computing_logo
Sign in Join
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
logo
  • logo

    Search Computing

     

     

  • Latest
  • Topics

    Choose a topic from the list below

    • Diversity in Tech
    • Big Data & Analytics
    • DevOps
    • Security
    • GDPR
    • AI & ML
    • Cloud & Infrastructure
    • CIO
    • Deskflix
  • Tech Impact
  • Delta
  • Deskflix
  • Events
  • Whitepapers
  • More

    Most Popular content

    • Delta
    • Big Data & Analytics
    • Cloud
    • Leadership & Strategy
    • Open Source
    • Storage
    • Telecoms
    • Top 100 IT Leaders

    Featured content

    • On-demand webinars
    • Identity Access Management Hub
    • IT leaders 250
    • Research
    • Delta
    • Tech Marketing Hub

    Authors

    • Stuart Sumner
    • John Leonard
    • Tom Allen
    • Computing Contributors

    Computing Resources

    • English
    • Français
    • Deutsch
    • Espagnol
    • Italien
  • Searchlogo

    Search Computing

    x
Join Sign in
 
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
    • Sign in

computer security

CIO Interview: Kevin Fielder, CISO, Just Eat

Security

CIO Interview: Kevin Fielder, CISO, Just Eat

Fielder talks about cloud complexity, trust and fighting phishing

clock 22 August 2018 •
IT leaders disagree on security change catalysts

Security Technology

IT leaders disagree on security change catalysts

What drives security changes: people or technology?

clock 03 July 2018 •
Driving pipeline and revenue at the Computing Marketing Team of the Year

Big Data and Analytics

Driving pipeline and revenue at the Computing Marketing Team of the Year

Incisive Works meets Catherine Howard, VP of Marketing at Atos.

clock 19 June 2018 •
Apple Mac users warned over 'code-signing' vulnerability

Security

Apple Mac users warned over 'code-signing' vulnerability

Security flaw enables malware to be run that's been fraudulently signed by Apple

clock 13 June 2018 •
Ninety per cent of UK websites affected by 'serious' security flaws

Security

Ninety per cent of UK websites affected by 'serious' security flaws

Security firm CyberScanner claims that 117,638 of the top UK sites harbour security flaws

clock 25 April 2018 •
New vulnerability in Intel CPUs uncovered by security researchers

Security

New vulnerability in Intel CPUs uncovered by security researchers

New branch prediction processor attack found affecting computer CPUs

clock 28 March 2018 •
Government unveils new measures to make IoT devices more secure

Security

Government unveils new measures to make IoT devices more secure

Connected tech manufacturers told to implement security by design

clock 07 March 2018 •
Four of Chrome's most popular extensions found to be malicious

Security

Four of Chrome's most popular extensions found to be malicious

Google removes fraudulent extensions

clock 17 January 2018 •
'Above all encrypt absolutely everything' - the industry's take on cyber security in 2018

Security

'Above all encrypt absolutely everything' - the industry's take on cyber security in 2018

The IT industry looks at the ramifications of Computing's latest security research

clock 05 January 2018 •
The most-used passwords of 2017 make for some very depressing reading

Security

The most-used passwords of 2017 make for some very depressing reading

It turns out that 'qwerty' is quite easy to guess. And so is 'starwars'

clock 22 December 2017 •
123
Most read
01

Hackers can exploit iPhones' low-power mode to run malware even when device is off, researchers warn

17 May 2022 • 3 min read
02

Head of government GPDPR review opted out of scheme

16 May 2022 • 3 min read
03

Google Russia to file for bankruptcy after accounts seized

20 May 2022 • 2 min read
04

Italian police block pro-Russia attacks during Eurovision

16 May 2022 • 3 min read
05

Microsoft to increase salaries, stock compensation to retain employees

17 May 2022 • 2 min read
  • Contact Us
  • Marketing Solutions
  • About Incisive Media
  • Privacy Settings
  • Terms & Conditions
  • Policies
  • Careers
FOLLOW US
right wallpaper ad

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited,New London House, 172 Drury Lane, London WC2B 5QR.Registered in England and Wales with company registration numbers 09177174 & 09178013

DIGITAL PUBLISHER OF THE YEAR
right wallpaper ad
Loading