computing_logo
Sign in Join
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
logo
  • logo

    Search Computing

     

     

  • Latest
  • Topics

    Choose a topic from the list below

    • Diversity in Tech
    • Big Data & Analytics
    • DevOps
    • Security
    • GDPR
    • AI & ML
    • Cloud & Infrastructure
    • CIO
    • Deskflix
  • Tech Impact
  • Diversity in Tech
  • Deskflix
  • Events
  • Whitepapers
  • More

    Most Popular content

    • Delta
    • Big Data & Analytics
    • Cloud
    • Leadership & Strategy
    • Open Source
    • Storage
    • Telecoms
    • Top 100 IT Leaders

    Featured content

    • On-demand webinars
    • Identity Access Management Hub
    • IT leaders 250
    • Research
    • Delta
    • Tech Marketing Hub

    Authors

    • Stuart Sumner
    • John Leonard
    • Tom Allen
    • Computing Contributors

    Computing Resources

    • English
    • Français
    • Deutsch
    • Espagnol
    • Italien
  • Searchlogo

    Search Computing

    x
Join Sign in
 
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
    • Sign in

Cyber Security Festival

Identify your "vital ground" or your cyber effort is wasted

Security

Identify your "vital ground" or your cyber effort is wasted

And the road to recovery is to plan, plan and plan again

clock 16 June 2022 • 3 min read
In modern war, we have as much to fear from cyber weapons as kinetics

Security

In modern war, we have as much to fear from cyber weapons as kinetics

The physical world is past the point of no return when it comes to dependence on technology, says Ian Hill

clock 16 June 2022 • 3 min read
Use AI as the missing piece of defence in depth

Security Technology

Use AI as the missing piece of defence in depth

There is no silver bullet for cybersecurity.

clock 09 June 2022 • 3 min read
It's almost time! Join us for CyberSecurity Festival 2022

Security

It's almost time! Join us for CyberSecurity Festival 2022

Beginning with our first in-person conference in three years, the Cybersecurity Festival 2022 is not to be missed.

clock 01 June 2022 • 1 min read
This year's hybrid CyberSecurity Festival kicks off in four weeks

Security

This year's hybrid CyberSecurity Festival kicks off in four weeks

The three-day event will give you the choice in how to attend

clock 10 May 2022 • 2 min read
Ciaran Martin, first CEO of National Cyber Security Centre, joins the Cyber Security Festival

Security

Ciaran Martin, first CEO of National Cyber Security Centre, joins the Cyber Security Festival

This year’s Cyber Security Festival takes place this summer, with the first day taking place live in London on Thursday 9th June. Delegates will have the chance to meet and hear from keynote speaker Ciaran Martin, first CEO of the National Cyber Security...

clock 06 April 2022 • 1 min read
The future of work has changed forever - how should security leaders handle it?

Security

The future of work has changed forever - how should security leaders handle it?

Okta's Craig Hinchliffe looks at the challenges and opportunities facing security teams when it comes to protecting today's dynamic workforce

clock 18 November 2021 • 1 min read
What can humans do in the age of machine-versus-machine security?

Security

What can humans do in the age of machine-versus-machine security?

AI-driven attacks are fast, difficult to spot and launched at scale. Toby Lewis of Darktrace argues that a defensive AI is the best and only possible response

clock 17 November 2021 • 1 min read
More technology is not always the answer to cybersecurity headaches

Security

More technology is not always the answer to cybersecurity headaches

You can combat security infrastructure sprawl without blowing your budget, says Rob Brewer of Field Effect Software

clock 16 November 2021 • 1 min read
What does your organisation look like through an attacker's eyes?

Security

What does your organisation look like through an attacker's eyes?

Javvad Malik of KnowBe4 talks about how to cultivate a little-used skill when it comes to cybersecurity: empathy with the attackers

clock 15 November 2021 • 1 min read
12
Most read
01

Dark data: "The dirty secret of the ICT sector"

27 June 2022 • 8 min read
02

Cyberattack stops all deliveries at Wiltshire Farm Foods

29 June 2022 • 2 min read
03

Apple accused of harming browser engine diversity

28 June 2022 • 3 min read
04

Eco-warriors: Microsoft Azure vs Amazon AWS on sustainability

29 June 2022 • 12 min read
05

Italian data protection authority warns against the use of Google Analytics

24 June 2022 • 3 min read
  • Contact us
  • Marketing Solutions
  • About Incisive Media
  • Privacy Settings
  • Terms & Conditions
  • Policies
  • Careers
FOLLOW US
right wallpaper ad

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited,New London House, 172 Drury Lane, London WC2B 5QR.Registered in England and Wales with company registration numbers 09177174 & 09178013

DIGITAL PUBLISHER OF THE YEAR
right wallpaper ad
Loading