computing_logo
Sign in Join
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
logo
  • logo

    Search Computing

     

     

  • Latest
  • Topics

    Choose a topic from the list below

    • Diversity in Tech
    • Big Data & Analytics
    • DevOps
    • Security
    • GDPR
    • AI & ML
    • Cloud & Infrastructure
    • CIO
    • Deskflix
  • Tech Impact
  • Diversity in Tech
  • Deskflix
  • Events
  • Whitepapers
  • More

    Most Popular content

    • Delta
    • Big Data & Analytics
    • Cloud
    • Leadership & Strategy
    • Open Source
    • Storage
    • Telecoms
    • Top 100 IT Leaders

    Featured content

    • On-demand webinars
    • Identity Access Management Hub
    • Research
    • Delta
    • Tech Marketing Hub

    Authors

    • Stuart Sumner
    • John Leonard
    • Tom Allen
    • Computing Contributors

    Computing Resources

    • English
    • Français
    • Deutsch
    • Espagnol
    • Italien
  • Searchlogo

    Search Computing

    x
Join Sign in
 
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
    • Sign in

Security Technology

Okta eats own dog food on WFH, tightens supplier access after Lapsus$ breach

Security

Okta eats own dog food on WFH, tightens supplier access after Lapsus$ breach

Okta contracts are 100% work from home, says senior solutions engineer Craig Hinchliffe

clock 13 June 2022 • 2 min read
All software is vulnerable so lock it by default, ThreatLocker

Security Technology

All software is vulnerable so lock it by default, ThreatLocker

'Don't trust anything. Zero trust is the mindset we should apply'

clock 10 June 2022 • 2 min read
Microsoft Defender now isolates unmanaged Windows devices that have been compromised

Security Technology

Microsoft Defender now isolates unmanaged Windows devices that have been compromised

When an admin 'contains' a device, any MDE onboarded device will restrict incoming and outgoing communication with that device

clock 10 June 2022 • 2 min read
Use AI as the missing piece of defence in depth

Security Technology

Use AI as the missing piece of defence in depth

There is no silver bullet for cybersecurity.

clock 09 June 2022 • 3 min read
Faith no more: the rise of 'zero trust' approaches to cyber security

Security Technology

Faith no more: the rise of 'zero trust' approaches to cyber security

The need to support WFH and flaws in the perimeter model has pushed ZTN to the fore

clock 07 June 2022 • 8 min read
Microsoft to introduce free VPN for Edge browser

Security Technology

Microsoft to introduce free VPN for Edge browser

Redmond lines up a 1GB-per-month secure tunnelling service - but you'll need to sign in

clock 03 May 2022 • 2 min read
OpenSSH 9.0 upgraded to resist attacks by quantum computers

Security Technology

OpenSSH 9.0 upgraded to resist attacks by quantum computers

Widely used connectivity suite has been beefed up to prevent 'capture now, decrypt later' attacks

clock 13 April 2022 • 2 min read
Industry Voice: Secure your endpoint estate and shift left on support

Security Technology

Industry Voice: Secure your endpoint estate and shift left on support

It is widely recognised that the severity and sophistication of cyberattacks will continue to rise.

clock 06 April 2022 • 2 min read
Industry Voice: User experience and CIAM

Security Technology

Industry Voice: User experience and CIAM

clock 31 March 2022 • 2 min read
Industry Voice: Combat cyber-attacks with effective CIAM

Security Technology

Industry Voice: Combat cyber-attacks with effective CIAM

clock 31 March 2022 • 3 min read
123
Most read
01

Three injured in Google data centre explosion

09 August 2022 • 2 min read
02

Cyberattack hits NHS 111, users warned of delays

08 August 2022 • 2 min read
03

'Massive' cyberattack targets the German Chambers of Industry and Commerce

05 August 2022 • 3 min read
04

Microsoft email users targeted in new phishing campaign that can bypass MFA

05 August 2022 • 3 min read
05

GitLab to erase projects not updated for a year

04 August 2022 • 2 min read
  • Contact us
  • Marketing Solutions
  • About The Channel Company
  • Privacy Settings
  • Terms & Conditions
  • Policies
  • Careers
FOLLOW US

© The Channel Company EMEA
New London House, 172 Drury Lane, London WC2B 5QR.Registered in England and Wales with company registration number 14078896

Loading