Comment: Past masters in security

clock • 3 min read

The principles of fortification that were originally used to build castles have lessons for IT managers, and can help them set up modern-day data defences, argues Neil Barrett

The American embassy in Grosvenor Square is a fascinating building. At first glance, it looks like any other modern office block, but on closer inspection, it's a lot more special than that. A wide...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

More on Hacking

Hackers used compromised Citrix credentials to attack healthcare provider

Hackers used compromised Citrix credentials to attack healthcare provider

Data belonging to a 'substantial proportion' of Americans may have been stolen

Kyle Alspach
clock 01 May 2024 • 3 min read
Global government networks breached in 'ArcaneDoor' espionage campaign

Global government networks breached in 'ArcaneDoor' espionage campaign

Threat actors compromised networks using Cisco zero-day exploits

clock 26 April 2024 • 2 min read
Millions at risk as hackers threaten World-Check database leak

Millions at risk as hackers threaten World-Check database leak

Company says compromised data originated from a third-party vendor

clock 22 April 2024 • 2 min read