Owned by the C-suite: a new approach to security is needed as cyber risks multiply

clock • 5 min read

Post-Covid-19, security is no longer an ‘IT issue’ – it’s a C-suite item and a fundamental strategic priority

One of the clear effects of the Covid-19 pandemic has been a dramatic shift in the cyber threat. With the rapid move to remote working, the relative safe haven of the corporate network has mutated ...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
Next's CISO: Learn from attackers to boost cyber defences

Security

Collaboration, knowledge sharing, agility – there’s a lot that cyber criminals do right

clock 02 May 2024 • 4 min read
All change? The CIO challenge in the next five years

Strategy

The new CIO is one who shapes strategy, rather than having it forced upon them

clock 30 April 2024 • 5 min read
'Few organisations realise cyber tools' potential' - Dan Burns, CISO at Next

Security

Keynote speaker at the Cybersecurity Festival 2024

clock 04 April 2024 • 2 min read

Sign up to our newsletter

The best news, stories, features and photos from the day in one perfectly formed email.

More on Threats and Risks

Russian network found using genAI to spread disinformation

Russian network found using genAI to spread disinformation

CopyCop aims to fuel discord and weaken support for Ukraine

clock 10 May 2024 • 2 min read
'TunnelVision' bug potentially allows snooping on all VPNs

'TunnelVision' bug potentially allows snooping on all VPNs

Operating system features can be manipulated to divert traffic away from encrypted VPN tunnel

clock 08 May 2024 • 3 min read
Bots now account for half of all web activity

Bots now account for half of all web activity

Nearly half of internet traffic is now automated, with malicious bots on the rise

clock 07 May 2024 • 3 min read