Getting a central view of everything you have, even when it is distributed, will help navigate threats and risks
'Secure inbound email' advise the experts. Computing speaks to luminaries from end user and vendor organisations, and learns that it's not about 'patch management'
The psychologist and IT expert insists that employees are not the weak link in security that everyone assumes them to be
Ethical hacker Holly Grace Williams on the blind spots that lead to companies being compromised
Third-party risk requires constant monitoring, but too many businesses are stuck using manual approaches
Speaking at Computing's Cyber Security Live conference, Mike Spradbery, senior technical leader, IBM Security UK & Ireland, explains what organisations need to think of when building their incident response plans.
NCSC head Ciaran Martin points the finger of blame for the wave of cyber attacks targeting the UK at Russia, China, North Korea and Iran
Bloomberg has been widely derided for its Supermicro spy-chip story, but Elkins claims it's feasible and low cost
Strategy and tactics to fend off evolving threats
We tried downloading the keyserver-crashing 0x4E2C6E8793298290 but it's still 'too large' to import
Researchers believe the malware was created by STC, a Russian company accused of interfering in the 2016 US presidential election
Researchers were able to trick a popular AI system into thinking ten of the most dangerous forms of malware were good.
Cyber-security professionals need to get more cybercrime savvy about crypto-ransomware
ICS flaws highlighted by Tenable come a decade after the Stuxnet worm targeted an Iranian uranium enrichment plant
Securing Energy Infrastructure Act plan will use low-tech used to improve the US power grid's cyber defences
Sat Nav spoofing is a growing threat to in-car driver assistance systems and autonomous vehicles, warns Regulus
A recent audit has unveiled a series of security errors at NASA
Journalists have been told to protect themselves.
The vulnerabilities relate to the MSS and TCP SACK capabilities
HackerOne research reveals the biggest winners from more than 120,000 security vulnerabilities reported by hackers on 1,400 programmes
Corporate and consumer Huawei 5G security risks have been misunderstood, warns Recorded Future
The government needs to take a long-term approach to protecting against the risk of cyber-attacks, says Public Accounts Committee chair.
Employees claim that the tools give "the keys to the kingdom"
Researchers called the trend a "troubling sign"