Managing the attack surface of your data, not your infrastructure

clock • 4 min read

As data moves offsite into public cloud services or service provider sites, so data protection strategy will have to change

Managing a company's exposure to risk is an everyday task for IT security professionals. This is often based on knowing the "attack surface" that the company has. Your attack surface is the aggr...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
Data breach at French unemployment agency exposes 43 million people

Hacking

Hackers infiltrated the France Travail's IT systems

clock 15 March 2024 • 2 min read
'Like a stalker': Data broker LiveRamp reported to UK, French regulators

Legislation and Regulation

'This kind of opaque identity monitoring cannot be part of our future digital society'

clock 04 March 2024 • 3 min read
Regulation has made EU firms less data-hungry

Legislation and Regulation

GDPR has cut storage and processing

clock 21 February 2024 • 2 min read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Threats and Risks

UK bans devices with weak passwords

UK bans devices with weak passwords

Under new rules, manufacturers must prompt users to change generic passwords during setup

clock 30 April 2024 • 3 min read
Leicester streetlights on day and night following cyber-attack

Leicester streetlights on day and night following cyber-attack

Effects of ‘highly sophisticated’ breach still being felt

Penny Horwood
clock 25 April 2024 • 1 min read
Mandiant's 2024 threat report - five takeaways

Mandiant's 2024 threat report - five takeaways

Latest M-Trends report details how ransomware, zero-day attacks and other threats evolved last year.

Kyle Alspach
clock 24 April 2024 • 5 min read