Backup Collaboration Mobile Security Storage Strategy Virtualisation
ALL | CAD | Cloud Hosting | Construction | Document | Green | Networking | Security | Storage

Article Index: Security>(Topic)>(Company)>(Product)>(Editorial)>(Date)      

Sort Articles By :    Most Popular           Latest     

Current Page: 1        | 1 | 2 | 3 |        1159 Article(s)  Total Views of these articles: 1419439

The search for the security champions of 2018

Type: Feature       Published: 06-2018      Views: 141   
Description: Time to make your nominations - we ask you now to tell us who and what has impressed you the most

Libraesva keeps your businesses safe and secure

Type: Case Study       Published: 06-2018      Views: 73   
Description: SecureFort is a new breed of security business

A Hefty Data Centre Security Challenge

Type: Case Study       Published: 06-2018      Views: 65   
Description: VIRTUS Data Centres is the UK’s fastest growing data centre provider that owns, designs, builds and operates the country’s most efficient and flexible data centres

NHS Digital enhances its Cyber Security Operations Centre with IBM

Type: News       Published: 06-2018      Views: 78   
Description: NHS Digital has entered into a three-year strategic partnership with IBM to provide a range of new and improved services to health and care organisations. These services will enhance data security and cyber security response and provide additional defence against increasingly complex, evolving threats.

Organisations struggling with cyber security should learn from NHS guidance, suggests Databarracks

Type: News       Published: 05-2018      Views: 152   
Description: Organisations struggling to improve cyber security defences, should take note of the recommendations proposed by a select committee report into last year’s WannaCry ransomware epidemic. This is according to Peter Groucutt, managing director of Databarracks.

SolarWinds MSP launches Security Resource Center

Type: News       Published: 05-2018      Views: 152   
Description: SolarWinds MSP, has launched its Security Resource Center, designed to make it quick and easy for MSPs to get the information they need about current security issues and trends, as well as recommended best practices  to help ensure their business and customers are protected.

Exponential‐e launches Cyber Security Operations Centre

Type: News       Published: 05-2018      Views: 197   
Description: Exponential‐e, the British cloud and network provider, has launched its Cyber Security Operations Centre (CSOC) with a view to making defence in‐depth the default standard for the mid‐market.

UK the most breached country in Europe, but organisations aren’t feeling the threat

Type: News       Published: 05-2018      Views: 148   
Description: Thales has announced the results of its 2018 Thales Data Threat Report, European Edition, revealing the UK as Europe’s most breached country of last year.

Security Management Solution from AlgoSec         

Type: Review       Published: 05-2018      Views: 88   
Description: As enterprise networks grow in complexity and move deeper into the cloud, businesses can no longer rely on inefficient and error-prone manual processes to manage their security policies

How machine learning can help you monitor insider threats         

Type: Masterclass       Published: 05-2018      Views: 168   
Description: Charlotte Gurney, Marketing Manager, Brookcourt Solutions, looks at the role that machine learning-based solutions can play in preventing potentially devastating consequences

Cardwave SafeToGo hardware encrypted USBs         

Type: Review       Published: 05-2018      Views: 149   
Description: The long-awaited EU GDPR (General Data Protection Regulation) finally took effect in May this year, so businesses that process personally identifiable information of EU citizens must demonstrate compliance or face punitive fines for security breaches

Computer Disposals Ltd         

Type: Review       Published: 05-2018      Views: 91   
Description: With the GDPR (General Data Protection Regulation) in full force from 25 May, businesses must show compliance or face potentially crippling fines for data breaches

Are we back to working from the office?         

Type: Opinion       Published: 05-2018      Views: 133   
Description: Simply put, the answer to the question above is 'No'. Despite a handful of large and very prominent IT companies stating they are going to be trying to move away from this, we have reached a point of no return, says Pavel Duddell, head of sales EMEA, Celestix

Council of War         

Type: Comment       Published: 05-2018      Views: 50   
Description: Every NHS trust that has been tested against cyber security standards since 2017's WannaCry attack has failed, NHS Digital has revealed, with plans now in place for surprise inspections at hospitals

Authentication failures leave dark hole         

Type: Opinion       Published: 05-2018      Views: 228   
Description: New approaches to cloud access are seen as a way to help alleviate 'dark hole' issues

Cryptojacking - the spiralling cyber threat         

Type: Comment       Published: 05-2018      Views: 120   
Description: Criminal gangs are literally coining it in by mining digital currencies through secretly infiltrating someone's computing device

ForeScout Technologies CounterACT 8         

Type: Review       Published: 05-2018      Views: 76   
Description: Network infrastructures are now in a constant state of flux, forcing enterprises to re-evaluate their security postures

Tomorrow's Security Today!         

Type: Events       Published: 05-2018      Views: 110   
Description: This year's Infosecurity Europe show will reflect the need for the information security industry to get one step ahead of the cyber adversary, in the never-ending battle to stay safe

Everyone's talking about GDPR - are you?         

Type: Masterclass       Published: 05-2018      Views: 53   
Description: Christine Jackson, partner at law firm Wright Hassall, outlines what the GDPR means for your business and the rules around storing customer data

Sun or rain, bring it on!         

Type: Opinion       Published: 05-2018      Views: 1441   
Description: Is the cloud right for everyone? That, says one leading observer, is the wrong question. "Like any evolutionary development, it's our current reality." But woe betide those who fail to take every security measure

Wake up to the risk of server-side encryption         

Type: Opinion       Published: 05-2018      Views: 135   
Description: The use of client-side encryption should be a key criterion in the selection of any vendor who stores sensitive data on your behalf, says Stewart McSporran, CTO, My1Login

Targeting the vulnerable         

Type: Opinion       Published: 05-2018      Views: 144   
Description: The Internet of Things is dissolving the wall between the physical and virtual worlds. Yotam Gutman, VP, marketing, SecuriThings, considers how this is leaving the young at risk from predators

Time to face up         

Type:       Published: 05-2018      Views: 231   
Description: Reacting after an attack is way too late. The damage is done. So, what strategy will keep your organisation safe and not prove an illusion?

The case for investing in people         

Type: Opinion       Published: 05-2018      Views: 84   
Description: Cyber security affects us all. And while technology plays a big part in protecting the business, so does ensuring staff have the right levels of skills and training

New LogMeIn report reveals the harsh realities of endpoint management

Type: News       Published: 05-2018      Views: 124   
Description: LogMeIn has released the findings of a new global report, “Uncovering the Harsh Realities of Endpoint Management: Bridging the gaps in multi-device security” revealing current market trends and business threats driving the need for IT professionals to make endpoint management a priority.

ADISA launches key UK Conference

Type: News       Published: 04-2018      Views: 244   
Description: With the General Data Protection Regulation (GDPR) being enshrined into UK law on 25 May, there is a growing appreciation that GDPR and data protection as a whole require a thorough understanding of all aspects that could lead to non-compliance and/or data breach, and therefore put organisations at risk of being in breach of the new legislation

Libra ESVA protects students from dangerous cyber threats

Type: News       Published: 04-2018      Views: 164   
Description: Libra ESVA was chosen as the best solution for a top UK school, due to its comprehensive protection from spam, malicious content and ease of deployment within the existing infrastructure

AI versus a human hacker         

Type: Feature       Published: 03-2018      Views: 260   
Description: How does machine learning and artificial intelligence (AI) impact cyber security?

Deadly game of Hide 'n' Seek         

Type: Research       Published: 03-2018      Views: 242   
Description: Bitdefender researchers have uncovered an emerging botnet that uses advanced communication techniques to exploit victims and build its infrastructure

How to underpin security transformation with complete visibility of your attack surface         

Type: Masterclass       Published: 03-2018      Views: 773   
Description: Charlotte Gurney, Marketing Manager, Brookcourt Solutions, provides key insights on a crucial issue that challenges so many enterprises

I.T. disposal: selecting the best         

Type: Opinion       Published: 03-2018      Views: 272   
Description: Legislation regarding IT recycling & disposal, not to mention the forthcoming GDPR regulation, is complicated enough. Jean-Pierre Naylor, director, Computer Disposals Ltd, offers his thoughts on choosing the right I.T. disposal company

Council of War         

Type: Research       Published: 03-2018      Views: 95   
Description: A new and deeply disturbing report from Big Brother Watch reveals that UK councils are severely unprepared for cybersecurity threats, with 25% of these authorities experiencing a data breach in the last five years

Driving into the unknown         

Type: Feature       Published: 03-2018      Views: 216   
Description: Tackling the many cybersecurity and other safety issues around connected cars has become an imperative

The dark destroyers         

Type: Research       Published: 03-2018      Views: 167   
Description: Over one million leaked and hacked credentials found on the Dark Web

It's time to be very ready!         

Type: Feature       Published: 03-2018      Views: 403   
Description: When the General Data Protection Regulation (GDPR) comes into force this May, it will overhaul how organisations store, secure and manage their customers' data. Swingeing penalties await those who fail to comply

Evolving your security for the cloud         

Type: Analysis       Published: 03-2018      Views: 335   
Description: How does an organisation migrate to the cloud, while keeping security top of mind and staying safe?

Everyone is at risk         

Type: Opinion       Published: 03-2018      Views: 250   
Description: From spear phishing to ransomware and the ever-present threat of bots, companies of all sizes have reason to lose sleep at night. Elizabeth Sheldon, Chairman, Evidence Talks, considers what that means for organisations everywhere

Protecting data to protect patients         

Type: Opinion       Published: 03-2018      Views: 174   
Description: Cyber criminals are netting massive financial returns from ransomware and other crippling cyberattacks against healthcare providers. How can they be stopped? Mark Sangster, VP and industry security strategist with eSentire, offers his insights

An urgent call to arms         

Type: Feature       Published: 03-2018      Views: 224   
Description: In this second part of our top predictions for cybersecurity in 2018, several experts reveal what may be lying in wait. And it doesn't always make for easy reading

A taste of things to come         

Type: Opinion       Published: 03-2018      Views: 205   
Description: Rahul Powar and Randal Pinto, CEO and COO of London-based tech start-up Red Sift, single out the three tech trends that they believe will dominate in 2018

Risk and reward in the big city         

Type: Feature       Published: 03-2018      Views: 158   
Description: Back in the 1960s, Disneyland had a ride called 'Utopia'. It was a glimpse into the future of human cities and gave us a taste of what smart cities could be. Alastair Hartrup, Global CEO, Network Critical, takes up the story

Titania Paws Studio 3.2.2         

Type: Product Review       Published: 03-2018      Views: 185   
Description: SMEs daunted by data protection regulations and the looming GDPR (General Data Protection Regulation) can rest easy with Titania's Paws Studio

Cardwave launches SafeToGo Solo, a new GDPR compliant hardware encrypted USB

Type:       Published: 03-2018      Views: 165   
Description: Cardwave, a leading expert in flash memory technology solutions has expanded its SafeToGo® USB security range with a new GDPR compliant AES-256 bit XTS hardware encrypted USB 3.0

TEISS cracking cyber security

Type:       Published: 03-2018      Views: 160   
Description: The European Information Security Summit 2018

700% surge in highly paid data protection jobs

Type: News       Published: 03-2018      Views: 164   
Description: With just two months to go until the UK’s biggest overhaul of data protection law for two decades, data protection professionals are enjoying a jobs opportunity surge - according to new figures released by the world’s largest job site, Indeed.

City, University of London, selects PhishMe for phishing and ransomware protection

Type: News       Published: 02-2018      Views: 213   
Description: University employs human behavioural conditioning techniques designed to build student and staff resilience to phishing

Bitdefender and NETGEAR collaborate on IoT security

Type: News       Published: 01-2018      Views: 263   
Description: Bitdefender and NETGEAR have announced a technology licensing agreement that allows NETGEAR to include Bitdefender’s breakthrough IoT security technology on certain of its networking devices.

Radware report highlights rise in ransomware attacks

Type: News       Published: 01-2018      Views: 574   
Description: Untraceable ransom payments can be a lucrative opportunity for hackers as cryptocurrencies increase in value

Application-Layer DDoS Attacks: Bad Things Come in Small Packages         

Type: Masterclass       Published: 01-2018      Views: 1000   
Description: Distributed Denial of Service (DDoS) attacks come in many flavours. Here, Charlotte Gurney, Marketing Manager, Brookcourt Solutions, considers one in particular

Cyber-Attacks Concealed         

Type: Comment       Published: 01-2018      Views: 113   
Description: It is worrying to hear that some UK banks still aren't telling regulators about all the cyber-attacks wreaked on the financial services industry, despite a 10-fold increase in reports to the Financial Conduct Authority (FCA) over the last four years

It's war - and it's now         

Type:       Published: 01-2018      Views: 944   
Description: Cyber warfare is a real threat - and happening somewhere now, as this is being written

Laptops Blitzed in under 30 seconds         

Type:       Published: 01-2018      Views: 180   
Description: What if your laptop could be 'backdoored' via a technology almost everyone uses and trusts: Intel. It's not simply a possibility, however - it's been reported as happening on a massive scale

Hacking on the cheap         

Type:       Published: 01-2018      Views: 279   
Description: A team of experts bypassed an iPhone's fingerprint sensor and manipulated facial and voice recognition security systems on various banking apps. Cost of the 'technology' to do this? Around £45

Taking the fight to the enemy         

Type:       Published: 01-2018      Views: 193   
Description: David Ferbrache, chief technology officer in KPMG's cyber security practice, takes a close look at key areas where organisations should focus their attention in the 12 months ahead

Real solutions, not band-aids!         

Type:       Published: 01-2018      Views: 415   
Description: Enterprise I.T. is faced with a treadmill of challenges fuelled by new cloud and mobile initiatives. How can these be engaged with at the highest level and overcome?

First small steps… .. but a long way to go         

Type:       Published: 01-2018      Views: 444   
Description: NHS Digital is investing £20m in a new Cyber Defence Unit to protect critical systems and sensitive patient data from the threat of hackers. Is it enough, though?

Armed to fight back         

Type:       Published: 01-2018      Views: 199   
Description: Cybercriminals have never had so many technology weapons at their fingertips with which to attack organisations. Having the right protection skills and knowledge is vital

Through the glass, darkly         

Type: Feature       Published: 01-2018      Views: 400   
Description: Computing Security asked those in the know to do some future-gazing and give us their top predictions for cybersecurity in 2018. Here's what they had to say

The Vital Link         

Type:       Published: 01-2018      Views: 243   
Description: Predictive analytics is not a miracle cure. But it can help to alter how organisations look at security operations and incident response workflow, when properly embraced

Titania Nipper Studio 2.5         

Type: Review       Published: 01-2018      Views: 246   
Description: Network routers, firewalls and switches are essential to business operations and yet their very complexity makes them easy targets for cyber criminals

Concerned about GDPR compliance? VTL could be part of the solution

Type: Feature       Published: 12-2017      Views: 278   
Description: By now, you have probably heard that we’re set to see the biggest change to data privacy legislation in decades with the introduction of the General Data Protection Regulation (GDPR) on 25th May 2018. But do you know how it will affect different areas of your business, and are you sure that you’ll be compliant by the May deadline?

CYJAX Achieves ISO 27001 Certification

Type: Feature       Published: 12-2017      Views: 256   
Description: CYJAX, the award-winning cyber threat intelligence company, has become what is said to be the first organisation of its type in the world to achieve ISO 27001 certification

75% of organisations report no strategy to manage and secure DevOps secrets

Type: News       Published: 11-2017      Views: 289   
Description: DevOps and security professionals have worrying knowledge gaps about where privileged accounts and secrets exist across the IT infrastructure, according to the first findings to be released from CyberArk’s Advanced Threat Landscape 2018 report. When offered several options ranging from PCs / laptops to microservices, cloud environments and containers, nearly all (99%) failed to identify all places where privileged accounts or secrets exist.

Cyber Security Lessons from Nursery

Type:       Published: 11-2017      Views: 486   
Description: By Alastair Hartrup, Global CEO of Network Critical

Evidence Talks steps up fight against insider fraud

Type: Product News       Published: 11-2017      Views: 321   
Description: In the modern business climate, a multitude of malicious threats are testing every aspect of an organisation’s defences. However, one of the biggest challenges faced is not external – it comes from the threat within

Data security a major concern for businesses in 2017 ahead of GDPR, finds new Kaseya research

Type: News       Published: 11-2017      Views: 354   
Description: A new piece of research commissioned by IT systems management provider Kaseya has revealed that attempting to secure data and privacy has proven to be one of the biggest challenges in 2017, as voted for by 44% of IT executives.

Things To Consider When Choosing A Cyber Security Vendor

Type:       Published: 11-2017      Views: 336   
Description: By Ian McGregor, CRO, Invinsec

Mission? Detection!         

Type: Opinion       Published: 11-2017      Views: 406   
Description: New variations of advanced persistent threats continue to make the headlines. Now organisations are increasingly focused on fighting them off

Checkmate         

Type: Feature       Published: 11-2017      Views: 961   
Description: Attacks against applications have now reached new heights of intensity and sophistication. Just how do you keep the attackers at arm's length?

Mighty storm unleashed         

Type: Feature       Published: 11-2017      Views: 400   
Description: New cyber-storm clouds are gathering, threatening even more potential damage than the fearsome Mirai botnet of 2016

SWIFT Customer Security Controls Compliance: An Application-Centric Approach to Cybersecurity         

Type: Masterclass       Published: 11-2017      Views: 915   
Description: Charlotte Gurney, Group Marketing manager at Brookcourt Solutions & Partner (Cix Software), outlines how organisations need to change their approach to cybersecurity to meet the SWIFT customer security programme mandate

China Crackdown         

Type: Feature       Published: 11-2017      Views: 322   
Description: Censorship controls on social media are rife in China, as it enforces new draconian cybersecurity laws, posing serious problems for businesses active in the country

Paradise lost?         

Type: Comment       Published: 11-2017      Views: 179   
Description: The breach of the Appleby law firm, now dubbed the 'Paradise Papers', has seen a raft of salacious information pour out into the public domain, with the private documents of the rich and famous laid bare for all to see

Back to Basics         

Type: Feature       Published: 11-2017      Views: 454   
Description: Demanding that greater powers should be given to regulators to prevent cybercrime may simply be putting the cart before the horse

GDPR: The Silver Lining         

Type: Opinion       Published: 11-2017      Views: 1077   
Description: Are there four letters presently capable of generating greater fear and anxiety for organisations around the world than GDPR? Colin Tankard, managing director, Digital Pathways, seeks to alleviate those concerns

Life on the cutting edge         

Type: Opinion       Published: 11-2017      Views: 266   
Description: The way must now be paved for the adoption of cutting-edge technologies, tackling the barriers that businesses are facing, says the CBI

Uniting forces to tackle cyber risk         

Type: Feature       Published: 11-2017      Views: 263   
Description: The level of cyber exposure to which an organisation is liable can be a major concern - especially as many have no idea how large or dangerous that might prove

Leading the fightback through the power of I0T         

Type: Feature       Published: 11-2017      Views: 341   
Description: The level of cyber exposure to which an organisation is liable can be a major concern - especially as many have no idea how large or dangerous that might be

Computing Security Awards 2017         

Type: Awards       Published: 11-2017      Views: 164   
Description: Excellence Shines Through

Anti Spam Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 194   
Description: WINNER: LibraEsva - Libra ESVA

Anti Malware Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 214   
Description: WINNER: Malwarebytes - Endpoint Security

Threat Intelligence Award – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 190   
Description: WINNER: Cyjax - Cyber Threat Intelligence

Content Security Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 274   
Description: WINNER: Trend Micro

Network Security Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 161   
Description: WINNER: Titania

Encryption Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 162   
Description: WINNER: WinMagic

DLP Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 171   
Description: WINNER: GhangorCloud - Information Security Enforcer

Mobile Security Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 186   
Description: WINNER: Wandera - Secure Mobile Gateway

Identity and Access Management Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 192   
Description: WINNER: My1Login

Anti Phishing Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 201   
Description: WINNER: Red Sift - OnDMARC

Network Access Control Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 171   
Description: WINNER: Portnox - Portnox Core

Cloud Security Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 180   
Description: WINNER: Egress Software Technologies - Egress Switch

Anti Ransomware/ Anti DDos Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 169   
Description: WINNER: Rohde and Schwarz Cybersecurity - Browser in the Box

Advanced Persistent Threat (APT) Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 251   
Description: WINNER: Performanta - TrapX

Secure Data Erasure Company of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 177   
Description: WINNER: Computer Disposals

Security Recruitment Company of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 164   
Description: WINNER: Evolution Recruitment Solutions

Education and Training Provider of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 180   
Description: WINNER: ZeroDayLab

Pen Testing Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 168   
Description: WINNER: Redscan - Redscan Pen Testing

Web Application Firewall of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 160   
Description: WINNER: F5 Networks - Application Security Manager

Security Service Provider of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 163   
Description: WINNER: Brookcourt Solutions

Security Distributor of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 166   
Description: WINNER: Nuvias –formerly Wick Hill

Security Reseller of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 146   
Description: WINNER: Brookcourt Solutions

SME Security Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 165   
Description: WINNER: Winmagic

Enterprise Security Solution of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 181   
Description: WINNER: Arbor Networks - Arbor Cloud

The Compliance Award – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 162   
Description: WINNER: Kingston Technology

Security Project of the Year - Private Sector – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 163   
Description: WINNER: Borussia Dortmund / Cyjax

Security Project of the Year - Public / Not for Profit Sector – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 172   
Description: WINNER: Peabody Trust / Egress

New Product of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 171   
Description: WINNER: Digital Pathways

Editor’s Choice – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 188   
Description: WINNER: Malwarebytes

The Contribution to Cyber Security Award – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 215   
Description: WINNER: Phil Richards (Ivanti)

The ‘One to Watch’ Security Company – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 171   
Description: WINNER: Capita Cyber Security

Anti Cybercrime Award – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 158   
Description: WINNER: RSA

Security Company of the Year – Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 161   
Description: WINNER: Malwarebytes

APCON expands product portfolio

Type:       Published: 11-2017      Views: 132   
Description: Copper Bypass TAP Appliance, a fail-safe security and traffic visibility solution, supports five inline network security tools

Email best-practices have never been more essential

Type: Feature       Published: 10-2017      Views: 231   
Description: By Dr.Rois Ni Thuama, head of cybersecurity governance partnerships and legal at email security firm OnDMARC

Sophos adds Synchronized App Control to the latest version of XG Firewall

Type: News       Published: 10-2017      Views: 248   
Description: Sophos has announced the latest version of its next-generation Sophos XG Firewall that delivers a breakthrough in network traffic visibility.

Computing Security Awards 2017 - The Winners!

Type: Awards       Published: 10-2017      Views: 293   
Description: The winners of the 2017 Computing Security Awards were announced on 12th October at a gala ceremony in London. We'd like to thank everyone who took the time to vote online and once again congratulate all of this year's winners and runners-up!

Threat Intelligence gets to truth of Dortmund bombing

Type: Case Study       Published: 10-2017      Views: 164   
Description: The following case study illustrates the continued collaboration and convergence of logical and physical security, and demonstrates how the use of Cyber Threat Intelligence was used in a real-world situation to great positive effect

Pragmatism and computing security

Type: Opinion       Published: 09-2017      Views: 561   
Description: Rodolfo Saccani, Libraesva Security R&D manager, outlines the benefits of a pragmatic approach to email security

Machine Learning Applied to Cyber Security         

Type: Masterclass       Published: 09-2017      Views: 1009   
Description: Techniques in artificial intelligence (AI) and machine learning are changing our view of the world. Charlotte Gurney, group marketing manager, Brookcourt Solutions, discusses how cyber security has seen some of the widest-ranging and impacting implementations of machine learning, deep learning, natural language processing, and more

Bolstering Your Own Defences         

Type:       Published: 09-2017      Views: 262   
Description: Cyber-criminals usually trick users by positing their wares as legitimate downloads of new and popular applications. How do you thwart them and stay safe?

Behind the scenes at Capita Cyber Security         

Type: Interview       Published: 09-2017      Views: 569   
Description: Significant change is now taking place at Capita Cyber Security. CEO Kevin Gordon explains for Computing Security the major influences that are driving this success

Framework for a fightback         

Type: Comment       Published: 09-2017      Views: 179   
Description: I note that the Institute of Information Security Professionals (IISP) has released the first IISP Knowledge Framework as part of its commitment to improving the levels of understanding and professionalism in the face of a growing tide of cybercrime and attacks

Health check: a varied prognosis         

Type:       Published: 09-2017      Views: 274   
Description: The government's latest Cyber Governance Health Check Report is a mixed bag. While many businesses recognise the need for tight cyber security, there remain areas of real neglect

Securing email is essential         

Type:       Published: 09-2017      Views: 361   
Description: Colin Tankard, Managing Director, Digital Pathways, examines why email is now such an essential communications and collaboration tool for both employees and consumers

Harsh winds of change ahead         

Type:       Published: 09-2017      Views: 301   
Description: Proposed changes to UK data protection laws have been outlined by the government. Brian Wall has been gauging reaction from around industry on their likely repercussions

In the line of fire         

Type:       Published: 09-2017      Views: 278   
Description: A plethora of regulations are soon to hit UK businesses, imposing harsh penalties where there is overt failure to comply. Yet some organisations don't think the new rules even apply to them. Brian Wall reports

How easy is it to steal a friend's identity?         

Type:       Published: 09-2017      Views: 252   
Description: A new BBC TV drama shows JUST how easy it is to steal the identity of someone close to you. Now individuals are being urged to think carefully about where they share their personal information

Fear and loathing in cyberspace: the summer of ransomware         

Type: Opinion       Published: 09-2017      Views: 367   
Description: Infecting computers and holding businesses to ransom has become very big business. Malwarebytes VP, Anthony O'Mara, considers how organisations can fight back

Malwarebytes Endpoint Protection         

Type: Review       Published: 09-2017      Views: 363   
Description: Malwarebytes’ next-generation Endpoint Protection (MEP) places seven layers of detection technology on your endpoints. Called ‘multi-vector protection’, it employs a signature-less, rules-based approach, to protect against known and unknown malware.

Outside in         

Type:       Published: 09-2017      Views: 458   
Description: Do managed security services providers really have superior expertise and deliver this to a business at a fraction of the cost of in-house security resources?

The Rise and Rise of Ransomware         

Type: Opinion       Published: 09-2017      Views: 430   
Description: Javvad Malik, security advocate at AlienVault, reflects on how the digital revolution has made ransomware such a powerful and ominous presence

Red Sift OnDMARC         

Type: Review       Published: 09-2017      Views: 351   
Description: Email is the weapon of choice for cyber criminals, with phishing and spoofing attacks increasing exponentially. Red Sift’s OnDMARC aims to streamline the entire process of implementation, reporting and ongoing management to counteract these assaults.

You don't have to be a victim         

Type:       Published: 09-2017      Views: 385   
Description: Computing Security investigates how businesses can keep themselves safe from such pernicious assaults as targeted attacks

NHS IT leaders fear harm to patients from widespread hacking of confidential data

Type: News       Published: 09-2017      Views: 370   
Description: VMware research reveals almost a third of NHS IT decision makers say hackers have infiltrated electronic patient data

What will close the Cyber and network security skills gap?

Type: News       Published: 08-2017      Views: 497   
Description: Network Critical’s CEO Alistair Hartrup asks “Why are people with cyber skills so difficult to find and keep?”

Knowledge is power in the fight against cyber attacks, says the ISSP

Type: News       Published: 08-2017      Views: 307   
Description: Institute of Information Security Professionals launches Knowledge Framework for Cyber and Information Security

Crosskey Gains Complete Security Visibility with AlienVault USM         

Type: Case Study       Published: 07-2017      Views: 444   
Description: Crosskey is a Finnish company that develops, delivers and maintains systems and solutions for Nordic banks and capital markets

More than half of ex-employees still have access to all corporate applications, finds new study

Type: News       Published: 07-2017      Views: 462   
Description: A new study by OneLogin reveals that a large proportion of businesses fail to adequately protect their networks from the potential threat posed by ex-employees. The study disclosed that IT decision makers are aware that over half (58 per cent) of former employees still can access the corporate network. Also, nearly a quarter (24 per cent) of UK businesses have experienced data breaches by ex-employees.

As GDPR approaches, retail data breaches remain unacceptably high

Type: News       Published: 07-2017      Views: 344   
Description: Two in five retailers across the globe have experienced a data breach in the past year, according to the 2017 Thales Data Threat Report, Retail Edition.

Enterprise IT leaders demanding more stringent cyber security from suppliers

Type: News       Published: 07-2017      Views: 317   
Description: Inaugural CybSafe Supplier Cyber Security Study reveals SMEs must increasingly prove cyber credentials to win contracts

Keys to Effective Threat Intelligence         

Type: Masterclass       Published: 07-2017      Views: 1135   
Description: A threat intelligence feed gives insights into possible identities of hackers, the methods they use, and the networks they are targeting, says Charlotte Gurney, group marketing manager at Brookcourt Solutions

Torn by tough choices         

Type:       Published: 07-2017      Views: 318   
Description: Organisations face a dichotomy - while mobile technology brings operational benefits, it also introduces the compromise of network security

Unclouded thinking         

Type: Feature       Published: 07-2017      Views: 613   
Description: With the financial penalties and loss of reputation facing companies that fall victim to a data breach, moving your private data to an external provider is even more challenging

Storm clouds gather over GDPR         

Type: Comment       Published: 07-2017      Views: 195   
Description: A total of 69% of board-level executives are neglecting to ensure the UK businesses they run will comply with the General Data Protection Regulation (GDPR)

'Weaponisation' of everyday devices         

Type:       Published: 07-2017      Views: 220   
Description: With new strains of ransomware and other vulnerabilities created every week,what exactly should manufacturers be looking out for in the year ahead?

Aftershock of a data breach         

Type:       Published: 07-2017      Views: 954   
Description: Stock prices drop by an average of 5% when a data breach is disclosed. The impact on reputation can be even more damaging

Built-in protection         

Type:       Published: 07-2017      Views: 394   
Description: At the heart of every security strategy is the objective to protect sensitive information from unauthorised disclosure. but that comes with many challenges

Massive surge in zero-day exploits         

Type:       Published: 07-2017      Views: 266   
Description: Thirty per cent of malware can be classified as new or zero-day, because it cannot be caught by legacy antivirus solutions, it is claimed

Time for a unified front

Type:       Published: 07-2017      Views: 208   
Description: Cyber security is rarely out of the news these days, with businesses and organisations everywhere seemingly under attack. A shift in attitude is now an imperative

Inside The Data Maze         

Type:       Published: 07-2017      Views: 261   
Description: GRC - governance, risk and compliance - is vitally important, especially as more and more legislation is introduced that could have grave consequences for any enterprise that flouts its rules

Space invaders         

Type:       Published: 07-2017      Views: 302   
Description: All too often victims of identity fraud do not even realise that they have been targeted. By then, it is way too late - the damage has been done

Runaway success!         

Type:       Published: 07-2017      Views: 232   
Description: Come sunshine, rain or Polling Day, nothing could prevent visitors from flocking to Infosecurity Europe 2017

Encrypted USB-drives - An important piece of the EU-GDPR puzzle         

Type: Research       Published: 07-2017      Views: 364   
Description: USB drives are a 'faithful companion' in our professional lives, suggests new research - but their security is an increasingly important consideration, especially in the run-up to the new EU GDPR, argues Christoph Bader, Strategic Marketing Manager B2B EMEA for Kingston Technology

Threats that never die         

Type:       Published: 07-2017      Views: 255   
Description: A backdoor used 19 years ago to tunnel information out of victim networks has now been found to connect to a backdoor used by Turla in 2011

Magnetic influence         

Type:       Published: 07-2017      Views: 333   
Description: Artificial Intelligence (AI) is exerting an ever-greater influence on our security decisions and direction

No Soft Touch         

Type:       Published: 07-2017      Views: 245   
Description: How exactly can you best manage software verification, and what are the first steps towards safe and resilient systems? Dr João Ferreira, a computer scientist working in the School of Computing at Teesside University, offers his insights

Computing Security Awards 2017

Type:       Published: 06-2017      Views: 285   
Description: SUBMIT YOUR NOMINATIONS NOW!

Specialist cyber security consultancy signs partnership with Certes Neworks

Type:       Published: 06-2017