• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      event logo
      The Pesky Password Problem: What place do passwords have in the modern workplace?

      In this webinar you'll learn: Why passwords are so easy to hack, and how the bad guys do it. How to craft a secure, risk-focused password security policy. The truth about password managers and multi-factor authentication and how they impact our risk. How to empower your end users to become your best last line of defence

      • Date: 21 Jan 2021
      event logo
      Where the buck stops: Why a shared responsibility model will help you own your cloud security flaws

      This webinar, and accompanying dedicated research, will reveal to what extent organisations are practicing a shared responsibility model for cloud security today and the degree to which IT leaders are aware of what they should be doing to ensure the secure use of their multi- and hybrid-cloud environments.

      • Date: 27 Jan 2021
      event logo
      Leveraging the Cloud to Defeat Data Disasters

      Join us and learn how your IT team can realize many of the powerful advantages of the cloud and solve the operational complexity behind managing data across hybrid and multi-cloud IT environments with centralized management, automation, end-to-end security, and lower TCO.

      • Date: 28 Jan 2021
      event logo
      Deskflix Hybrid and Multi Cloud

      One of the most powerful tools for breaking down silos and integrating resources is cloud computing. But multi-tenancy cloud is not the ideal environment for every application or every class of data and some will need to remain on-prem for the foreseeable future; nor are all clouds equal. Tune in to Deskflix season 1 to hear industry experts speak on the questions you need answered on hybrid and multi cloud.

      • Date: 10 Feb 2021
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    • Spotlights

      Welcome to Computing's Spotlight section, where we focus in on particularly important themes and topics of enterprise IT.

      Intel logo

       

      Endpoint Management and Security Hub

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 

espionage

New laws proposed in the US to protect technology supply chains from espionage
New laws proposed in the US to protect technology supply chains from espionage

New law is intended to crack down on alleged espionage by China against US infrastructure and intellectual property

  • Government
  • 01 August 2019
Airbus warning over security breach
Airbus warning over security breach

Plane maker admits breach of personal data, but claims that production has been unaffected

  • Security
  • 31 January 2019
US government considering building its own 5G network to counter Chinese security threats
US government considering building its own 5G network to counter Chinese security threats

Trump administration officials looking to build national 5G network in order to cut distrusted manufacturers out

  • Security
  • 29 January 2018
Uber fires ex-Googler Anthony Levandowski
Uber fires ex-Googler Anthony Levandowski

Google claims that Levandowski took as many as 14,000 documents when he left the company

  • Security
  • 31 May 2017
How code from 20-year-old 'Moonlight Maze' cyber attacks was linked with Turla malware
How code from 20-year-old 'Moonlight Maze' cyber attacks was linked with Turla malware

Code analysis identifies 20-year history of malware linked to Russian government

  • Security
  • 04 April 2017
Wikileaks attaches strings to promise to disclose security flaws to Apple, Google and Microsoft before publishing new documents
Wikileaks attaches strings to promise to disclose security flaws to Apple, Google and Microsoft before publishing new documents

Wikileaks demands that companies promise to fix flaws abused by the CIA within 90-days of disclosure

  • Security
  • 20 March 2017
Russian government behind seven-year cyber-espionage campaign by 'Dukes' hacking group, claims F-Secure
Russian government behind seven-year cyber-espionage campaign by 'Dukes' hacking group, claims F-Secure

F-Secure accuses the Kremlin of being behind well-resourced group that targeted governments worldwide

  • Security
  • 17 September 2015
United Nations demands states respect its privacy after AT&T NSA spying revealed
United Nations demands states respect its privacy after AT&T NSA spying revealed

Newly released Snowden docs reveal how "highly collaborative" AT&T helped US spy on UN for 10 years

  • Privacy
  • 18 August 2015
Government urged to respond to claims that Snowden files have been accessed by Russia and China
Government urged to respond to claims that Snowden files have been accessed by Russia and China

More questions than answers from The Sunday Times report, which suggests that MI6 agents had to be withdrawn from 'hostile countries'

  • Government
  • 15 June 2015
Forbes 'watering hole' attack the work of Chinese state cyber espionage, claim researchers
Forbes 'watering hole' attack the work of Chinese state cyber espionage, claim researchers

US defence contractors and banks targeted following Forbes attack

  • Security
  • 12 February 2015
GCHQ to feed cyber-intelligence to UK's biggest companies
GCHQ to feed cyber-intelligence to UK's biggest companies

Intelligence feed part of push to improve defences against industrial espionage

  • Security
  • 17 June 2014

Most read

Software errors wipes 'thousands' of arrest records from police databases
Software errors wipes 'thousands' of arrest records from police databases
New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach
New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach
Women in IT: don't get stuck in 'glue work' if you want to get on
Women in IT: don't get stuck in 'glue work' if you want to get on
BT faces possible £500m claim for overcharging landline-only customers
BT faces possible £500m claim for overcharging landline-only customers
Hackers 'manipulated' stolen documents to undermine trust in coronavirus vaccines
Hackers 'manipulated' stolen documents to undermine trust in coronavirus vaccines
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading