-2016      Views: 24071   
Description: First -class honours security engineering graduate Preena Patel has joined Equilibrium Security - and becomes the latest of three graduates to join its security engineering team in the last 12 months

Acunetix Online Vulnerability Scanner         

Type: Review       Published: 05-2015      Views: 11233   
Description: In today's competitive global markets, SMBs need to protect their web sites from hackers just as much as enterprises do, but few have the financial resources to ensure they are totally secure

Life beyond the walls         

Type: Industry Focus       Published: 05-2019      Views: 10981   
Description: Constructing high walls around a corporate environment may well be a security approach that is now delivering ever more diminishing returns

Sane strategies in risk-infested waters

Type: Industry Focus       Published: 11-2015      Views: 10029   
Description: What steps does any business have to take to get governance, risk and compliance right - and what dangers might surface along the way?

IoT - the good and the bad         

Type:       Published: 03-2017      Views: 8260   
Description: With as many as 30 billion machines and other physical products expected to be hooked up to the Internet, can organisations really stay safe? Brian Wall reports

Upping the ante with anti-malware         

Type: Industry Focus       Published: 03-2016      Views: 7808   
Description: Combating malware means going way beyond locating suspicious programs on servers and workstations, and detecting and interfering with the use of malware on the network

GhangorCloud Information Security Enforcer         

Type: Review       Published: 07-2016      Views: 7758   
Description: Security breaches relating to IT now have such serious consequences that enterprises must protect to survive

Gemalto SafeNet ProtectV 2.0         

Type: Review       Published: 05-2015      Views: 7717   
Description: The cost benefits alone make moving virtualised data centres into the cloud a no-brainer, but concerns about security are still a major stumbling block

Malware malevolence         

Type:       Published: 03-2017      Views: 7253   
Description: The average data breach results in a cost of $158 per stolen record and is often not detected for an average of 229 days, it is estimated. Where should the fightback against malware begin?

Libra ESVA 3.5 Review         

Type: Review       Published: 05-2015      Views: 6943   
Description: Based in Italy, Libra scores over the big names in the anti-spam market as its ESVA (email security virtual appliance) offers tough messaging security at a very affordable price. Ideally suited to enterprises and SMBs alike, ESVA employs a 13-step filtering process and claims a near-perfect spam detection rate

Friendly Fire: the insider threat         

Type:       Published: 01-2016      Views: 6928   
Description: Nullifying the malicious insider threat poses a different challenge to that of solving the intruder threat. So what are your options when the attackers are inside the building?

Ixia ThreatARMOR         

Type: Review       Published: 11-2016      Views: 6689   
Description: The amount and sophistication of cyber-attacks is increasing exponentially and many enterprises are finding their security systems are wilting under the pressure

No more password buck-passing!         

Type: Opinion       Published: 05-2016      Views: 6534   
Description: Do weak passwords keep you awake at night? David Hald of SMS PASSCODE and Dan Evans of VCW Security explain just why they should, in a follow-up to our feature last issue

Who's afraid of APT?         

Type:       Published: 11-2016      Views: 6261   
Description: An advanced persistent threat (APT) uses multiple phases to break into a network, avoid detection and harvest valuable information over the long term. How do you fight back against those odds? What should be your strategy? Brian wall reports

Security Service Provider of the Year – Computing Security 2015

Type: Awards       Published: 11-2015      Views: 5777   
Description: WINNER: ZeroDayLab

Thinking your way to safety         

Type:       Published: 07-2016      Views: 5076   
Description: The tools and technology that can help organisations to embrace a secure future are close to hand. But first they need to put the structures in place to make that happen

Don't be a data breach casualty!         

Type: Industry Focus       Published: 07-2015      Views: 4821   
Description: Today's highly sophisticated cyber attacks demand a security system that continuously develops and resists the abundance of attack patterns the 'enemy' now employs

Single point of control         

Type:       Published: 03-2015      Views: 4693   
Description: Identity and access management solutions - how much of a difference do they really make to an enterprise's defences? Computing Security asks those in the know.

Chasing away the turbulent clouds         

Type:       Published: 09-2015      Views: 4631   
Description: Security skills are in limited supply and, as such, cost and retention of security teams can be a significant challenge. this is a major factor now driving the growing race to the cloud – though it’s far from the only one, as computing security reports

macmon NAC         

Type: Review       Published: 07-2015      Views: 4383   
Description: Network access control has traditionally had a mixed reception in enterprises, as all too many solutions are notoriously difficult to install, complex to manage and expensive

Time to share the pain         

Type: Feature       Published: 07-2018      Views: 4011   
Description: Is the cloud right for everyone? That, says one leading observer, is the wrong question. "Like any evolutionary development, it's our current reality." But woe betide those who fail to take every security measure along the way

The Exploitation Game         

Type: Industry Focus       Published: 11-2015      Views: 3990   
Description: What steps can be taken to detect and block exploits as soon as they attempt to use software vulnerabilities? And how can businesses get a clear understanding of the behaviour of legitimate software components?

After the flood         

Type: Industry Focus       Published: 05-2016      Views: 3697   
Description: With mobile devices now seemingly everywhere, and more and more applications pouring into the market, mobile monitoring and device management have never been so vital

To err is human, but…         

Type:       Published: 05-2015      Views: 3648   
Description: According to the IBM Security Services 2014 Cyber Security Intelligence Index report, over 95% of all incidents investigated recognise human error as a contributing factor.

Sun or rain, bring it on!         

Type: Opinion       Published: 05-2018      Views: 3449   
Description: Is the cloud right for everyone? That, says one leading observer, is the wrong question. "Like any evolutionary development, it's our current reality." But woe betide those who fail to take every security measure

Success at InfoSec         

Type: Events       Published: 07-2015      Views: 3438   
Description: Infosec 2015 bustled and thrived for three days in June at its new London base OF Olympia. Computing Security was there to catch all the action.

Titania TEC         

Type: Review       Published: 07-2015      Views: 3350   
Description: UK-based Titania has a sharp focus on data security compliance and its latest TEC aims to make regulatory auditing on all network devices a breeze

The year ahead - what lies in wait?         

Type: Industry Focus       Published: 01-2015      Views: 3263   
Description: 2014 was a tumultuous 12 months: think only Heartbleed, Sony and JP Morgan Chase. 2015 may be even more daunting. Here are some of the things you can look forward to - or not! - according to the experts. Brian Wall reports.

Cloud gets personal         

Type:       Published: 01-2015      Views: 3214   
Description: IBM has patented the design for a data privacy engine that can help businesses protect personal data as it is shared between countries, including across private clouds.

It's a mixed-up, muddled up, shook-up world         

Type:       Published: 01-2017      Views: 3179   
Description: Security breaches ripped through the defences of one organisation after another last year. Can we expect 2017 to be any different?

Protecting your digital identity         

Type: Industry Focus       Published: 09-2015      Views: 3146   
Description: Digital services are expanding rapidly, making the chances of identity theft an ever greater reality. Businesses must take every step necessary to ensure they don’t become the next victim.

CODE RED! An essential guide to protecting your data         

Type: Industry Focus       Published: 11-2015      Views: 3017   
Description: How should organisations minimise the likelihood that unauthorised code is able to manipulate applications, in order to access, steal, modify or delete sensitive data? Computing Security investigates

Integral Memory Crypto SSD         

Type: Review       Published: 07-2015      Views: 2893   
Description: It beggars belief that, even with all the publicity surrounding data protection, hardly a week goes by without us hearing about yet another government department or business losing sensitive or personal data

Hand-to-hand combat         

Type: Industry Focus       Published: 07-2015      Views: 2889   
Description: How concerned should businesses in the UK be about cyber assaults – are the attackers gaining the upper hand? And how do they best protect themselves from malware?

The human factor          

Type: Industry Focus       Published: 03-2016      Views: 2829   
Description: The barriers that keep any organisation safe from attack are often guarded by nothing more than a single factor of authentication. Just one weakness and the whole business can be breached.

Everything connected - and safe         

Type:       Published: 05-2015      Views: 2813   
Description: The Internet of Everything (IoE) brings together people, process, data and 'things' to make networked connections more relevant and valuable than ever before. But it also brings a great deal of risk that needs to be carefully controlled and managed.

Cybercrime figures 'tip of the iceberg'

Type: Feature       Published: 03-2020      Views: 2755   
Description: A reported fall in 'computer misuse' disguises a link with the rise in fraud, it is claimed

The right train of thought         

Type: Industry Focus       Published: 09-2016      Views: 2748   
Description: IT security training could not be more essential. But what should the practices and policies be that underscore this? Who should be responsible for making the decisions relating to that training and how exactly should employees be monitored?

Under pressure, taking control         

Type:       Published: 07-2015      Views: 2669   
Description: Managed security services providers may promise the expertise, knowledge and infrastructure you need to secure your information assets from Internet attacks, often at a fraction of the cost of in-house security resources. But does the reality actually live up to the promises?

EOL - Getting it right!         

Type: Industry Focus       Published: 05-2015      Views: 2639   
Description: In a world where data proliferates – and is growing at a staggering rate - ensuring end-of-life (EOL) sensitive data and intellectual property is erased both securely and cost-effectively is crucial. But exactly how do you achieve that goal?

Thycotic Secret Server         

Type: Review       Published: 11-2015      Views: 2636   
Description: Privileged account credentials are the number one target for today's cyber criminals, as they provide easy access to the very heart of a business's IT infrastructure

8MAN: from protected-networks.com         

Type: Review       Published: 01-2015      Views: 2632   
Description: A fundamental requirement for meeting compliance regulations is Active Directory (AD) auditing, but many businesses still do not have the tools in place to achieve this effectively

Lepide Auditor Suite 15.2         

Type: Review       Published: 11-2015      Views: 2617   
Description: Change auditing is an essential requirement for enterprises, helping them to comply with ever tougher data protection regulations

Concerned about GDPR compliance? VTL could be part of the solution

Type: Feature       Published: 12-2017      Views: 2596   
Description: By now, you have probably heard that we’re set to see the biggest change to data privacy legislation in decades with the introduction of the General Data Protection Regulation (GDPR) on 25th May 2018. But do you know how it will affect different areas of your business, and are you sure that you’ll be compliant by the May deadline?

Malwarebytes Breach Remediation         

Type: Review       Published: 03-2016      Views: 2578   
Description: Enterprises can never let their guard down in the fight against malware

Technologies to keep you safe         

Type: Opinion       Published: 01-2015      Views: 2554   
Description: With attacks increasing in frequency and sophistication, which are the technologies that can best protect your organisation? Global analyst Gartner offers some insights.

Full-on visibility         

Type: Feature       Published: 07-2018      Views: 2552   
Description: When fast-growing company HubSpot needed to gain better visibility of devices on their network and track down potential malicious activity, it turned to ForeScout

Navigating the forest of security certifications         

Type: Opinion       Published: 03-2015      Views: 2548   
Description: Patrick Warley, global head of research & development at Integral Memory, delivers his insights into the level of quality reassurance provided by the many security certification offerings now 'out there'

Sealing up the leaks         

Type: Industry Focus       Published: 07-2016      Views: 2541   
Description: What does a successful data protection strategy look like in the face of eroding security perimeters, increasing targeted attacks, and evolving user habits and expectations?

Time for friendly enforcement!         

Type:       Published: 01-2015      Views: 2532   
Description: With mobile devices now seemingly everywhere, and more and more applications flooding the market, mobile monitoring and device management have never been so vital.

Titania Nipper Studio 2.5         

Type: Review       Published: 01-2018      Views: 2493   
Description: Network routers, firewalls and switches are essential to business operations and yet their very complexity makes them easy targets for cyber criminals

Top 3 data security threats         

Type: Opinion       Published: 05-2015      Views: 2491   
Description: Roman Foeckl, CEO and founder of CoSoSys, offers his insights on how to mitigate threats through a sound data security plan

Northamber out to shake up security market

Type: Industry Focus       Published: 11-2015      Views: 2473   
Description: With a newly launched solutions division and two security vendors just signed up, distributor Northamber is aiming to drive growth to new heights

Acunetix 11         

Type: Product Review       Published: 05-2017      Views: 2471   
Description: With web sites now under a daily onslaught of attacks, businesses can't afford to be lax about security

Things are not always what they SIEM!         

Type:       Published: 03-2015      Views: 2468   
Description: Security information and event management is now widely seen as critical, as vast quantities of data are generated from multiple sources. Brian Wall reports.

Managing email security         

Type: Industry Focus       Published: 05-2016      Views: 2425   
Description: Businesses place heavy reliance on email - making it a prime target for hackers. But can any single system lock them out?

The Smoking Gun         

Type: Industry Focus       Published: 11-2015      Views: 2409   
Description: Encryption is vital for protecting precious data. But, in the wrong hands, it can be a weapon that is turned upon its owner - with devastating consequences

Social Engineering and Red Teaming: Risks, rewards and approaches that work         

Type: Masterclass       Published: 07-2019      Views: 2396   
Description: Paul Harris, CEO, Pentest Ltd, A Shearwater Group plc company, explains the benefits that Open Source Intelligence (OSINT) can deliver in the ongoing battle against cyber attacks

Encryption to amaze         

Type: Industry Focus       Published: 05-2016      Views: 2389   
Description: Truly effective encryption that actually protects data wherever it may reside is an absolute must for any business or organisation dealing with sensitive data

Battle for Cloud domination         

Type:       Published: 07-2016      Views: 2375   
Description: The biggest concern in cloud right now is security. According to Oracle executive chairman Larry Ellison: "We need much better security. We need a next-generation of security, because… we are losing a lot of these cyber battles. We haven't lost the war. But we're losing battles."

Linkedin secure after acquisition?         

Type: News       Published: 07-2016      Views: 2368   
Description: With the news that Microsoft has acquired LinkedIn in a deal worth US$26.2 billion, the software giant believes the acquisition will expand the market for both company's products

Finger on the security pulse         

Type:       Published: 01-2015      Views: 2345   
Description: In the escalating and increasingly fraught battle to outwit the fraudsters, biometrics is now beginning to exert an ever greater influence, as Brian Wall reports.

Symantec names new VP & MD FOR Northern Europe          

Type: News       Published: 07-2015      Views: 2341   
Description: Symantec has further strengthened its growth by appointing industry veteran Keith Bird as vice president & managing director for Northern Europe with responsibility for UK, Ireland and the Nordic region

Tipping the balance!         

Type: Opinion       Published: 07-2015      Views: 2335   
Description: How do you best manage the upwardly mobile workforce? Patrick Warley, Global Head of Research & Development, Integral Memory, manufacturers of the Crypto range of hardware encrypted SSDs, offers his 7 TOP tips

The CryptoFlow App from Certes Networks         

Type: Review       Published: 11-2015      Views: 2315   
Description: Certes Networks has an enviable reputation in the data security world

Promoting a culture of security awareness

Type: Industry Focus       Published: 07-2015      Views: 2276   
Description: Dr Anand Narasimhan, Director UK, EU & IN, Sims Recycling Solutions, explains why instilling the attentiveness to security across an organisation is so critical

Privileged account management put to the test         

Type: News       Published: 05-2015      Views: 2274   
Description: A report by a leading industry analyst firm has stated that there are five key solution areas for privileged account management (PAM)

Macro Malware: An Unexpected Return

Type: Opinion       Published: 11-2015      Views: 2274   
Description: The re-emergence of macro malware after more than 10 years, when it seemed to have died out, does not augur well, warns CYREN

Enterprise-wide Network Segmentation with Forescout eyeSegment

Type: Review       Published: 01-2020      Views: 2230   
Description: Network segmentation is increasing in popularity, as it is proving to be a highly effective security strategy. Segmentation can reduce the attack surface presented by today's legacy flat networks, limit the impact of network intrusions and prevent lateral movement, if breaches occur

Defences put to the test         

Type:       Published: 03-2015      Views: 2222   
Description: Penetration testing is a key weapon for establishing how secure networks, infrastructures and public-facing applications are running as part of an organisation's IT - helping them understand the risks they face from attacks by malicious users or hackers.

Staying ahead of threats         

Type: News       Published: 05-2015      Views: 2216   
Description: AlienVault is to work with HP to broaden the reach of cyber threat intelligence sharing

IT professionals fight back against their assailants         

Type: News       Published: 11-2016      Views: 2208   
Description: The received wisdom is that European IT security professionals are being subjected to overbearing pressure from adversaries when it comes to dealing with cybersecurity

Seeking out hidden threats         

Type:       Published: 01-2015      Views: 2195   
Description: Predictive analytics is an emerging detection capability that can help security professionals seek out the enemy when they attack their systems.

Understanding the differences between antivirus and anti-malware         

Type: Masterclass       Published: 11-2015      Views: 2177   
Description: Seeking the best way to reducing your attack surface? First, you need to understand the differences between antivirus security and anti-malware security, says internet security company Malwarebytes

IoT - much loved ... and maligned

Type: Industry Survey       Published: 05-2019      Views: 2160   
Description: While IoT has won plaudits from many for the positives it delivers, there is another side: the very real business repercussions that can come as a result of poor IoT security

New malware unlocks corporate defences for hackers         

Type: News       Published: 01-2015      Views: 2141   
Description: Dell SecureWorks' Counter Threat Unit (CTU) researchers have discovered malware that allows hackers to authenticate as any corporate user within an organisation, giving the threat actors unfettered access to a target organisation's computer systems

Average cost of a data breach soars to £2.37 million         

Type: News       Published: 07-2015      Views: 2141   
Description: Latest research from The Ponemon Institute in association with IBM has found that the average cost of a data breach in the UK rose by some 7% over the last two years to a staggering £2.37 million, while the average cost per lost or stolen record is now £104

'Selfies' that aim to catch out device thieves         

Type: News       Published: 01-2015      Views: 2081   
Description: Certificate authority and internet security organisation Comodo has released Comodo Mobile Device Management 3.0 (CMDM 3.0), available with cloud server options

Titania PAWS Studio 2.4.4

Type: Review       Published: 11-2015      Views: 2081   
Description: SMBs that want to show compliance with data protection regulations will like Titania's PAWS Studio a lot

Crime-busting academy unveiled         

Type: News       Published: 07-2015      Views: 2072   
Description: A new crime-busting International Cyber Academy has been launched

Be wary of wearables         

Type: Industry Focus       Published: 01-2016      Views: 2062   
Description: Wearables are the latest big innovation for the mobile devices market. But they bring substantial security threats with them

You can't prevent what you can't see         

Type: Masterclass       Published: 09-2018      Views: 2060   
Description: Charlotte Gurney, Marketing Manager, Brookcourt Solutions, and Marvin Josif, from Cix Software, look at the criticality of full visibility when facing advanced persistent threats

Think like an Attacker: A strategic risk-based approach to cyber security

Type: Opinion       Published: 05-2019      Views: 2059   
Description: Occurrences of data theft, corporate reputational damage, cybercrime, state-sponsored actors and hacktivists would fill several volumes - with room to spare. A strategic approach to cyber security has never been more necessary or urgent

So far, so good...         

Type: Opinion       Published: 03-2015      Views: 2052   
Description: In our last issue, we highlighted the likely threats that will hit organisations across the UK in the 12 months of 2015. In this follow-up, more industry experts share their insights and concerns as the year unfolds

The Data Breach Blindspot         

Type: Masterclass       Published: 01-2016      Views: 2036   
Description: How do you control data breaches that threat systems miss (or take too long to find)? Here, Adam Boone, chief marketing officer at Certes Networks, offers his insights

Ethical hacking under scrutiny         

Type: News       Published: 07-2015      Views: 2014   
Description: The UK cyber security industry would benefit from increased standardisation of widespread 'penetration testing' techniques, a new report has highlighted

New research highlights worrying lack of mobile app security         

Type: News       Published: 05-2015      Views: 1979   
Description: IBM Security and the Ponemon Institute have released new research unveiling the alarming state of mobile security

BAE Systems' silver lining          

Type: News       Published: 01-2015      Views: 1977   
Description: BAE Systems has completed the acquisition of Perimeter Internetworking Corp, which trades as SilverSky, a commercial cyber service provider

Checkmate         

Type: Feature       Published: 11-2017      Views: 1948   
Description: Attacks against applications have now reached new heights of intensity and sophistication. Just how do you keep the attackers at arm's length?

ATD foresight from ForeScout          

Type: News       Published: 05-2015      Views: 1920   
Description: ForeScout has announced new ControlFabric integrations with several industry-leading advanced threat detection (ATD) solutions, enabling users to quickly and automatically contain advanced persistent threats (APTs), and ultimately disrupt their propagation in the corporate network environment

R&S Trusted Gate from Rohde & Schwarz Cybersecurity

Type: Product Review       Published: 05-2019      Views: 1919   
Description: A cybersecurity strategy to address specific threat profiles can be demanding, but central to each one is the protection of data, the most prized asset

The Cyber Imposters         

Type: Industry Focus       Published: 09-2016      Views: 1917   
Description: An email arrives at work from someone you know well. But is it from that person? Has it been forged? Targeted attacks come in many guises. How do you combat such threats?

Breached in just 82 seconds         

Type: News       Published: 05-2015      Views: 1908   
Description: A startling finding in this year's Verizon's Data Breach Investigations Report is that, in 60% of breaches, attackers are able to compromise an organisation within minutes

Advanced integration with cloud storage apps         

Type: News       Published: 07-2015      Views: 1907   
Description: CoSoSys has announced the development of Endpoint Protector 4 to include new integrations with Dropbox for Business and Box to strengthen data security policies and prevent data losses and theft through employee's data transfers made to cloud-based storage applications

Symantec Names New Executive Leadership Team         

Type: News       Published: 05-2015      Views: 1875   
Description: Since announcing its plan to separate into two publicly traded companies, Symantec has now reached a key milestone

Certes announces SOTI alliance

Type: News       Published: 11-2015      Views: 1843   
Description: Certes Networks has recently announced a partnership with SOTI, a provider of enterprise mobility management (EMM), to enable simplified end-to-end security of sensitive applications for users on the go

The Changing Compliance Landscape: Going Circular

Type: Opinion       Published: 11-2015      Views: 1825   
Description: By Anand Narasimhan, director UK, EU & NI, Sims Recycling Solutions

GDPR - coming, ready or not!         

Type: Comment       Published: 07-2015      Views: 1823   
Description: According to a new survey by iStorage, almost a third of public and private sector professionals are not aware of what the forthcoming EU General Data Protection Regulation (GDPR) will mean to them or their organisations

Unclouded thinking         

Type: Feature       Published: 07-2017      Views: 1812   
Description: With the financial penalties and loss of reputation facing companies that fall victim to a data breach, moving your private data to an external provider is even more challenging

CoSoSys in move to secure Macs

Type: News       Published: 09-2015      Views: 1805   
Description: CoSoSys has now released Mobile Device Management (MDM) features for OS X. Organisations incorporating Macs through BYOD or by issuing Mac computers to the employees can now secure confidential data and manage these computers on different levels.

Traditional defences are simply not enough

Type: News       Published: 11-2015      Views: 1804   
Description: "In today's more vulnerable, distributed network environments, firewalls and antivirus are no longer enough to secure companies against the growing problem of advanced persistent threats and increasingly sophisticated cyber attacks."

Lack of confidence in data security measures         

Type: News       Published: 05-2015      Views: 1799   
Description: New research released by IT analyst firm Quocirca, in conjunction with Digital Guardian, has revealed a growing crisis of confidence amongst UK organisations about the adequacy of their data security measures in the face of growing cyber threats

Shadow IT – hassle and bliss for IT departments         

Type: Industry Focus       Published: 08-2015      Views: 1791   
Description: ‘Shadow IT’ divides companies into IT department and the rest of the people, getting businesses are off to a bad start, warns Roman Foeckl, CEO of CoSoSys

Mobile working a major cause of data breaches, according to new Apricorn research

Type: News       Published: 03-2017      Views: 1791   
Description: Apricorn has announced new research highlighting that a lack of rigor and consistency when it comes to protecting data poses significant security risks, as 70 per cent of IT decision makers agree that securing corporate data is an ongoing battle.

Phoenix survey reveals full extent of BYOD threat

Type: News       Published: 05-2015      Views: 1788   
Description: Around 60% of BYOD workers do not involve their company's IT support in setting up their devices

GDPR: The Silver Lining         

Type: Opinion       Published: 11-2017      Views: 1775   
Description: Are there four letters presently capable of generating greater fear and anxiety for organisations around the world than GDPR? Colin Tankard, managing director, Digital Pathways, seeks to alleviate those concerns

Protecting applications from Firewall failure         

Type: Masterclass       Published: 11-2015      Views: 1750   
Description: How to protect applications, in the context of changing network access and a porous perimeter - Certes Networks provides the strategy

Not all is what it SIEMs         

Type: Industry Focus       Published: 09-2016      Views: 1740   
Description: how do you justify the cost of investing in Security Information and Event Management - SIEM - to those who control the purse strings within your organisation? Computing Security finds out by talking to those in the know.

Cyber crime soars up the risk barometer         

Type: News       Published: 01-2015      Views: 1725   
Description: Businesses face new challenges from a rise of disruptive scenarios in an increasingly interconnected corporate environment - with cyber (17%) and political risks (11%) the most significant movers in the Allianz Risk Barometer 2015

Where will the path lead you now?         

Type:       Published: 01-2016      Views: 1716   
Description: From cybercrime to BYOD; from insider threats to compliance; from identity theft, cloud and beyond, one thing is certain: the rate, intensity and sophistication of attacks and the need to be fully protected against them will only increase over the next 12 months

Fighting the cybercrime onslaught         

Type:       Published: 09-2015      Views: 1704   
Description: What is being done to protect our businesses from the cybercrime blitz they now face? Crucially, what can they do to protect themselves? And can it ever be enough — or are the cybercriminals getting the upper-hand in a one-way battle?

DLP Solution of the Year – Computing Security 2015

Type: Awards       Published: 11-2015      Views: 1702   
Description: WINNER: CoSoSys - EndPoint Protector 4

Keys to Effective Threat Intelligence         

Type: Masterclass       Published: 07-2017      Views: 1693   
Description: A threat intelligence feed gives insights into possible identities of hackers, the methods they use, and the networks they are targeting, says Charlotte Gurney, group marketing manager at Brookcourt Solutions

Auditing / Reporting Solution of the Year – Computing Security 2015

Type: Awards       Published: 11-2015      Views: 1681   
Description: WINNER: Fortinet - FortiAnalyzer

Negotiating the more slippery slopes

Type:       Published: 01-2015      Views: 1675   
Description: With the average cost of security breaches to large organisations increasing to between £600k-£1.15m* in the last year, the role of the security architect has become critical

Combatting the insider threat         

Type: News       Published: 01-2015      Views: 1670   
Description: According to recent reports, Morgan Stanley has joined the growing list of worldwide firms that are facing cyber security issues

Evidence Talks steps up fight against insider fraud

Type: Product News       Published: 11-2017      Views: 1670   
Description: In the modern business climate, a multitude of malicious threats are testing every aspect of an organisation’s defences. However, one of the biggest challenges faced is not external – it comes from the threat within

Under siege - in your own car         

Type: Industry Focus       Published: 07-2016      Views: 1658   
Description: With today's connected vehicle technologies, the risk of potential cyber security threats is vast – and growing – with cars already forced off the road. What can be done to safeguard these systems and drivers?

Kroll Ontrack warns that ransomware attacks on corporate virtual drives are on the rise

Type: News       Published: 09-2015      Views: 1653   
Description: While ransomware is not new, attacks have tended to focus in the past on home and small business computers and, increasingly, on mobile devices. According to Kroll Ontrack, these attacks tend to happen in different clusters or strands that die out after about a month as anti-virus programmes are updated to deal with them.

Human exploitation         

Type:       Published: 07-2015      Views: 1652   
Description: Recent high-profile hacks, including the personal email of US president Barack Obama, cannot disguise one key factor behind such attacks - human frailty

Managing complexity is the top security challenge highlighted by FireMon’s annual firewall report

Type: News       Published: 05-2017      Views: 1647   
Description: FireMon has released its 3rd Annual State of the Firewall Report that surveyed more than 400 organisations about their current security infrastructure and management challenges as well as adoption and impact of emerging technologies such as SDN, cloud, microsegmentation and the Internet of Things (IoT).

Computing Security Awards 2016 - the winners!

Type: News Awards       Published: 10-2016      Views: 1632   
Description: Here are the winners of the 2016 Computing Security awards. We'll have more details available shortly on the awards website. Congratulations again to all of our winners and runners-up, and a big thank you to everyone who took the time to vote.

Give01Day and IASME to secure all UK charities with UK Government's Cyber Essentials Certification

Type: News       Published: 01-2015      Views: 1629   
Description: Give01Day has joined forces with the Government’s Cyber Streetwise campaign and the IASME Consortium to bring the new Cyber Essentials certification to all UK charities and help them operate safely online.

85,000 new malicious IPs a day         

Type: News       Published: 05-2015      Views: 1626   
Description: The new Webroot 2015 Threat Brief reveals that 85,000 new malicious IPs are launched every day - and the top phishing targets are technology companies and financial institutions

Data-centric model is ‘the key to our security’

Type: News       Published: 11-2015      Views: 1624   
Description: Dietrich Benjes, director UK, Ireland and Middle East at Varonis has commented on the recent speech made by Robert Hannigan, in which the GCHQ director observed that the global cyber security market is "not quite right", with standards needing to be improved

At your disposal         

Type: Industry Focus       Published: 05-2016      Views: 1622   
Description: Suffering from Regulation fatigue? Now is the time to take on board the benefits of the new GDPR regulations and the payback they can bring to your business.

Failure in the boardroom         

Type:       Published: 07-2016      Views: 1619   
Description: A lack of board accountability is opening up businesses to cyber-attacks

Gateway to safety         

Type: Opinion       Published: 03-2016      Views: 1614   
Description: Rarely does a single cloud have the silver lining of offering all the applications that enterprise I.T. needs to deliver... enter Identity and Access Management

Application-Layer DDoS Attacks: Bad Things Come in Small Packages         

Type: Masterclass       Published: 01-2018      Views: 1607   
Description: Distributed Denial of Service (DDoS) attacks come in many flavours. Here, Charlotte Gurney, Marketing Manager, Brookcourt Solutions, considers one in particular

What keeps digital leaders awake at night?         

Type: News       Published: 01-2015      Views: 1602   
Description: Security, loss of data and cloud security are the top things that keep digital leaders awake at night, according to a survey from BCS, The Chartered Institute for IT

British gas hack sparks warning

Type: News       Published: 11-2015      Views: 1601   
Description: In the wake of the recent news that the email addresses and account passwords of 2,200 British Gas customers were hacked

It's showtime!         

Type: Opinion       Published: 05-2016      Views: 1599   
Description: It's all going to be there at Infosecurity Europe 2016-everything you need to know about information security

Land of opportunity - and potential catastrophe         

Type: Industry Focus       Published: 03-2016      Views: 1590   
Description: The massive benefits that IOT can deliver in what has now become a hyper-connected society must be set against the countless risks posed each day by Cyberattacks

Beyond the nightmare         

Type: Feature       Published: 09-2016      Views: 1588   
Description: Governance, risk and compliance are vitally important, especially as more and more legislation is introduced that could have grave consequences for any enterprise that flouts its rules

Life after the EU         

Type: Industry View       Published: 07-2016      Views: 1583   
Description: Britain is to leave the EU - the votes were cast and the deed is done. But what is this likely to mean for our industry? Computing Security has been finding out

Showing the way forward         

Type:       Published: 05-2015      Views: 1581   
Description: Infosecurity Europe, at Olympia, London, 2-4 June, will offer countless opportunities to tap into expert advice and discuss your needs and challenges. And the new Infosecurity Intelligent Defence technical research conference looks equally rewarding

Witchcraft slur sparks backlash         

Type: News       Published: 03-2017      Views: 1562   
Description: Computer security companies have been accused of "massively" exaggerating the abilities of malicious hackers

The firewall: what has changed over time?         

Type:       Published: 01-2015      Views: 1561   
Description: Ashish Patel, regional director, network security UKI at McAfee, part of Intel Security, looks back at 25 years of firewall development

SecurEnvoy SecurAccess 8         

Type: Review       Published: 07-2016      Views: 1551   
Description: Two factor authentication (2FA) is the only way forward for security-savvy businesses, as standard username and password combinations are now dangerously insecure

Lancaster University seals strategic research partnership

Type: News       Published: 11-2015      Views: 1549   
Description: Lancaster University has agreed a strategic research partnership with Nettitude - a provider of cyber security services.

Senior management must tackle the insider threat         

Type: News       Published: 05-2015      Views: 1535   
Description: More than half of IT professionals (57%) believe their organisation's senior management does not take enough responsibility for internal security, according to new research from IS Decisions

Mirror, mirror, on the wall         

Type: Feature       Published: 09-2016      Views: 1535   
Description: Many organisations turn to managed security services providers - MSSPs - to deliver the expertise, knowledge and infrastructure they need to secure them from Internet attacks. But how well do they live up to their image?

Time to stem the breach         

Type: News       Published: 07-2015      Views: 1526   
Description: Research conducted by AlienVault has shown that 20% of IT security professionals have witnessed a breach being hidden or covered up

Invisible infrastructure and access management from Cryptzone

Type: News       Published: 04-2015      Views: 1520   
Description: AppGate Secure Access Enables Organizations to Adopt Software Defined Perimeter Approach for Granular Security Control

Partitioning the responsibilities in information security         

Type: Opinion       Published: 07-2018      Views: 1509   
Description: Mustafa Fikret Ottekin, Advisor to CEO in ICterra, reflects on the vital roles to be played by managements and IT departments regarding security

New Cryptzone survey reveals organisations continue to rely on outdated access control

Type: News       Published: 04-2015      Views: 1506   
Description: Report finds inside threats pose highest risk, and security budgets slow to increase, despite recent high-profile attacks

SWIFT Customer Security Controls Compliance: An Application-Centric Approach to Cybersecurity         

Type: Masterclass       Published: 11-2017      Views: 1502   
Description: Charlotte Gurney, Group Marketing manager at Brookcourt Solutions & Partner (Cix Software), outlines how organisations need to change their approach to cybersecurity to meet the SWIFT customer security programme mandate

Aftershock of a data breach         

Type:       Published: 07-2017      Views: 1484   
Description: Stock prices drop by an average of 5% when a data breach is disclosed. The impact on reputation can be even more damaging

Don’t get left on the shelf!         

Type: News       Published: 01-2015      Views: 1479   
Description: Trustwave has released new data about the 'shelfware' problem that plagues businesses of all sizes

Smarter thinking         

Type: News       Published: 01-2016      Views: 1472   
Description: The newly-born ‘Internet of Things Security Foundation’ has been set up to encourage firms making smart gadgets to think about security as the hardware is being developed

Prevention: better than any cure         

Type: Feature       Published: 11-2016      Views: 1472   
Description: They are vicious and pernicious. So what steps can be taken to detect and block exploits as soon as they attempt to use software vulnerabilities? We ask the experts

Encryption Solution of the Year – Computing Security 2015

Type: