Owned by the C-suite: a new approach to security is needed as cyber risks multiply

clock • 5 min read

Post-Covid-19, security is no longer an ‘IT issue’ – it’s a C-suite item and a fundamental strategic priority

One of the clear effects of the Covid-19 pandemic has been a dramatic shift in the cyber threat. With the rapid move to remote working, the relative safe haven of the corporate network has mutated ...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
Next's CISO: Learn from attackers to boost cyber defences

Security

Collaboration, knowledge sharing, agility – there’s a lot that cyber criminals do right

clock 02 May 2024 • 4 min read
All change? The CIO challenge in the next five years

Strategy

The new CIO is one who shapes strategy, rather than having it forced upon them

clock 30 April 2024 • 5 min read
'Few organisations realise cyber tools' potential' - Dan Burns, CISO at Next

Security

Keynote speaker at the Cybersecurity Festival 2024

clock 04 April 2024 • 2 min read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Threats and Risks

CISA identifies GitLab vulnerability under exploit

CISA identifies GitLab vulnerability under exploit

Hope you have two-factor

Tom Allen
clock 03 May 2024 • 2 min read
Experimental Morris II worm can exploit popular AI services to steal data and spread malware

Experimental Morris II worm can exploit popular AI services to steal data and spread malware

Cornell researchers created worm 'to serve as a whistleblower'

clock 01 May 2024 • 3 min read
UK bans devices with weak passwords

UK bans devices with weak passwords

Under new rules, manufacturers must prompt users to change generic passwords during setup

clock 30 April 2024 • 3 min read