• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      event logo
      Where the buck stops: Why a shared responsibility model will help you own your cloud security flaws

      This webinar, and accompanying dedicated research, will reveal to what extent organisations are practicing a shared responsibility model for cloud security today and the degree to which IT leaders are aware of what they should be doing to ensure the secure use of their multi- and hybrid-cloud environments.

      • Date: 27 Jan 2021
      event logo
      Leveraging the Cloud to Defeat Data Disasters

      Join us and learn how your IT team can realize many of the powerful advantages of the cloud and solve the operational complexity behind managing data across hybrid and multi-cloud IT environments with centralized management, automation, end-to-end security, and lower TCO.

      • Date: 28 Jan 2021
      event logo
      Deskflix Hybrid and Multi Cloud

      One of the most powerful tools for breaking down silos and integrating resources is cloud computing. But multi-tenancy cloud is not the ideal environment for every application or every class of data and some will need to remain on-prem for the foreseeable future; nor are all clouds equal. Tune in to Deskflix season 1 to hear industry experts speak on the questions you need answered on hybrid and multi cloud.

      • Date: 10 Feb 2021
      event logo
      Deskflix Financial Services

      oin us for this episode of Deskflix to hear from industry experts and peers on their 2020 best practices, what they’ve learnt for 2021 and how they plan to overcome the next wave of disruption.

      • Date: 03 Mar 2021
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    • Spotlights

      Welcome to Computing's Spotlight section, where we focus in on particularly important themes and topics of enterprise IT.

      Intel logo

       

      Endpoint Management and Security Hub

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 

Security Technology

ImmuniWeb offers free web test to reveal organisations' exposure on the Dark Web
ImmuniWeb offers free web test to reveal organisations' exposure on the Dark Web

System reveals exploits, stolen credentials and documents posted on sites frequented by criminals

  • Security Technology
  • 20 May 2020
This golden age for fraudsters requires a new era of authentication
This golden age for fraudsters requires a new era of authentication

Covid-19 has been a goldmine for criminals, we need to get better at defending ourselves

  • Security Technology
  • 19 May 2020
Industry experts prepare for inaugural Deskflix event: Empowering the Remote Working Revolution
Industry experts prepare for inaugural Deskflix event: Empowering the Remote Working Revolution

Your questions on supporting remote and home working answered

  • Communications
  • 15 May 2020
Moving towards an 'intelligent' security approach
Moving towards an 'intelligent' security approach

AI-enhanced security is bringing intelligence to the protection of valuable assets in more ways than one

  • Security Technology
  • 21 April 2020
Hitachi Capital rolls out identity-as-a-service to handle huge rise in loan applications post-lockdown
Hitachi Capital rolls out identity-as-a-service to handle huge rise in loan applications post-lockdown

Lender is extending its use of Nomidio IDV to speed application processing for the UK government's Coronavirus Business Interruption Loan Scheme (CBILS)

  • Security Technology
  • 21 April 2020
3D-printed 'fake fingerprints' can bypass fingerprint scanners, researchers warn
3D-printed 'fake fingerprints' can bypass fingerprint scanners, researchers warn

Ultrasonic sensors are easiest to fool

  • Security Technology
  • 09 April 2020
Covid-19: the race to create privacy-focused contact tracing tools
Covid-19: the race to create privacy-focused contact tracing tools

As authorities seek technological solutions to the pandemic, experts fear the consequences for civil liberties

  • Privacy
  • 07 April 2020
How rapid advances in quantum computing are reshaping cybersecurity
How rapid advances in quantum computing are reshaping cybersecurity

We must all prepare for the end of public key encryption as we know it

  • Security
  • 01 April 2020
Coming soon, save the date: Deskflix, Computing's online event series
Coming soon, save the date: Deskflix, Computing's online event series

Season One: Empowering the remote working revolution

  • Mobile
  • 30 March 2020
Microsoft releases early preview of 'hardware-enforced stack protection' feature for Windows 10 Insider previews builds
Microsoft releases early preview of 'hardware-enforced stack protection' feature for Windows 10 Insider previews builds

Hardware-enforced stack protection uses a combination of modern CPU hardware and 'shadow stacks' to protect app code from cyber attacks

  • Security Technology
  • 25 March 2020
When hunting for a new IT solution, understand the problem first
When hunting for a new IT solution, understand the problem first

Ian Hill of BAM Group warns against being distracted by bells and whistles

  • Security Technology
  • 19 March 2020
Let's Encrypt to revoke three million digital certificates TODAY due to bug in its certificate authority code
Let's Encrypt to revoke three million digital certificates TODAY due to bug in its certificate authority code

Bug was discovered on 29th February. The certificates will be revoked today

  • Security Technology
  • 04 March 2020
Check Point unveils encyclopaedia to explain techniques used by malware to detect virtual environment
Check Point unveils encyclopaedia to explain techniques used by malware to detect virtual environment

A virtual environment differs from common host systems in terms of registry keys, non-common files, and system objects

  • Security Technology
  • 02 March 2020
Intel promises full memory encryption as it presents its data-centric security strategy
Intel promises full memory encryption as it presents its data-centric security strategy

Intel promises bigger investment in security following the Meltdown and Spectre security bugs

  • Security Technology
  • 27 February 2020
Microsoft adds supports for tamper protection in Defender ATP
Microsoft adds supports for tamper protection in Defender ATP

The feature prevents threat actors from modifying security settings on Windows 10 device

  • Security Technology
  • 20 February 2020
Inside the race to quantum-proof our vital infrastructure
Inside the race to quantum-proof our vital infrastructure

When quantum computers arrive the Web as we know it will break. We talk to scientists cryptographers and entrepreneurs working to ensure this does not happen.

  • Security Technology
  • 03 January 2020
Microsoft to add DNS over HTTPS to Windows 10 to boost users' privacy
Microsoft to add DNS over HTTPS to Windows 10 to boost users' privacy

DNS over HTTPS encrypts DNS traffic - hiding users' web surfing from ISPs

  • Security Technology
  • 19 November 2019
Google's quantum supremacy is real. Now we urgently need quantum-safe encryption, says UKNQT's Sir Peter Knight
Google's quantum supremacy is real. Now we urgently need quantum-safe encryption, says UKNQT's Sir Peter Knight

'There's a lot at stake in rewiring the world in terms of encryption and we all depend on getting it right'

  • Security Technology
  • 05 November 2019
Avast and French police disinfect 850,000 PCs with Retadup malware after seizing command-and-control servers
Avast and French police disinfect 850,000 PCs with Retadup malware after seizing command-and-control servers

Design error in Retadup's command-and-control server enabled security specialists to remotely remove the malware

  • Security Technology
  • 28 August 2019
Microsoft, Google and Intel launch Confidential Computing Consortium
Microsoft, Google and Intel launch Confidential Computing Consortium

The new security consortium will develop standards for securing sensitive data during processing

  • Security Technology
  • 22 August 2019
Visa adds new payment security services to combat emerging frauds
Visa adds new payment security services to combat emerging frauds

New payment fraud services from Visa includes a tool to probe websites for card-data skimmer malware

  • Security Technology
  • 21 August 2019
The journey to passwordless at Zurich Insurance
The journey to passwordless at Zurich Insurance

Insurer is using adaptive multifactor authentication with the eventual aim of ditching passwords altogether

  • Security Technology
  • 08 August 2019
Microsoft announces general availability of Azure Security Centre for IoT
Microsoft announces general availability of Azure Security Centre for IoT

IoT Azure security tool can identify configuration issues before they can be used in a cyber attack

  • Security Technology
  • 30 July 2019
Oracle releases July 2019 Critical Patch Update to address vulnerabilities across multiple products
Oracle releases July 2019 Critical Patch Update to address vulnerabilities across multiple products

Latest Oracle patch release addresses a mere 319 vulnerabilities across the company's enterprise software

  • Security Technology
  • 17 July 2019
123

Most read

Russian malware found on government-issued laptops for home schooling
Russian malware found on government-issued laptops for home schooling
New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach
New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach
Hackers publish data stolen from SEPA as the agency refuses to pay ransom
Hackers publish data stolen from SEPA as the agency refuses to pay ransom
Google locks out another top AI ethicist
Google locks out another top AI ethicist
Hacker leaks data of more than 2 million dating site users
Hacker leaks data of more than 2 million dating site users
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading