What has 2022 got in store for security? Learn all about it at the CyberSecurity Festival Chapter 2

Tom Allen
clock • 1 min read
What has 2022 got in store for security? Learn all about it at the CyberSecurity Festival Chapter 2
Image:

What has 2022 got in store for security? Learn all about it at the CyberSecurity Festival Chapter 2

As well as networking with your peers, you'll learn practical hints and tips for securing your environment in the age of hybrid working

Following the success of the CyberSecurity Festival in June, Computing is hosting an online spin off event on Tuesday 9th November, which will reconnect IT professionals from around the UK to discu...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

More on Threats and Risks

The attacks appear to be random and untargeted

UK scammers mailing counterfeit Microsoft Office USB drives

People who receive the drives may think they have accidentally obtained a genuine copy of Office Professional Plus

clock 18 August 2022 • 3 min read
About 10% of Kickstarter's entire user base received password reset emails

Kickstarter asks million to change passwords, provides no explanation

Kickstarter told users it is simplifying its login process

clock 18 August 2022 • 2 min read
Microsoft warns of Russian 'Seaborgium' phishing, reconnaissance activities

Microsoft warns of Russian 'Seaborgium' phishing, reconnaissance activities

The company says it has blocked a number of accounts used by the threat actors

clock 17 August 2022 • 2 min read