• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      event logo
      Where the buck stops: Why a shared responsibility model will help you own your cloud security flaws

      This webinar, and accompanying dedicated research, will reveal to what extent organisations are practicing a shared responsibility model for cloud security today and the degree to which IT leaders are aware of what they should be doing to ensure the secure use of their multi- and hybrid-cloud environments.

      • Date: 27 Jan 2021
      event logo
      Leveraging the Cloud to Defeat Data Disasters

      Join us and learn how your IT team can realize many of the powerful advantages of the cloud and solve the operational complexity behind managing data across hybrid and multi-cloud IT environments with centralized management, automation, end-to-end security, and lower TCO.

      • Date: 28 Jan 2021
      event logo
      Deskflix Hybrid and Multi Cloud

      One of the most powerful tools for breaking down silos and integrating resources is cloud computing. But multi-tenancy cloud is not the ideal environment for every application or every class of data and some will need to remain on-prem for the foreseeable future; nor are all clouds equal. Tune in to Deskflix season 1 to hear industry experts speak on the questions you need answered on hybrid and multi cloud.

      • Date: 10 Feb 2021
      event logo
      Deskflix Financial Services

      oin us for this episode of Deskflix to hear from industry experts and peers on their 2020 best practices, what they’ve learnt for 2021 and how they plan to overcome the next wave of disruption.

      • Date: 03 Mar 2021
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    • Spotlights

      Welcome to Computing's Spotlight section, where we focus in on particularly important themes and topics of enterprise IT.

      Intel logo

       

      Endpoint Management and Security Hub

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 

cyber-security

Computing launches Cyber Security Festival
Computing launches Cyber Security Festival

Computing is proud to present the first Cyber Security Festival, taking place this summer over three days: Wednesday 16th, 23rd, and 30th of June

  • Leadership
  • 27 January 2021
Cybersecurity in 2021: Looking ahead to another unpredictable year
Cybersecurity in 2021: Looking ahead to another unpredictable year

The big topics will be the cloud, social engineering, automation and security budgets, as firms work to address corners cut in the pandemic

  • Security
  • 19 January 2021
NCSC launches CyberFirst Girls Competition - aims to boost female representation in cyber security
NCSC launches CyberFirst Girls Competition - aims to boost female representation in cyber security

Women make up just eight per cent of the cyber workforce in the UK

  • Security
  • 18 January 2021
Understanding the shared responsibility model for security in the hybrid cloud
Understanding the shared responsibility model for security in the hybrid cloud

If the responsibilities of CSP and customers are not well understood, the risks to security are obvious

  • Cloud and Infrastructure
  • 14 January 2021
Boosting cyber resilience when the odds are stacked against you
Boosting cyber resilience when the odds are stacked against you

2020 exposed gaps in our ability to trust information, ignited cloud migrations, and put overburdened security teams under more strain. In 2021 we must focus on the danger areas

  • Security
  • 13 January 2021
Ensono: Users expect high speed and availability, and outages can severely impact brand reputation
Ensono: Users expect high speed and availability, and outages can severely impact brand reputation

Oliver Presland, VP, Consulting Services Portfolio Ensono discusses the impact of the pandemic on user expectations and the security landscape

  • Security
  • 11 January 2021
Can regulation solve businesses' IoT security woes?
Can regulation solve businesses' IoT security woes?

IoT manufacturers are waking up to the fact that they have responsibilities - even if it hurts their bottom line

  • Internet of Things
  • 04 January 2021
Awards winner The Keyholding Company blends physical and cyber security
Awards winner The Keyholding Company blends physical and cyber security

The Keyholding Company built a totally custom service delivery platform with partner Haulmont – and the benefits have been clear

  • Security
  • 04 January 2021
Announcing the winners of the 2020 Security Excellence Awards
Announcing the winners of the 2020 Security Excellence Awards

Entries had to demonstrate high levels of innovation, relevance and adoption just to make the shortlist

  • Security
  • 11 December 2020
Don't forget the people in the rush for protection
Don't forget the people in the rush for protection

It’s not just good security practice – focusing on people can help secure a seat for IT at the top table

  • Security
  • 10 December 2020
Outbound email data breaches happen every 12 working hours - isn't it time we stopped that?
Outbound email data breaches happen every 12 working hours - isn't it time we stopped that?

Advances in machine learning have changed email security - which is more important than ever this year

  • Security
  • 11 November 2020
How iboss' containers are revolutionising security
How iboss' containers are revolutionising security

Security firm iboss is disrupting the traditional VPN approach and enabling customers to access applications directly

  • Security Technology
  • 11 November 2020
Organisations have accrued technical debt in the shift to remote work, and now they have to face the fallout
Organisations have accrued technical debt in the shift to remote work, and now they have to face the fallout

In a Computing websem, Javvad Malik of KnowBe4 said that companies that lowered security to continue operating in the pandemic must deal with the consequencies - sooner, rather than later

  • Security
  • 12 October 2020
Shortlist announced for Security Excellence Awards 2020
Shortlist announced for Security Excellence Awards 2020

2020 has changed the security landscape for good; making the shortlist this year is a true sign of accomplishment

  • Leadership
  • 05 October 2020
In an age of change, Neustar has focused on protection
In an age of change, Neustar has focused on protection

Neustar SVP Rodney Joffe is shortlisted for Security Specialist of the Year in the Digital Technology Leaders Awards

  • Security
  • 08 September 2020
Insecure satellite-based internet poses threat to transport safety
Insecure satellite-based internet poses threat to transport safety

Satellite internet service providers are still vulnerable to attack methods discovered nearly 15 years ago

  • Threats and Risks
  • 06 August 2020
Researchers identify vulnerabilities in critical industrial equipment
Researchers identify vulnerabilities in critical industrial equipment

Protocol gateways are critical to enabling Industry 4.0, and Trend Micro has found critical weaknesses in how they operate

  • Threats and Risks
  • 06 August 2020
Partner Insight: Why security is a human problem first
Partner Insight: Why security is a human problem first

How do you address IT leaders' dual concerns around remote working and cyber security?

  • Security
  • 04 August 2020
British firms paid more than £200m in ransoms last year
British firms paid more than £200m in ransoms last year

British firms paid the sixth-highest total ransom amount to attackers last year, after the USA, Italy, Germany, Spain and France

  • Security
  • 04 August 2020
Mirai botnet is targeting RCE vulnerability in F5 BIG-IP software
Mirai botnet is targeting RCE vulnerability in F5 BIG-IP software

The bug could enable an attacker to create or delete files, intercept information and otherwise compromise the system

  • Threats and Risks
  • 04 August 2020
Florida minor charged for role in Twitter hack
Florida minor charged for role in Twitter hack

The Florida State Attorney's office is handling the prosecution of a 17-year old boy for his role in the Twitter hack that affected accounts including those belonging to Bill Gates and Elon Musk

  • Hacking
  • 03 August 2020
Microsoft in talks to acquire TikTok, despite Presidential warnings - updated
Microsoft in talks to acquire TikTok, despite Presidential warnings - updated

Microsoft is considering acquiring popular app TikTok's US operations, despite security concerns and the possibility of a ban in the near future

  • Security
  • 03 August 2020
Exposed MongoDB database draws attacks within hours
Exposed MongoDB database draws attacks within hours

Experimental honeypot set up by researchers reveals locations where most of the attacks come from

  • Threats and Risks
  • 23 July 2020
Five technology design principles to combat domestic abuse
Five technology design principles to combat domestic abuse

Measures technologists can take to ensure the products they create are resistant to coercive control

  • Developer
  • 29 June 2020
123

Most read

Russian malware found on government-issued laptops for home schooling
Russian malware found on government-issued laptops for home schooling
Hackers publish data stolen from SEPA as the agency refuses to pay ransom
Hackers publish data stolen from SEPA as the agency refuses to pay ransom
Google locks out another top AI ethicist
Google locks out another top AI ethicist
How I almost fell for a COVID vaccine scam
How I almost fell for a COVID vaccine scam
Hacker leaks data of more than 2 million dating site users
Hacker leaks data of more than 2 million dating site users
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading