• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      event logo
      The Pesky Password Problem: What place do passwords have in the modern workplace?

      In this webinar you'll learn: Why passwords are so easy to hack, and how the bad guys do it. How to craft a secure, risk-focused password security policy. The truth about password managers and multi-factor authentication and how they impact our risk. How to empower your end users to become your best last line of defence

      • Date: 21 Jan 2021
      event logo
      Where the buck stops: Why a shared responsibility model will help you own your cloud security flaws

      This webinar, and accompanying dedicated research, will reveal to what extent organisations are practicing a shared responsibility model for cloud security today and the degree to which IT leaders are aware of what they should be doing to ensure the secure use of their multi- and hybrid-cloud environments.

      • Date: 27 Jan 2021
      event logo
      Leveraging the Cloud to Defeat Data Disasters

      Join us and learn how your IT team can realize many of the powerful advantages of the cloud and solve the operational complexity behind managing data across hybrid and multi-cloud IT environments with centralized management, automation, end-to-end security, and lower TCO.

      • Date: 28 Jan 2021
      event logo
      Deskflix Hybrid and Multi Cloud

      One of the most powerful tools for breaking down silos and integrating resources is cloud computing. But multi-tenancy cloud is not the ideal environment for every application or every class of data and some will need to remain on-prem for the foreseeable future; nor are all clouds equal. Tune in to Deskflix season 1 to hear industry experts speak on the questions you need answered on hybrid and multi cloud.

      • Date: 10 Feb 2021
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    • Spotlights

      Welcome to Computing's Spotlight section, where we focus in on particularly important themes and topics of enterprise IT.

      Intel logo

       

      Endpoint Management and Security Hub

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 

Mimecast

Risk mitigation for remote working: making Office 365 safer for business
Risk mitigation for remote working: making Office 365 safer for business

O365 provides a raft of effective communications and collaboration tools, but don't take security and compliance for granted

  • Security Technology
  • 24 June 2020
Questions on remote working tools and strategies? There's still time to login to Deskflix!
Questions on remote working tools and strategies? There's still time to login to Deskflix!

  • Strategy
  • 21 May 2020
Researchers discover vulnerability in the Microsoft Excel tool
Researchers discover vulnerability in the Microsoft Excel tool

Excel spreadsheet vulnerability enables cyber criminals to launch attacks on unwitting users

  • Security
  • 28 June 2019
Phishing emails have spiked this year, outgrowing malware
Phishing emails have spiked this year, outgrowing malware

Why try to trick a system when you can just fool the user?

  • Threats and Risks
  • 06 December 2017
Do you publicise your management team? You're helping hackers, says Mimecast
Do you publicise your management team? You're helping hackers, says Mimecast

Showing the world who your management team are, what they look like and what their contact details are helps hackers with social engineering attacks

  • Security
  • 23 November 2017
Firms must take ransomware threat seriously as crooks look for big paydays from unsuspecting victims
Firms must take ransomware threat seriously as crooks look for big paydays from unsuspecting victims

Crooks cashing in so firms must be ready to react, says Mimecast

  • Security
  • 24 November 2016
Experts analyse 'greedy' new Kanye West inspired phishing attack
Experts analyse 'greedy' new Kanye West inspired phishing attack

Mimecast uncovers the various methods used by new scam to steal your personal data and credit card information

  • Security
  • 23 November 2016
Office 365 experiencing 'connectivity issues' across western Europe
Office 365 experiencing 'connectivity issues' across western Europe

Down, down, down again?

  • Cloud and Infrastructure
  • 03 November 2016
Expert analysis reveals the secrets behind new phishing attack
Expert analysis reveals the secrets behind new phishing attack

An analysis by Mimecast reveals what's going on in a new phishing attack designed to steal credit card details

  • Hacking
  • 19 October 2016
Steve Jobs tried to make email 'a walled garden' in the 1980s, reveals inventor of email file attachment
Steve Jobs tried to make email 'a walled garden' in the 1980s, reveals inventor of email file attachment

"I realised that was not the way it should go" says open sourcer Nathaniel Borenstein

  • Open Source
  • 17 March 2016
LinkedIn being used as a 'front door' to phishing attacks
LinkedIn being used as a 'front door' to phishing attacks

Computing's research reveals phishing is the top threat to businesses, and is increasing in severity, while attacks use novel methods to make potential victims feel comfortable before sending their payloads

  • Hacking
  • 16 March 2016
'Go back to your training schedule' to educate users and cut down phishing attacks, says Mimecast
'Go back to your training schedule' to educate users and cut down phishing attacks, says Mimecast

Policy and governance tips to be revealed in next Wednesday's web seminar

  • Leadership
  • 11 March 2016
Enter the sandbox for email security
Enter the sandbox for email security

Orlando Scott-Cowley, cyber security strategist at Mimecast, exhorts IT professionals to examine the layers of protection they have in place against weaponised email attachments

  • Security
  • 21 January 2016
Mimecast talks social engineering, and how your organisation can be compromised in just 82 seconds
Mimecast talks social engineering, and how your organisation can be compromised in just 82 seconds

And email is still the path of least resistance

  • Business Software
  • 15 December 2015
How can IT leaders prevent data breaches?
How can IT leaders prevent data breaches?

Mimecast's Orlando Scott-Cowley discusses the ways that CIOs can raise cyber security awareness by using new, unexpected methods to catch employees' attention

  • Security
  • 09 December 2015
Further Office 365 and Azure outages 'could have a detrimental impact on the running of the country' warns Mimecast
Further Office 365 and Azure outages 'could have a detrimental impact on the running of the country' warns Mimecast

Customers should avoid putting all eggs in one basket, says Exchange partner

  • Applications
  • 03 December 2015
CIOs predict rise of just two per cent in IT budgets for 2016
CIOs predict rise of just two per cent in IT budgets for 2016

Budget for security, big data and cloud on the up - and data scientists

  • Budgets and Investment
  • 03 December 2015
Raise cyber security awareness by eschewing routine training and doing the unexpected - Mimecast
Raise cyber security awareness by eschewing routine training and doing the unexpected - Mimecast

Use employees' social media profiles to show them how easy it is to obtain their data, says Orlando Scott-Cowley

  • Security
  • 30 November 2015
How can you predict the impact of the inevitable data breach on your organisation?
How can you predict the impact of the inevitable data breach on your organisation?

It's arguably a case of not if, but when your organisation will be targeted by hackers. How can you prepare for the damage an attack might do?

  • Security
  • 30 November 2015
Mimecast CEO insists IPO is 'about the journey' as share offering raises $77.5m
Mimecast CEO insists IPO is 'about the journey' as share offering raises $77.5m

'The time was right,' Mimecast CEO Bauer tells Computing

  • Applications
  • 20 November 2015
Cyber espionage by Google Glass is the next major threat to enterprise security
Cyber espionage by Google Glass is the next major threat to enterprise security

Some organisations are already jumping onto the wearable technology bandwagon, but are they opening up a new way in for cyber criminals? Danny Palmer investigates.

  • Threats and Risks
  • 23 July 2014
Data now safer in the cloud than in-house, says Mazars chief
Data now safer in the cloud than in-house, says Mazars chief

Google and Microsoft solutions particularly desirable, says infrastructure manager Jayson Dudley

  • Compliance
  • 13 February 2013

Most read

Parler data breach: Hackers claim they downloaded everything from Parler before it was taken offline
Parler data breach: Hackers claim they downloaded everything from Parler before it was taken offline
Microsoft fixes Windows 10 bug forcing restarts
Microsoft fixes Windows 10 bug forcing restarts
Software errors wipes 'thousands' of arrest records from police databases
Software errors wipes 'thousands' of arrest records from police databases
Twitter's Trump ban raises social media regulation questions, says Hancock
Twitter's Trump ban raises social media regulation questions, says Hancock
Delta: Microsoft's identity management lead is under threat
Delta: Microsoft's identity management lead is under threat
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading