• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      event logo
      The Pesky Password Problem: What place do passwords have in the modern workplace?

      In this webinar you'll learn: Why passwords are so easy to hack, and how the bad guys do it. How to craft a secure, risk-focused password security policy. The truth about password managers and multi-factor authentication and how they impact our risk. How to empower your end users to become your best last line of defence

      • Date: 21 Jan 2021
      event logo
      Where the buck stops: Why a shared responsibility model will help you own your cloud security flaws

      This webinar, and accompanying dedicated research, will reveal to what extent organisations are practicing a shared responsibility model for cloud security today and the degree to which IT leaders are aware of what they should be doing to ensure the secure use of their multi- and hybrid-cloud environments.

      • Date: 27 Jan 2021
      event logo
      Leveraging the Cloud to Defeat Data Disasters

      Join us and learn how your IT team can realize many of the powerful advantages of the cloud and solve the operational complexity behind managing data across hybrid and multi-cloud IT environments with centralized management, automation, end-to-end security, and lower TCO.

      • Date: 28 Jan 2021
      event logo
      Deskflix Hybrid and Multi Cloud

      One of the most powerful tools for breaking down silos and integrating resources is cloud computing. But multi-tenancy cloud is not the ideal environment for every application or every class of data and some will need to remain on-prem for the foreseeable future; nor are all clouds equal. Tune in to Deskflix season 1 to hear industry experts speak on the questions you need answered on hybrid and multi cloud.

      • Date: 10 Feb 2021
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    • Spotlights

      Welcome to Computing's Spotlight section, where we focus in on particularly important themes and topics of enterprise IT.

      Intel logo

       

      Endpoint Management and Security Hub

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 

Firewall

Arm will use 'firewalls' to prevent Nvidia from accessing customer data
Arm will use 'firewalls' to prevent Nvidia from accessing customer data

Arm says it will work to minimise data-sharing with its new American owner

  • Mergers and Acquisitions
  • 08 October 2020
Wind and solar energy provider hit by denial-of-service attack earlier this year
Wind and solar energy provider hit by denial-of-service attack earlier this year

The attack caused a disconnection between the power provider's main command centre and power generation installations

  • Hacking
  • 01 November 2019
How to move on from perimeter firewalls to suit the cloud
How to move on from perimeter firewalls to suit the cloud

Would you settle for door locks or invest in a burglar alarm too?

  • Security
  • 28 August 2018
China to target VPNs in crackdown on people evading government internet controls
China to target VPNs in crackdown on people evading government internet controls

Web restrictions tightened up in China ahead of Communist Party Congress

  • Security
  • 23 January 2017
Computing Security Excellence Awards 2016: and the winners are...
Computing Security Excellence Awards 2016: and the winners are...

All the gongs, all the highly commendeds listed in full

  • Security
  • 25 November 2016
Juniper silent on claims that China was the source of compromise in ScreenOS
Juniper silent on claims that China was the source of compromise in ScreenOS

"Unauthorised code" in firewall operating system maintained in China

  • Security
  • 21 December 2015
One sixth of cyber security professionals are paid at least £100,000 a year
One sixth of cyber security professionals are paid at least £100,000 a year

And cyber security roles make up 14 per cent of all new UK-based IT roles, according to Procorre

  • Security
  • 14 September 2015
VPN services are undermined by security failings, so what can you do about it? Um, not a lot, actually
VPN services are undermined by security failings, so what can you do about it? Um, not a lot, actually

The majority of VPN services suffer from IPv6 traffic leakage - and there ain't much you can do about it

  • Security
  • 01 July 2015
University of London Computer Centre hit by cyber attack
University of London Computer Centre hit by cyber attack

Webroot's George Anderson says four hour shutdown is 'not an acceptable time period'

  • Security
  • 22 May 2015
What really happened to Juniper's CEO, who stepped down after 'conduct in connection with… a particular customer'?
What really happened to Juniper's CEO, who stepped down after 'conduct in connection with… a particular customer'?

Replacement already named as Rami Rahim - but what went down?

  • Budgets and Investment
  • 12 November 2014
China's 'great firewall' being used to mount attacks on Apple's iCloud
China's 'great firewall' being used to mount attacks on Apple's iCloud

Chinese government using 'great firewall' to mount man-in-the-middle attacks on Apple's infrastructure

  • Security
  • 21 October 2014
Advanced Persistent Threats 'absolutely exist' says Palo Alto Networks
Advanced Persistent Threats 'absolutely exist' says Palo Alto Networks

'This kind of thing is happening all the time now' says systems engineering manager Sherlow

  • Hacking
  • 01 July 2014
US Department of Defense to 'eliminate all firewalls'
US Department of Defense to 'eliminate all firewalls'

Pentagon proposes architecture to protect data rather than networks

  • Security Technology
  • 28 June 2013
Splunk reduces firewall management from minutes to 20 seconds, says WorldPay
Splunk reduces firewall management from minutes to 20 seconds, says WorldPay

Online payment service provider saves time managing a diverse firewall estate

  • Applications
  • 18 April 2013
Cloud Chains - Integrating beyond boundaries

  • Operating Systems
  • 13 September 2012
AlienVault launches open threat data exchange to combat cybercrime
AlienVault launches open threat data exchange to combat cybercrime

Free service allows 18,000 users to share attack information from their networks

  • Threats and Risks
  • 22 February 2012
Companies are struggling to keep up with security management
Companies are struggling to keep up with security management

Updating security systems manually can increase corporate risk

  • Security Technology
  • 17 November 2011
End-point security - the right protection in the right place

  • Security Technology
  • 18 January 2011
Cyber criminals hiding sensitive data under owners' noses
Cyber criminals hiding sensitive data under owners' noses

Research uncovers 'drop-zones' that crooks use before they export data beyond the firewall

  • Privacy
  • 12 January 2011
AVG Internet Security Business Edition 2011
AVG Internet Security Business Edition 2011

Security software that doesn't slow down users

  • Business Software
  • 14 December 2010

Most read

Parler data breach: Hackers claim they downloaded everything from Parler before it was taken offline
Parler data breach: Hackers claim they downloaded everything from Parler before it was taken offline
Microsoft fixes Windows 10 bug forcing restarts
Microsoft fixes Windows 10 bug forcing restarts
Software errors wipes 'thousands' of arrest records from police databases
Software errors wipes 'thousands' of arrest records from police databases
Twitter's Trump ban raises social media regulation questions, says Hancock
Twitter's Trump ban raises social media regulation questions, says Hancock
Delta: Microsoft's identity management lead is under threat
Delta: Microsoft's identity management lead is under threat
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading