computing_logo
Sign in Join
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
logo
  • logo

    Search Computing

     

     

  • Latest
  • Topics

    Choose a topic from the list below

    • Diversity in Tech
    • Big Data & Analytics
    • DevOps
    • Security
    • GDPR
    • AI & ML
    • Cloud & Infrastructure
    • CIO
    • Deskflix
  • Tech Impact
  • Diversity in Tech
  • Deskflix
  • Events
  • Whitepapers
  • More

    Most Popular content

    • Delta
    • Big Data & Analytics
    • Cloud
    • Leadership & Strategy
    • Open Source
    • Storage
    • Telecoms
    • Top 100 IT Leaders

    Featured content

    • On-demand webinars
    • Identity Access Management Hub
    • Research
    • Delta
    • Tech Marketing Hub

    Authors

    • Stuart Sumner
    • John Leonard
    • Tom Allen
    • Computing Contributors

    Computing Resources

    • English
    • Français
    • Deutsch
    • Espagnol
    • Italien
  • Searchlogo

    Search Computing

    x
Join Sign in
 
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
    • Sign in

Palo Alto Networks

Locking it down: Top 10 zero trust vendors deployed by UK IT teams

Security Technology

Locking it down: Top 10 zero trust vendors deployed by UK IT teams

The zero trust approach to cybersecurity leapt up the agenda when the pandemic hit. Here's an overview of some of the key industry players

clock 30 June 2022 • 11 min read
Faith no more: the rise of 'zero trust' approaches to cyber security

Security Technology

Faith no more: the rise of 'zero trust' approaches to cyber security

The need to support WFH and flaws in the perimeter model has pushed ZTN to the fore

clock 07 June 2022 • 8 min read
Cloud security must switch from short term reactions to strategic planning

Security

Cloud security must switch from short term reactions to strategic planning

Greg Day of Palo Alto warns not to forget about security in the face of disruption

clock 21 September 2021 • 3 min read
Hildegard malware targeting Kubernetes to mine cryptocurrency

Threats and Risks

Hildegard malware targeting Kubernetes to mine cryptocurrency

Researchers expect a large-scale attack leveraging Kubernetes resources soon

clock 04 February 2021 • 2 min read
US Cyber Command warns organisations of critical vulnerability in Palo Alto Networks products

Threats and Risks

US Cyber Command warns organisations of critical vulnerability in Palo Alto Networks products

Foreign APTs will likely attempt to exploit the bug soon, it says

clock 01 July 2020 • 2 min read
VPN security flaw could enable attackers to crack a network without user name or password

Threats and Risks

VPN security flaw could enable attackers to crack a network without user name or password

Warning over VPNs from Palo Alto Networks, Fortinet and Pulse Secure after researchers uncover new security flaw

clock 24 July 2019 •
Three steps to protecting your apps and data on AWS

Cloud and Infrastructure

Three steps to protecting your apps and data on AWS

Because the cloud itself's not the be all and end all of security

clock 10 September 2018 •
The three critical ingredients for cloud security success

Cloud and Infrastructure

The three critical ingredients for cloud security success

With requirements constantly changing, there is an ideal recipe to keep secure

clock 03 September 2018 •
How to move on from perimeter firewalls to suit the cloud

Security

How to move on from perimeter firewalls to suit the cloud

Would you settle for door locks or invest in a burglar alarm too?

clock 28 August 2018 • 1 min read
SpyDealer takes control of Android phones and steals data from encrypted messaging apps

Security

SpyDealer takes control of Android phones and steals data from encrypted messaging apps

Malware is distributed via compromised wireless networks, not the Play Store

clock 07 July 2017 •
12
Most read
01

Google forced to switch off London data centre to save it during heatwave

02 August 2022 • 2 min read
02

Meta sued for secretly harvesting patient data for targeted advertising

01 August 2022 • 3 min read
03

'Massive' cyberattack targets the German Chambers of Industry and Commerce

05 August 2022 • 3 min read
04

Microsoft email users targeted in new phishing campaign that can bypass MFA

05 August 2022 • 3 min read
05

Microsoft develops 3MW-capable hydrogen fuel cells

02 August 2022 • 2 min read
  • Contact us
  • Marketing Solutions
  • About The Channel Company
  • Privacy Settings
  • Terms & Conditions
  • Policies
  • Careers
FOLLOW US

© The Channel Company EMEA
New London House, 172 Drury Lane, London WC2B 5QR.Registered in England and Wales with company registration number 14078896

Loading