IT Leaders' Forum: Security in the age of insecurity

clock • 4 min read

How can organisations avoid falling dangerously behind in the cyber security arms race?

There was a time when the stereotypical image of the average malware writer was of a greasy Herbert holed up in a dreary suburb of Moscow or Chisinau, supposedly banging out dodgy code at the behes...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
University CIO: 'We were owned in 4 hours'

Threats and Risks

And that certainly focused minds, says Salford University’s Mark Wantling

clock 20 March 2024 • 5 min read
Exclusive: Behind the scenes of DWP's ambitious tech transformation

Government

Modernising Europe’s biggest IT estate

clock 13 March 2024 • 5 min read
'It just suddenly narrows at the top': Advice for women seeking the C-suite

Leadership

Focus on doing the right thing – not the easy thing

clock 06 March 2024 • 4 min read

More on Threats and Risks

UK sanctions China-based hackers

UK sanctions China-based hackers

Attackers were targeting voters and politicians

clock 28 March 2024 • 3 min read
Russian cyber spies target German politicians in sophisticated phishing attack

Russian cyber spies target German politicians in sophisticated phishing attack

Germany's cyber agency BSI warned that state-backed hackers aimed to establish long-term access to German political networks

clock 25 March 2024 • 3 min read
Apple M-series CPU vulnerability enables attackers to purloin cryptographic keys from Macs

Apple M-series CPU vulnerability enables attackers to purloin cryptographic keys from Macs

US researchers find baked-in flaw

Graeme Burton
clock 22 March 2024 • 2 min read