computing_logo
Sign in Join
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: [email protected]

    • Sign in
logo
  • logo

    Search Computing

     

     

  • Latest
  • Topics

    Choose a topic from the list below

    • Diversity in Tech
    • Big Data & Analytics
    • DevOps
    • Security
    • GDPR
    • AI & ML
    • Cloud & Infrastructure
    • CIO
    • Deskflix
  • Sustainability in Tech
  • Diversity in Tech
  • Deskflix
  • Events
  • Whitepapers
  • More

    Most Popular content

    • Big Data & Analytics
    • Cloud
    • Leadership & Strategy
    • Open Source
    • Storage
    • Telecoms
    • Top 100 IT Leaders
    • Rising Stars 30

    Featured content

    • On-demand webinars
    • Identity Access Management Hub
    • Research
    • Tech Marketing Hub
    • Entry-level tech roles
    • Cloud Sustainability

    Authors

    • Stuart Sumner
    • John Leonard
    • Tom Allen
    • Penny Horwood
    • Computing Contributors

    Computing Resources

    • English
    • Français
    • Deutsch
    • Espagnol
    • Italien

    About

    • About us
    • Code of Ethics
  • Searchlogo

    Search Computing

    x
Join Sign in
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: [email protected]

    • Sign in
    • Sign in

IBMLITS

Security

What exactly did security software companies know of Regin, the latest malware disclosed by Symantec this weekend?

H4cked off: Security software companies have some questions to answer about Regin, the latest state-sponsored malware that has been observed in the wild for at least six years

clock 25 November 2014 • 5 min read

Security

In computer security, it's almost impossible to tell the 'good guys' from the 'bad guys'

Even the most sophisticated of cyber attacks invariably start with a banal email and a simple attachment or URL. But how should organisations start to protect themselves against such attacks?

clock 25 November 2014 • 4 min read

Security

Threat intelligence - the best form of defence?

Major organisations are subject to millions of 'security events' every week, but which ones should be ignored and which investigated? IBM argues that threat intelligence can help

clock 17 November 2014 • 3 min read
Most read
01

If ChatGPT is an 'iPhone moment' how should IT leaders respond?

08 December 2023 • 4 min read
02

Governments forcing Apple and Google to share notification data

07 December 2023 • 2 min read
03

Life after Oracle: Redefining Java in the enterprise in 2024

08 December 2023 • 5 min read
04

Bank of England proposes new rules to curb reliance on big tech

08 December 2023 • 1 min read
05

UK accuses Russia of cyber interference targeting elections and democracy

08 December 2023 • 3 min read
  • Contact us
  • Marketing Solutions
  • About The Channel Company
  • Privacy Settings
  • Terms & Conditions
  • Policies
  • Careers
FOLLOW US
The Channel Company

© The Channel Company EMEA
180 Borough High Street, London SE1 1LB. Registered in England and Wales with company registration number 14078896

Loading.gif?page type=listing page&tag=ibmlits