• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      event logo
      Deskflix Financial Services

      oin us for this episode of Deskflix to hear from industry experts and peers on their 2020 best practices, what they’ve learnt for 2021 and how they plan to overcome the next wave of disruption.

      • Date: 03 Mar 2021
      event logo
      Good listeners: Why conversational interfaces are now a must-have

      This webinar, featuring dedicated research, will explore how conversational interfaces can add value to your digital initiatives today. We discuss the benefits of putting the AI to work and the value of the conversational channel itself.

      • Date: 17 Mar 2021
      • Virtual Event,
      event logo
      Deskflix IT Leader's Summit

      Six months on from our inaugural IT Leaders’ Festival, Deskflix IT Leaders’ Summit is a chance to take stock and reflect on the first quarter of 2021. How did you overcome the obstacles of 2020? Was progression as expected? What were your biggest threats and biggest growth opportunities?

      • Date: 24 Mar 2021
      event logo
      Architect for the unknown: Is your database built for a crisis?

      This webinar, in which we’ll reveal Computing’s latest research in this area, reflects on how prepared our respondents’ data architecture was going into the pandemic and the role databases have to play in the ability to react and pivot in a crisis.

      • Date: 25 Mar 2021
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    • Spotlights

      Welcome to Computing's Spotlight section, where we focus in on particularly important themes and topics of enterprise IT.

      Intel logo

       

      Endpoint Management and Security Hub

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 

computer security

NASA memo warns staff personal data may have been stolen in a cyber attack
NASA memo warns staff personal data may have been stolen in a cyber attack

Hack has been under investigation since October, but staff only told now

  • Hacking
  • 20 December 2018
Do you know about the power of privileged access?
Do you know about the power of privileged access?

Attackers often target superuser accounts with access to data and systems - how do you protect them?

  • Threats and Risks
  • 07 December 2018
Sixty per cent of enterprise security lacks signatures for new threats
Sixty per cent of enterprise security lacks signatures for new threats

Research shows most organisations in the dark over emerging threats

  • Security
  • 04 December 2018
Marriott hack: 60 per cent of cyber attacks now involve multiple targets in one organisation warns Carbon Black
Marriott hack: 60 per cent of cyber attacks now involve multiple targets in one organisation warns Carbon Black

"Island hopping" attacks targeting suppliers and acquisitions also growing threat, say experts

  • Security
  • 30 November 2018
Fewer than one in five IBM mainframe customers are using multi-factor authentication
Fewer than one in five IBM mainframe customers are using multi-factor authentication

Mainframe users cited concerns about disruption and end-user resistance as reasons not to employ MFA

  • Threats and Risks
  • 26 November 2018
Linux servers running Hadoop targeted by variation of Mirai malware
Linux servers running Hadoop targeted by variation of Mirai malware

First sighting of Mirai malware targeting enterprise systems

  • Security
  • 23 November 2018
How clean is your software supply chain?
How clean is your software supply chain?

With malware now pervasive and high-profile organisations being breached every day, Computing invites IT leaders to a networking dinner for sharing best practise

  • Security
  • 21 November 2018
Researchers uncover side-channel attacks that target the GPU
Researchers uncover side-channel attacks that target the GPU

The attacks begin with a malicious app that spies on the infected system and steals passwords through GPU rendering

  • Threats and Risks
  • 08 November 2018
Troubled waters: cyber-attacks on San Diego and Barcelona's ports show risk of IT/OT convergence
Troubled waters: cyber-attacks on San Diego and Barcelona's ports show risk of IT/OT convergence

Operational technology has been kept separate from IT in the past - but as that changes, systems are being exposed to attacks

  • Threats and Risks
  • 12 October 2018
Half of data breaches are the fault of insiders, not hackers, research finds
Half of data breaches are the fault of insiders, not hackers, research finds

Panel urges companies to avoid euphemisms and acknowledge when they've been breached - or risk being fined

  • Threats and Risks
  • 01 October 2018
CIO Interview: Kevin Fielder, CISO, Just Eat
CIO Interview: Kevin Fielder, CISO, Just Eat

Fielder talks about cloud complexity, trust and fighting phishing

  • Security
  • 22 August 2018
IT leaders disagree on security change catalysts
IT leaders disagree on security change catalysts

What drives security changes: people or technology?

  • Security Technology
  • 03 July 2018
Driving pipeline and revenue at the Computing Marketing Team of the Year
Driving pipeline and revenue at the Computing Marketing Team of the Year

Incisive Works meets Catherine Howard, VP of Marketing at Atos.

  • Big Data and Analytics
  • 19 June 2018
Apple Mac users warned over 'code-signing' vulnerability
Apple Mac users warned over 'code-signing' vulnerability

Security flaw enables malware to be run that's been fraudulently signed by Apple

  • Security
  • 13 June 2018
Ninety per cent of UK websites affected by 'serious' security flaws
Ninety per cent of UK websites affected by 'serious' security flaws

Security firm CyberScanner claims that 117,638 of the top UK sites harbour security flaws

  • Security
  • 25 April 2018
New vulnerability in Intel CPUs uncovered by security researchers
New vulnerability in Intel CPUs uncovered by security researchers

New branch prediction processor attack found affecting computer CPUs

  • Security
  • 28 March 2018
Government unveils new measures to make IoT devices more secure
Government unveils new measures to make IoT devices more secure

Connected tech manufacturers told to implement security by design

  • Security
  • 07 March 2018
Four of Chrome's most popular extensions found to be malicious
Four of Chrome's most popular extensions found to be malicious

Google removes fraudulent extensions

  • Security
  • 17 January 2018
'Above all encrypt absolutely everything' - the industry's take on cyber security in 2018
'Above all encrypt absolutely everything' - the industry's take on cyber security in 2018

The IT industry looks at the ramifications of Computing's latest security research

  • Security
  • 05 January 2018
The most-used passwords of 2017 make for some very depressing reading
The most-used passwords of 2017 make for some very depressing reading

It turns out that 'qwerty' is quite easy to guess. And so is 'starwars'

  • Security
  • 22 December 2017
Top five takeaways from Computing's Enterprise Security & Risk Management Summit
Top five takeaways from Computing's Enterprise Security & Risk Management Summit

The year 2017 in cyber security

  • Security
  • 01 December 2017
To move forward with cybersecurity we must 'battle our own complexity' says Darktrace founder
To move forward with cybersecurity we must 'battle our own complexity' says Darktrace founder

'There's an awful lot of hype out there'

  • Threats and Risks
  • 23 November 2017
One third of UK organisations would pay up for ransomware, finds Computing report
One third of UK organisations would pay up for ransomware, finds Computing report

That's a six per cent rise since 2016

  • Threats and Risks
  • 23 November 2017
Malwarebytes wins US case over 'potentially unwanted program' classification of vendor's software
Malwarebytes wins US case over 'potentially unwanted program' classification of vendor's software

Enigma Software's case against Malwarebytes thrown out

  • Security Technology
  • 10 November 2017
12

Most read

'Silver Sparrow' malware infects about 30,000 Macs worldwide
'Silver Sparrow' malware infects about 30,000 Macs worldwide
NHS faces legal challenge over Palantir contract
NHS faces legal challenge over Palantir contract
Google fires AI ethics lead Margaret Mitchell
Google fires AI ethics lead Margaret Mitchell
UK tech jobs surpass pre-pandemic levels, despite rising unemployment
UK tech jobs surpass pre-pandemic levels, despite rising unemployment
Oxford University confirms breach of its Covid-19 lab
Oxford University confirms breach of its Covid-19 lab
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading