• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      event logo
      How to overcome your Active Directory consolidation challenges

      In this web seminar we explore how best to go about assessing and modernising your AD as we reveal our research findings into AD health and readiness, consolidation challenges, and strategies for success.

      • Date: 20 Apr 2021
      event logo
      Mitigating Ransomware Attacks

      In this webinar, Javvad Malik, Security Awareness Advocate at KnowBe4, will share practical advice and real-world examples of how you can defend your organisation from the ongoing ransomware threat.

      • Date: 27 Apr 2021
      event logo
      Desklix: Digital Workplace

      The Coronavirus pandemic has had a huge impact on our lives with most organisations making a sudden switch to mass remote working. As restrictions are progressively eased, the impact continues, with organisations having to decide when to allow staff back into offices, what proportion of remote working should be expected, and how all of this should be supported.Take part in this virtual event to put your questions to the experts, and see what your peers have learnt from the pandemic, and how they plan to apply this understanding to 2021 and beyond.

      • Date: 12 May 2021
      event logo
      How to improve security whilst reducing workload and stress

      In this webinar we discuss the existing situation and its solutions, with automation one of the most promising.

      • Date: 13 May 2021
      • Computing UK, London
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    • Spotlights

      Welcome to Computing's Spotlight section, where we focus in on particularly important themes and topics of enterprise IT.

      Intel logo

       

      Endpoint Management and Security Hub

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 

Nicholas Fearn

Follow Nicholas Fearn

  • Article feed

Articles by Nicholas Fearn

Focus on 'customer experience' - or lose customers
Focus on 'customer experience' - or lose customers

Former NHBC and City University CIO Carl Stokes tells Computing why customer experience should be a priority - and how organisations ought to do it

  • Leadership
  • 09 January 2020
Death of the keyboard and mouse: How human-computer interfaces are evolving
Death of the keyboard and mouse: How human-computer interfaces are evolving

The keyboard and mouse is already giving way to human-computer interfaces that could once only have been seen in sci-fi films, writes Nic Fearn

  • Hardware
  • 07 January 2020
Should security shift from defence to containing attacks?
Should security shift from defence to containing attacks?

The risks of cyber attack are more than doubling every year. So should CIOs and CISOs rethink how they organise IT security, Nic Fearn asks

  • Security
  • 12 November 2019
How Ted Baker's digital transformation helped drive sales
How Ted Baker's digital transformation helped drive sales

Global retailer Ted Baker found that its ecommerce platform alone wasn't sufficient to satisfy demanding customers in today's competitive environment

  • Cloud and Infrastructure
  • 11 November 2019
Bridging the gap: Can DevOps help embed security into app development?
Bridging the gap: Can DevOps help embed security into app development?

DevOps is designed to bring developers and operations more closely together. Ahead of Cyber Security Live later this month, Nic Fearn asks: Can it also encompass security as well?

  • Security
  • 07 November 2019
Who 'owns' cyber security?
Who 'owns' cyber security?

Ahead of Cyber Security Live later this month, Nic Fearn asks: With cyber crime rocketing, who in your organisation should have ultimately 'ownership' of IT security?

  • Security
  • 06 November 2019
How Quantum technology could transform computing - perhaps…
How Quantum technology could transform computing - perhaps…

There's still some time - and a number of challenges to overcome - before quantum computing becomes truly useful, reports Nic Fearn

  • Hardware
  • 29 October 2019
How PSD2 will affect payments for banks and business
How PSD2 will affect payments for banks and business

Nic Feare examines the changes that the Revised Directive on Payment Services (PSD2) will make to banking and business

  • Security
  • 26 September 2019
How greater 'neurodiversity' could improve cyber security and help overcome IT skills shortages
How greater 'neurodiversity' could improve cyber security and help overcome IT skills shortages

Cyber security needs specialists who really can 'think different'

  • Leadership
  • 24 September 2019
The outer limits? What will happen when microprocessors reach 'silicon plateau'?
The outer limits? What will happen when microprocessors reach 'silicon plateau'?

As copper and silicon-based CPUs reach their physical limits, what is in the pipeline that will keep compute power growing? Nic Fearn investigates

  • Hardware
  • 17 September 2019
APIs are 'rich targets' for hackers, warn security researchers
APIs are 'rich targets' for hackers, warn security researchers

Researchers at F5 Labs claim that APIs have become an easy target for hackers.

  • Security
  • 15 August 2019
Capital One hacker may have hacked more than 30 other companies, claim prosecutors
Capital One hacker may have hacked more than 30 other companies, claim prosecutors

Paige Thompson could face up to five years in prison if found guilty

  • Security
  • 15 August 2019
Amazon quizzed over AWS security following Capital One leak
Amazon quizzed over AWS security following Capital One leak

House of Representatives committee plans to quiz Amazon over AWS security following Capital One data breach

  • Security
  • 02 August 2019
Public key spamming issue remains unfixed: Why is Tor so quiet about it?
Public key spamming issue remains unfixed: Why is Tor so quiet about it?

We tried downloading the keyserver-crashing 0x4E2C6E8793298290 but it's still 'too large' to import

  • Security
  • 02 August 2019
New laws proposed in the US to protect technology supply chains from espionage
New laws proposed in the US to protect technology supply chains from espionage

New law is intended to crack down on alleged espionage by China against US infrastructure and intellectual property

  • Government
  • 01 August 2019
Whistleblower wins $9m over surveillance software Cisco knew was bug-ridden
Whistleblower wins $9m over surveillance software Cisco knew was bug-ridden

Cisco has agreed to an $8.6 million settlement over claims it sold vulnerable software to US government agencies

  • Security
  • 01 August 2019
Hackers can bypass verification limits on Visa cards
Hackers can bypass verification limits on Visa cards

Researchers have described the findings as "significant" and called on banks to improve contactless payment card security

  • Security
  • 31 July 2019
How Leeds Building Society plans to achieve diversity in tech
How Leeds Building Society plans to achieve diversity in tech

Leeds' Becky Hewitt talks about some of the initiatives the building society has adopted to achieve its target of 33 per cent of women holding senior leadership roles by 2021

  • Leadership
  • 29 July 2019
Malware attacks down by 20 per cent, while ransomware-as-a-service has boomed
Malware attacks down by 20 per cent, while ransomware-as-a-service has boomed

Ransomware-as-a-service attacks on UK organisations have tripled over the past year, claims SonicWall

  • Security
  • 26 July 2019
New 'highly targeted' mobile malware, dubbed 'Monokle', linked to Russian hackers
New 'highly targeted' mobile malware, dubbed 'Monokle', linked to Russian hackers

Researchers believe the malware was created by STC, a Russian company accused of interfering in the 2016 US presidential election

  • Security
  • 25 July 2019
Microsoft has updated its Windows 10 servicing model
Microsoft has updated its Windows 10 servicing model

Microsoft claims that the changes will allow it to gain better feedback on its releases

  • Software
  • 25 July 2019
Facebook expected to settle with FTC today, paying $5bn over data handling and agreeing to new controls
Facebook expected to settle with FTC today, paying $5bn over data handling and agreeing to new controls

The FTC is expected to announce the agreement on Wednesday

  • Security
  • 24 July 2019
Apple to release three new iPhones this year
Apple to release three new iPhones this year

New Apple iPhones with A14 chip, and improved cameras and displays are expected to be unveiled in September

  • Hardware
  • 24 July 2019
Microsoft revenues up by 12 per cent driven by Azure cloud growth
Microsoft revenues up by 12 per cent driven by Azure cloud growth

Cloud - and Office 365 in particular - drove revenues up again, but Xbox hardware sales tanked

  • Hardware
  • 19 July 2019
BlackBerry Cylance AI-based anti-virus 'tricked' into passing malware off as safe
BlackBerry Cylance AI-based anti-virus 'tricked' into passing malware off as safe

Researchers were able to trick a popular AI system into thinking ten of the most dangerous forms of malware were good.

  • Security
  • 19 July 2019
Trump concerned about $10bn Pentagon cloud computing contract
Trump concerned about $10bn Pentagon cloud computing contract

Trump could stop JEDI cloud contract over competition concerns as bidding comes down Microsoft versus Amazon

  • Government
  • 18 July 2019
Thousands of Windows users targeted by nation state attacks, says Microsoft
Thousands of Windows users targeted by nation state attacks, says Microsoft

The majority of the attacks originate from Iran, North Korea and Russia, and took place in the past year

  • Security
  • 18 July 2019
BMC firmware weaknesses put popular servers at risk - updated
BMC firmware weaknesses put popular servers at risk - updated

Security flaws identified by Eclypsium have since been mitigated by manufacturers

  • Security
  • 17 July 2019
Russia-linked Turla APT revamps arsenal to avoid detection with fileless malware
Russia-linked Turla APT revamps arsenal to avoid detection with fileless malware

The hacking group has developed new forms of malware to avoid detection from software programs such as VPNs.

  • Security
  • 17 July 2019
US charges Chinese software engineer for theft of trade secrets
US charges Chinese software engineer for theft of trade secrets

William Yao could face up to ten years in prison if convicted - if he returns from China

  • Government
  • 12 July 2019
Magecart hackers infect over 17,000 web domains
Magecart hackers infect over 17,000 web domains

Security researchers believe the scale of Magecart compromise is far larger than previously thought

  • Security
  • 12 July 2019
Warning over 12 new security flaws found in industrial control systems
Warning over 12 new security flaws found in industrial control systems

ICS flaws highlighted by Tenable come a decade after the Stuxnet worm targeted an Iranian uranium enrichment plant

  • Security
  • 11 July 2019
25 million Android devices infected by new malware variant dubbed 'Agent Smith'
25 million Android devices infected by new malware variant dubbed 'Agent Smith'

'Agent Smith' malware replaces legitimate applications with malicious versions

  • Security
  • 11 July 2019
Unsecured database containing 188 million personal records discovered online
Unsecured database containing 188 million personal records discovered online

Yet another trove of unsecured personal data uncovered - this time containing information from data brokers Pipl.com and LexisNexis

  • Security
  • 10 July 2019
Government's digital strategy has lost momentum, claims Science and Technology Committee report
Government's digital strategy has lost momentum, claims Science and Technology Committee report

MPs slam government's faltering digital strategy

  • Government
  • 10 July 2019
Facebook fixes global outage across social platforms
Facebook fixes global outage across social platforms

The outage affected Facebook, Ingstagram, WhatsApp and Messenger users globally

  • Social Networking
  • 04 July 2019
US plan to use "retro" technology to bolster power grid defences
US plan to use "retro" technology to bolster power grid defences

Securing Energy Infrastructure Act plan will use low-tech used to improve the US power grid's cyber defences

  • Security
  • 03 July 2019
G-Cloud 11 goes live with 4,200 suppliers onboard
G-Cloud 11 goes live with 4,200 suppliers onboard

Launch of G-Cloud 11 comes as over £4bn has been spent on IT procurement by public sector bodies via the service

  • Government
  • 03 July 2019
Researchers discover vulnerability in the Microsoft Excel tool
Researchers discover vulnerability in the Microsoft Excel tool

Excel spreadsheet vulnerability enables cyber criminals to launch attacks on unwitting users

  • Security
  • 28 June 2019
Met police face enforcement order over data request handling
Met police face enforcement order over data request handling

The ICO has given Met officials until September to implement appropriate measures

  • Security
  • 27 June 2019
NHS Wales to overhaul IT systems through Microsoft deal
NHS Wales to overhaul IT systems through Microsoft deal

The rollout will begin next month and provide over 100,000 NHS Wales staff with access to modern workplace tools.

  • Government
  • 27 June 2019
MPs launch electronic waste and circular economy inquiry
MPs launch electronic waste and circular economy inquiry

Politicians will explore the true extent of the UK's e-waste problem and how a circular economy can be created for electronic goods.

  • Government
  • 27 June 2019
Tesla Model 3 navigation security flaw enables hackers to take control of Autopilot
Tesla Model 3 navigation security flaw enables hackers to take control of Autopilot

Sat Nav spoofing is a growing threat to in-car driver assistance systems and autonomous vehicles, warns Regulus

  • Security
  • 26 June 2019
Java and JavaScript the most used programming languages, but Azure is giving way to Google, says survey
Java and JavaScript the most used programming languages, but Azure is giving way to Google, says survey

The report shines a light on the biggest development trends of 2019

  • Software
  • 21 June 2019
UK Government unveils security standard for surveillance cameras
UK Government unveils security standard for surveillance cameras

The standard aims to combat attacks launched by infected camera systems

  • Security
  • 21 June 2019
Unauthorised Raspberry Pi allowed hackers to compromise NASA's systems
Unauthorised Raspberry Pi allowed hackers to compromise NASA's systems

A recent audit has unveiled a series of security errors at NASA

  • Security
  • 20 June 2019
Saudi cyber team tried to hack the Guardian following Jamal Khashoggi death
Saudi cyber team tried to hack the Guardian following Jamal Khashoggi death

Journalists have been told to protect themselves.

  • Security
  • 20 June 2019
Netflix warns of several new TCP networking vulnerabilities
Netflix warns of several new TCP networking vulnerabilities

The vulnerabilities relate to the MSS and TCP SACK capabilities

  • Security
  • 19 June 2019
123
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Privacy Settings
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017