• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in IT Excellence
  • Cloud & Infrastructure
  • CIO
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Newsletters
  • Sign in
  • Events
    • Upcoming events
      event logo
      Insecure by default: Why you need to rethink your approach to O365 email security

      This research will explore attitudes and experiences around O365 email security amongst enterprise IT, including email-based cyber security attacks, service outages, Microsoft’s default security offerings, third-party services and employee cyber security training.

      • Date: 12 Sep 2019
      • Your Computer
      event logo
      Women in Tech Festival UK

      New for 2019: CRN & Computing are proud to present the Women in Tech Festival UK!

      • Date: 17 Sep 2019
      • The Brewery 52 Chiswell Street London EC1Y 4SD, London
      event logo
      Women

      New for 2019: CRN & Computing are proud to present the Women in Tech Festival UK!

      • Date: 17 Sep 2019
      • The Brewery 52 Chiswell Street London EC1Y 4SD, London
      event logo
      For the many or the few: What’s the best approach to building a data-guided organisation?

      Today’s organisations are generating and hoarding massive amounts of data. Making the most of its immense value is a challenge that spans technology, leadership, cultural, and ethical considerations.

      • Date: 18 Sep 2019
      • Your Computer
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    • Spotlights

      Welcome to Computing's Spotlight section, where we focus in on particularly important themes and topics of enterprise IT.

      Data Strategy Spotlight

      Computing, in association with Liaison Technologies, is hosting the Data Strategy channel.

  • IT Leaders 250
  • Research
  • Delta
  • Sign in
  •  
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
     
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
  • Follow us
    • RSS
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in IT Excellence
  • Cloud & Infrastructure
  • CIO
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 

Computing

LATEST

Apple to unveil new iPhone 11 on 10 September
  • Hardware
Apple to unveil new iPhone 11 on 10 September

New 7nm A13 SoC, Taptic Engine, reverse wireless charging and USB-C all expected to feature on imminent Apple iPhone 11 smartphones

  • 30 Aug
Andrew Josey the open group
  • Operating Systems
Celebrating 50 years of the Unix operating system
  • 29 Aug 2019
Shortlist announced for UK IT Industry Awards 2019
  • Leadership
Shortlist announced for UK IT Industry Awards 2019
  • 19 Aug 2019
Cloud Live 2019: Meet the speakers
  • Cloud and Infrastructure
Cloud Live 2019: Meet the speakers
  • 06 Aug 2019
A new approach to IT research: Computing Delta
  • Leadership
A new approach to IT research: Computing Delta
  • 01 Apr 2019

News continued

Google Project Zero discovers malicious websites that have been hacking iPhones for at least two years
  • Threats and Risks
Google Project Zero discovers malicious websites that have been hacking iPhones for at least two years
  • 30 Aug 2019
Six ethical hackers become millionaires by reporting bugs via the HackerOne platform
  • Hacking
Six ethical hackers become millionaires reporting bugs via the HackerOne platform
  • 30 Aug 2019
Huawei faces additional investigation by US authorities over new intellectual property theft allegations
  • Hardware
Huawei faces additional investigation by US authorities over new intellectual property theft allegations
  • 30 Aug 2019
Capital One hacker mined cryptocurrency on cloud servers of more than 30 companies
  • Security
Capital One hacker mined cryptocurrency on cloud servers of more than 30 companies
  • 30 Aug 2019
MIT researchers create programmable 16-bit microprocessor from carbon nanotubes
  • Hardware
MIT researchers create programmable 16-bit microprocessor from carbon nanotubes
  • 29 Aug 2019
Micro Focus shares plunge 30 per cent following profits warning
  • Software
Micro Focus shares plunge 30 per cent following profits warning
  • 29 Aug 2019
US cyber attack crippled Iranian database used to target Persian Gulf oil tankers
  • Hacking
US cyber attack crippled Iranian database used to target Persian Gulf oil tankers
  • 29 Aug 2019
  • Cloud and Infrastructure
Transform your organization in the right way - How ITIL 4 can help with the challenges
  • 29 Aug 2019
Google patches high-severity Chrome browser engine security flaw
  • Threats and Risks
Google patches high-severity Chrome browser engine security flaw
  • 29 Aug 2019

LATEST WHITEPAPERS

New apps for old

This Computing whitepaper examines the pain points associated with application deployment and management in an increasingly hybrid and rapidly changing IT environment. In particular, it looks at how companies striving for digital transformation are adopting new technologies to achieve those aims, from prioritising mobile support to data-driven process automation and AI, and at the impact these are having on development schedules.

Download
Top 10 ways to protect your organisation from ransomware
No organisation is exempt from ransomware attacks as it continues to be one of the most prominent malware threats used by cybercriminals. To survive a ransomware attack, you must be prepared.
These 10 ten ways will help you protect your organisation from ransomware through protective and response methods.
Download
GDPR is a state of mind, not just a technology solution

GDPR is coming and there is no black and white compliance solution. Most businesses seem to worry but, with the right approach and the right combination of tools, building a sustaining framework to support GDPR and other regulations is possible. Download now to find out more.

Download

News continued

NatWest website back up after second day of IT outages
  • Software
NatWest website back up after second day of IT outages
  • 28 Aug 2019
New Microsoft Edge browser fires off more than 130 requests to almost 50 endpoints on first run
  • Software
New Microsoft Edge browser fires off more than 130 requests to almost 50 endpoints on first run
  • 28 Aug 2019
US government receives more than 130 applications for licences to supply Huawei
  • Security
US government receives more than 130 applications for licences to supply Huawei
  • 28 Aug 2019
Avast and French police disinfect 850,000 PCs with Retadup malware after seizing command-and-control servers
  • Security Technology
Avast and French police disinfect 850,000 PCs with Retadup malware after seizing command-and-control servers
  • 28 Aug 2019
Microsoft faces new GDPR privacy investigation over Windows 10 telemetry
  • Security
Microsoft faces new GDPR privacy investigation over Windows 10 telemetry
  • 28 Aug 2019
SpaceX Starhopper rocket prototype blasts to new heights in dramatic test flight
  • Hardware
SpaceX Starhopper rocket prototype blasts to new heights in dramatic test flight
  • 28 Aug 2019
Former Google engineer Anthony Levandowski charged with stealing driverless car trade secrets
  • Communications
Former Google engineer Anthony Levandowski charged with stealing driverless car trade secrets
  • 28 Aug 2019
How tech organisations buy
  • Leadership
How tech organisations buy
  • 27 Aug 2019
Selling to the C-suite
  • Leadership
Selling to the C-suite
  • 27 Aug 2019
Cybersecuritylivemonty 1100x320

New threats, new approaches

Thursday 21 November, London Marriott Hotel
Find out more
Cloudandinfrastructuremonty 1100x320

Harvesting Maximum Cloud Potential

19 September at Hilton London Tower Bridge
Find out more
Securityexcellencemonty 1100x320

Recognising Security Success

Entries open until 13 September
Find out more
Deltamonty 1100x320

Delta

Europe’s first independent market analysis tool for IT Leaders
Read more

Opinion

Andrew Josey the open group
Andrew Josey
Celebrating 50 years of the Unix operating system
  • 29 Aug 2019
Six networking tips for women new to tech
Holly Brockwell
Six networking tips for women new to tech
  • 21 Aug 2019
AI and the emergent properties of good, bad and evil
Peter Cochrane
Peter Cochrane: AI and the emergent properties of good, bad and evil
  • 19 Aug 2019
Six ways women in tech can improve their work-life balance
Holly Brockwell
Six ways women in tech can improve their work-life balance
  • 08 Aug 2019

Computing Survey Panel

Join our Research Survey Panel and earn an Amazon voucher for each survey you complete!

Find out more

Most read

  1. New Microsoft Edge browser fires off more than 130 requests to almost 50 endpoints on first run
  2. Celebrating 50 years of the Unix operating system
  3. Google Project Zero discovers malicious websites that have been hacking iPhones for at least two years
  4. Apple to unveil new iPhone 11 on 10 September
  5. Google patches high-severity Chrome browser engine security flaw
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • RSS
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017