Backup Collaboration Mobile Security Storage Strategy Virtualisation
ALL | CAD | Cloud Hosting | Construction | Document | Green | Networking | Security | Storage

Article Index: Security>Cloud>(Company)>(Product)>(Editorial)>(Date)      

Sort Articles By :    Most Popular           Latest     

Current Page: 1        | 1 |        84 Article(s)  Total Views of these articles: 117766

You've got mail: a digitised mailroom that's fit for the return to work         

Type: Product Focus       Published: 05-2020      Views: 101   
Description: Working from home is here to stay. Stay connected in the new normal

COVID-19: A new level of threat

Type: Comment       Published: 03-2020      Views: 138   
Description: We are all well aware of the 'enemies at the gate': the hackers and attackers looking for every opportunity to seize data by exploiting weaknesses in your defences. Breaches have reached new heights, with no organisation, however large or small, immune from such assaults

Cloud Protection for Salesforce from F-Secure

Type: Review       Published: 03-2020      Views: 223   
Description: Cloud-based services have caught on fast, offering a range of benefits to organisations of every kind.

Malwarebytes Launches Enhanced Cloud Platform, MSP Premier Partner Program

Type: News       Published: 02-2020      Views: 285   
Description: Simplified dashboards enable easy deployment, reporting and operational control

nCipher unveils cloud-first architecture, bringing security and control to public & private clouds

Type: News       Published: 01-2020      Views: 211   
Description: New web services APIs and container technology streamline integration of nShieldģ HSMs with cloud environments, bringing high assurance security to enterprise cloud migration

Enterprise Mobile Security: How to reduce the cybersecurity threat

Type: Opinion       Published: 12-2019      Views: 638   
Description: Tom Davison, EMEA Technical Director at Lookout examines how modern businesses can scale up their mobile security. As employees using company devices become an ever more attractive target for attack how can companies protect their endpoints?

Forescout Transforms Enterprise-Wide Network Segmentation with Release of Cloud-Based eyeSegment

Type: News       Published: 11-2019      Views: 467   
Description: ē Forescout eyeSegment ties together fragmented segmentation point solutions in a scalable approach across campus, data centre, cloud and OT
ē Enables a Zero Trust approach to implementing granular security controls and reducing operational complexity of network segmentation projects


Caught in an endless struggle         

Type: Industry Focus       Published: 11-2019      Views: 428   
Description: Nearly 80% of organisations rank cyber risk as a top-five concern, yet only 11% have a high degree of confidence in their ability to assess cyber threats, prevent cyber-attacks and respond effectively

Over 40% of UK organisations believe they cannot stop cyber attacks

Type: News       Published: 07-2019      Views: 638   
Description: According to a new global survey from CyberArk, 43 percent of UK organisations believe attackers can infiltrate their networks each time they try. As organisations increase investments in automation and agility, a general lack of awareness about the existence of privileged credentials Ė across DevOps, robotic process automation (RPA) and in the cloud Ė is compounding risk.

Leading scale-ups boost cyber security future         

Type: Special Focus       Published: 07-2019      Views: 501   
Description: Twenty fast-growth cyber scale-ups have been accepted on to the first national cyber security growth programme - and they mean business

Malware Malaise

Type: Security Update       Published: 05-2019      Views: 552   
Description: Could it be that new malware features matter less than you might think - and that what really matters is behaviour? Computing Security gets some of the industryís views.

Cyber-attacks: a major global risk

Type: Industry Focus       Published: 05-2019      Views: 513   
Description: By Scott Gordon (CSSP), CMO, Pulse Secure

Rapid7 swoops in         

Type: Market Focus       Published: 05-2019      Views: 1325   
Description: Rapid7 has acquired NetFort, which provides end-to-end network traffic visibility and analytics across cloud, virtual and physical networks

R&S Trusted Gate from Rohde & Schwarz Cybersecurity

Type: Product Review       Published: 05-2019      Views: 1919   
Description: A cybersecurity strategy to address specific threat profiles can be demanding, but central to each one is the protection of data, the most prized asset

Cloud Wars

Type:       Published: 04-2019      Views: 411   
Description: Ever wondered what the operational differences are between multi-cloud, hybrid-cloud and public cloud are? Here are the expert views and insights of those in the know

Multi-factor authenticationÖ in six takes         

Type: Opinion       Published: 03-2019      Views: 725   
Description: Your organisation is going down the multi-factor authentication path, but how does it know it's the right one? Adrian Jones, CEO of Swivel Secure, offers some insights into solving that challenge

The certainty of uncertain times ahead         

Type:       Published: 01-2019      Views: 688   
Description: Computing Security asks those in the know to do some future-gazing and give us their top predictions for cybersecurity in 2019. Here's what they have to say

Cloud adoption: a blessing, not a curse, for IT security         

Type: Masterclass       Published: 01-2019      Views: 899   
Description: Nigel Hawthorn, data privacy expert at McAfee, and Charlotte Gurney, marketing manager at Brookcourt Solutions, consider how cloud can be the most secure environment for business, despite increasingly sophisticated threats and growing cybercriminal interest

Cloud sinks lower         

Type: Feature       Published: 01-2019      Views: 498   
Description: 'Cloud' has been all the rage for some time now, but its predominance has been challenged of late. Might its status have to be re-evaluated somewhat?

The quantum threat to cybersecurity         

Type: Opinion       Published: 01-2019      Views: 816   
Description: By Rodney Joffe, SVP and Fellow, Neustar, and Chairman of the Neustar International Security Council (NISC)

An IT hierarchy of needs         

Type: Masterclass       Published: 11-2018      Views: 654   
Description: Charlotte Gurney, Marketing Manager, Brookcourt Solutions, opens a window on Enterprise DNS - a platform which enables a wide range of business transformation

Always on - always exposed

Type: Feature       Published: 11-2018      Views: 608   
Description: With always-connected mobile users everywhere and so many organisations turning to the cloud, exposure to threats is a given at any moment

Cloud Security Solution of the Year Ė Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 496   
Description: WINNER: AlienVault - USM Anywhere

Pen Testing Solution of the Year Ė Computing Security Awards 2018

Type: Awards       Published: 11-2018      Views: 474   
Description: WINNER: Redscan - Redscan Pen Testing

Building a solid foundation for security in the Cloud         

Type: Opinion       Published: 09-2018      Views: 948   
Description: Dealing with cloud environments all comes down to understanding, assessing and balancing risk, as Javvad Malik, security advocate, AlienVault, explains

Fine-tuning the cloud         

Type: Feature       Published: 09-2018      Views: 767   
Description: Will Secure Access Orchestration solutions that holistically manage the overall multi-cloud environment overcome fears around security issues?

United - and threatened         

Type: Feature       Published: 09-2018      Views: 768   
Description: The Internet of Things turns information into actions that create new capabilities, richer experiences and real economic opportunity. But beware of the 'dark side'

The fight against mal-adjustment!         

Type: Opinion       Published: 07-2018      Views: 701   
Description: How do you stop malicious applications from entering the network? Computing Security asks Mikko RŲntynen, director of product marketing at F-Secure, for his thoughts

Data security for your mobile workforce         

Type: Industry View       Published: 07-2018      Views: 761   
Description: We live in a flexible, mobile world that is constantly reinventing itself. Paul Norbury, Chief Executive, Cardwave Services, steps inside for a closer view

Securing the Cloud: The future of Authentication         

Type: Opinion       Published: 07-2018      Views: 729   
Description: Neil Langridge, Marketing Director, e92plus, offers his insights on a massive data security challenge that's now facing organisations everywhere

A meeting of minds         

Type: Events       Published: 07-2018      Views: 717   
Description: Infosecurity Europe brought together a vast array of international exhibitors and almost 20,000 visitors for an action-packed three days at Olympia london

Time to share the pain         

Type: Feature       Published: 07-2018      Views: 4011   
Description: Is the cloud right for everyone? That, says one leading observer, is the wrong question. "Like any evolutionary development, it's our current reality." But woe betide those who fail to take every security measure along the way

My1Login Enterprise IAM         

Type: Product Review       Published: 07-2018      Views: 851   
Description: With the GDPR (General Data Protection Regulation) now in force, it's never been more important for businesses to have a robust identity and access management (IAM) solution in place

Damage limitation         

Type: Analysis       Published: 07-2018      Views: 684   
Description: Analysis suggests that the takedown of a single cloud provider could cause $50 billion to $120 billion of economic damage

Exponential‚Äźe launches Cyber Security Operations Centre

Type: News       Published: 05-2018      Views: 893   
Description: Exponential‚Äźe, the British cloud and network provider, has launched its Cyber Security Operations Centre (CSOC) with a view to making defence in‚Äźdepth the default standard for the mid‚Äźmarket.

Security Management Solution from AlgoSec         

Type: Review       Published: 05-2018      Views: 790   
Description: As enterprise networks grow in complexity and move deeper into the cloud, businesses can no longer rely on inefficient and error-prone manual processes to manage their security policies

Authentication failures leave dark hole         

Type: Opinion       Published: 05-2018      Views: 847   
Description: New approaches to cloud access are seen as a way to help alleviate 'dark hole' issues

ForeScout Technologies CounterACT 8         

Type: Review       Published: 05-2018      Views: 802   
Description: Network infrastructures are now in a constant state of flux, forcing enterprises to re-evaluate their security postures

Sun or rain, bring it on!         

Type: Opinion       Published: 05-2018      Views: 3449   
Description: Is the cloud right for everyone? That, says one leading observer, is the wrong question. "Like any evolutionary development, it's our current reality." But woe betide those who fail to take every security measure

New LogMeIn report reveals the harsh realities of endpoint management

Type: News       Published: 05-2018      Views: 756   
Description: LogMeIn has released the findings of a new global report, ‚ÄúUncovering the Harsh Realities of Endpoint Management: Bridging the gaps in multi-device security‚ÄĚ revealing current market trends and business threats driving the need for IT professionals to make endpoint management a priority.

Evolving your security for the cloud         

Type: Analysis       Published: 03-2018      Views: 994   
Description: How does an organisation migrate to the cloud, while keeping security top of mind and staying safe?

Application-Layer DDoS Attacks: Bad Things Come in Small Packages         

Type: Masterclass       Published: 01-2018      Views: 1608   
Description: Distributed Denial of Service (DDoS) attacks come in many flavours. Here, Charlotte Gurney, Marketing Manager, Brookcourt Solutions, considers one in particular

Through the glass, darkly         

Type: Feature       Published: 01-2018      Views: 1159   
Description: Computing Security asked those in the know to do some future-gazing and give us their top predictions for cybersecurity in 2018. Here's what they had to say

75% of organisations report no strategy to manage and secure DevOps secrets

Type: News       Published: 11-2017      Views: 910   
Description: DevOps and security professionals have worrying knowledge gaps about where privileged accounts and secrets exist across the IT infrastructure, according to the first findings to be released from CyberArk’s Advanced Threat Landscape 2018 report. When offered several options ranging from PCs / laptops to microservices, cloud environments and containers, nearly all (99%) failed to identify all places where privileged accounts or secrets exist.

Encryption Solution of the Year ‚Äď Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 661   
Description: WINNER: WinMagic

Identity and Access Management Solution of the Year ‚Äď Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 772   
Description: WINNER: My1Login

Cloud Security Solution of the Year ‚Äď Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 725   
Description: WINNER: Egress Software Technologies - Egress Switch

SME Security Solution of the Year ‚Äď Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 699   
Description: WINNER: Winmagic

Enterprise Security Solution of the Year ‚Äď Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 700   
Description: WINNER: Arbor Networks - Arbor Cloud

Security Project of the Year - Public / Not for Profit Sector ‚Äď Computing Security Awards 2017

Type: Awards       Published: 11-2017      Views: 675   
Description: WINNER: Peabody Trust / Egress

Unclouded thinking         

Type: Feature       Published: 07-2017      Views: 1813   
Description: With the financial penalties and loss of reputation facing companies that fall victim to a data breach, moving your private data to an external provider is even more challenging

Managing complexity is the top security challenge highlighted by FireMon’s annual firewall report

Type: News       Published: 05-2017      Views: 1647   
Description: FireMon has released its 3rd Annual State of the Firewall Report that surveyed more than 400 organisations about their current security infrastructure and management challenges as well as adoption and impact of emerging technologies such as SDN, cloud, microsegmentation and the Internet of Things (IoT).

Threat detection - and response         

Type: Feature       Published: 03-2017      Views: 1167   
Description: Many companies' endpoints represent under-secured, unnecessary risks. A new cloud-based service is aiming to help remedy that

The main event         

Type: Event       Published: 03-2017      Views: 1172   
Description: Cloud Expo, Europe's biggest and best attended cloud and digital transformation show took place recently in London's ExCel: Cloud Hosting magazine was there to report back

Offerings that go beyond         

Type: News       Published: 11-2016      Views: 868   
Description: BeyondTrust has expanded its cloud offerings

Partnership promises cloud silver lining         

Type: News       Published: 11-2016      Views: 979   
Description: Niu Solutions has entered into a strategic partnership with Alert Logic to further enhance its security offering in the cloud

More attacks unleashed         

Type: News       Published: 11-2016      Views: 1241   
Description: Akamai Technologies' latest 'State of the Internet/Security Report' (Second Quarter 2016) has highlighted the latest cloud security landscape, specifically trends with DDoS and web application attacks, as well as malicious traffic from bots

Encryption Solution of the Year - Computing Security Awards 2016

Type: Awards       Published: 11-2016      Views: 800   
Description: WINNER: WinMagic - SecureDoc Cloud VM

Network Access Control Solution of the Year - Computing Security Awards 2016

Type: Awards       Published: 11-2016      Views: 744   
Description: WINNER: F5 Networks - Access Policy Manager

Cloud Security Solution of the Year - Computing Security Awards 2016

Type: Awards       Published: 11-2016      Views: 725   
Description: WINNER: Egress Software Technologies - Egress Switch

Advanced Persistent Threat (APT) Solution of the Year - Computing Security Awards 2016

Type: Awards       Published: 11-2016      Views: 777   
Description: WINNER: WatchGuard - APT Blocker

Editor’s Choice - Computing Security Awards 2016

Type: Awards       Published: 11-2016      Views: 744   
Description: WINNER: GhangorCloud - Information Security Enforcer

New Product of the Year - Computing Security Awards 2016

Type: Awards       Published: 11-2016      Views: 688   
Description: WINNER: WinMagic - SecureDoc Cloud VM

Battle for Cloud domination         

Type:       Published: 07-2016      Views: 2375   
Description: The biggest concern in cloud right now is security. According to Oracle executive chairman Larry Ellison: "We need much better security. We need a next-generation of security, because… we are losing a lot of these cyber battles. We haven't lost the war. But we're losing battles."

Compromised credentials         

Type: News       Published: 05-2016      Views: 1253   
Description: What is still the biggest cause of all data breaches? Compromised credentials, claims a new report

Encryption to amaze         

Type: Industry Focus       Published: 05-2016      Views: 2389   
Description: Truly effective encryption that actually protects data wherever it may reside is an absolute must for any business or organisation dealing with sensitive data

Gateway to safety         

Type: Opinion       Published: 03-2016      Views: 1614   
Description: Rarely does a single cloud have the silver lining of offering all the applications that enterprise I.T. needs to deliver... enter Identity and Access Management

Chasing away the turbulent clouds         

Type:       Published: 09-2015      Views: 4631   
Description: Security skills are in limited supply and, as such, cost and retention of security teams can be a significant challenge. this is a major factor now driving the growing race to the cloud ‚Äď though it‚Äôs far from the only one, as computing security reports

CoSoSys in move to secure Macs

Type: News       Published: 09-2015      Views: 1805   
Description: CoSoSys has now released Mobile Device Management (MDM) features for OS X. Organisations incorporating Macs through BYOD or by issuing Mac computers to the employees can now secure confidential data and manage these computers on different levels.

Success at InfoSec         

Type: Events       Published: 07-2015      Views: 3438   
Description: Infosec 2015 bustled and thrived for three days in June at its new London base OF Olympia. Computing Security was there to catch all the action.

Under pressure, taking control         

Type:       Published: 07-2015      Views: 2669   
Description: Managed security services providers may promise the expertise, knowledge and infrastructure you need to secure your information assets from Internet attacks, often at a fraction of the cost of in-house security resources. But does the reality actually live up to the promises?

Symantec names new VP & MD FOR Northern Europe          

Type: News       Published: 07-2015      Views: 2341   
Description: Symantec has further strengthened its growth by appointing industry veteran Keith Bird as vice president & managing director for Northern Europe with responsibility for UK, Ireland and the Nordic region

Advanced integration with cloud storage apps         

Type: News       Published: 07-2015      Views: 1907   
Description: CoSoSys has announced the development of Endpoint Protector 4 to include new integrations with Dropbox for Business and Box to strengthen data security policies and prevent data losses and theft through employee's data transfers made to cloud-based storage applications

Acunetix Online Vulnerability Scanner         

Type: Review       Published: 05-2015      Views: 11233   
Description: In today's competitive global markets, SMBs need to protect their web sites from hackers just as much as enterprises do, but few have the financial resources to ensure they are totally secure

Top 3 data security threats         

Type: Opinion       Published: 05-2015      Views: 2491   
Description: Roman Foeckl, CEO and founder of CoSoSys, offers his insights on how to mitigate threats through a sound data security plan

Gemalto SafeNet ProtectV 2.0         

Type: Review       Published: 05-2015      Views: 7717   
Description: The cost benefits alone make moving virtualised data centres into the cloud a no-brainer, but concerns about security are still a major stumbling block

Staying ahead of threats         

Type: News       Published: 05-2015      Views: 2216   
Description: AlienVault is to work with HP to broaden the reach of cyber threat intelligence sharing

Invisible infrastructure and access management from Cryptzone

Type: News       Published: 04-2015      Views: 1520   
Description: AppGate Secure Access Enables Organizations to Adopt Software Defined Perimeter Approach for Granular Security Control

Negotiating the more slippery slopes

Type:       Published: 01-2015      Views: 1675   
Description: With the average cost of security breaches to large organisations increasing to between £600k-£1.15m* in the last year, the role of the security architect has become critical

Technologies to keep you safe         

Type: Opinion       Published: 01-2015      Views: 2554   
Description: With attacks increasing in frequency and sophistication, which are the technologies that can best protect your organisation? Global analyst Gartner offers some insights.

Cloud gets personal         

Type:       Published: 01-2015      Views: 3214   
Description: IBM has patented the design for a data privacy engine that can help businesses protect personal data as it is shared between countries, including across private clouds.

Seeking out hidden threats         

Type:       Published: 01-2015      Views: 2195   
Description: Predictive analytics is an emerging detection capability that can help security professionals seek out the enemy when they attack their systems.

BAE Systems' silver lining          

Type: News       Published: 01-2015      Views: 1977   
Description: BAE Systems has completed the acquisition of Perimeter Internetworking Corp, which trades as SilverSky, a commercial cyber service provider

What keeps digital leaders awake at night?         

Type: News       Published: 01-2015      Views: 1602   
Description: Security, loss of data and cloud security are the top things that keep digital leaders awake at night, according to a survey from BCS, The Chartered Institute for IT

Current Page: 1    | 1 |    Total Views of these articles: 117766