• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      event logo
      Where the buck stops: Why a shared responsibility model will help you own your cloud security flaws

      This webinar, and accompanying dedicated research, will reveal to what extent organisations are practicing a shared responsibility model for cloud security today and the degree to which IT leaders are aware of what they should be doing to ensure the secure use of their multi- and hybrid-cloud environments.

      • Date: 27 Jan 2021
      event logo
      Leveraging the Cloud to Defeat Data Disasters

      Join us and learn how your IT team can realize many of the powerful advantages of the cloud and solve the operational complexity behind managing data across hybrid and multi-cloud IT environments with centralized management, automation, end-to-end security, and lower TCO.

      • Date: 28 Jan 2021
      event logo
      Deskflix Hybrid and Multi Cloud

      One of the most powerful tools for breaking down silos and integrating resources is cloud computing. But multi-tenancy cloud is not the ideal environment for every application or every class of data and some will need to remain on-prem for the foreseeable future; nor are all clouds equal. Tune in to Deskflix season 1 to hear industry experts speak on the questions you need answered on hybrid and multi cloud.

      • Date: 10 Feb 2021
      event logo
      Deskflix Financial Services

      oin us for this episode of Deskflix to hear from industry experts and peers on their 2020 best practices, what they’ve learnt for 2021 and how they plan to overcome the next wave of disruption.

      • Date: 03 Mar 2021
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    • Spotlights

      Welcome to Computing's Spotlight section, where we focus in on particularly important themes and topics of enterprise IT.

      Intel logo

       

      Endpoint Management and Security Hub

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 

Proofpoint

Cybersecurity in 2021: Looking ahead to another unpredictable year
Cybersecurity in 2021: Looking ahead to another unpredictable year

The big topics will be the cloud, social engineering, automation and security budgets, as firms work to address corners cut in the pandemic

  • Security
  • 19 January 2021
Don't forget the people in the rush for protection
Don't forget the people in the rush for protection

It’s not just good security practice – focusing on people can help secure a seat for IT at the top table

  • Security
  • 10 December 2020
Understanding Business Email Compromise: An organisation's most expensive enemy
Understanding Business Email Compromise: An organisation's most expensive enemy

Online fraud in the business world is growing more sophisticated - and expensive.

  • Security
  • 23 November 2020
Emotet is back and installing TrickBot trojan, researcher warns
Emotet is back and installing TrickBot trojan, researcher warns

The latest Emotet spam campaign is targeting people in the UK and the US

  • Threats and Risks
  • 21 July 2020
VPNs aren't enough: a zero-trust networking approach to securing home workers and the organisation
VPNs aren't enough: a zero-trust networking approach to securing home workers and the organisation

Access should depend on who they are, what they're doing and also what device they're using, says Proofpoint

  • Security Technology
  • 26 May 2020
Questions on remote working tools and strategies? There's still time to login to Deskflix!
Questions on remote working tools and strategies? There's still time to login to Deskflix!

  • Strategy
  • 21 May 2020
Proofpoint buys inside-threat management firm ObserveIT for $225m
Proofpoint buys inside-threat management firm ObserveIT for $225m

Deal to close before the end of the year

  • Security
  • 05 November 2019
Transport, shipping and utilities targeted in two new malware campaigns
Transport, shipping and utilities targeted in two new malware campaigns

One campaign involves an alleged state-sponsored threat group that has compromised at least 17 US utilities in the past five months

  • Threats and Risks
  • 24 September 2019
New SystemBC proxy malware now being distributed through RIG, Fallout exploit kits, warn researchers
New SystemBC proxy malware now being distributed through RIG, Fallout exploit kits, warn researchers

The malware uses SOCKS5 to evade detection, warns Proofpoint

  • Threats and Risks
  • 02 August 2019
Kronos banking Trojan re-emerges after re-tooling and re-brand as Osiris
Kronos banking Trojan re-emerges after re-tooling and re-brand as Osiris

Germany, Japan and Poland targetted in new banking Trojan campaign, according to Proofpoint

  • Security
  • 26 July 2018
CIOs outline the security risks of using Office 365
CIOs outline the security risks of using Office 365

Microsoft's flagship cloud-based productivity suite can leave its users exposed to serious security risks

  • Business Software
  • 18 May 2018
Research finds disconnect between belief and reality in Office 365 security
Research finds disconnect between belief and reality in Office 365 security

Microsoft customers believe that they are always protected; the truth is much more varied

  • Threats and Risks
  • 15 May 2018
The email security imbalance: how much do intrusions now outweigh spend?
The email security imbalance: how much do intrusions now outweigh spend?

Sign up for Computing's next exclusive IT Leaders Dining Club

  • Cloud and Infrastructure
  • 26 April 2018
Regardless of your Office 365 tier, layered security is the best way to protect your business email
Regardless of your Office 365 tier, layered security is the best way to protect your business email

Office 365 is popular, but experts agree that even the top tier should be bolstered by third party systems

  • Threats and Risks
  • 26 April 2018
Cyber crooks are more interested in exploiting people, not software flaws, claims Proofpoint
Cyber crooks are more interested in exploiting people, not software flaws, claims Proofpoint

Ransomware, phishing, cryptocurrency threats and cloud attacks all growing fast, warns security report

  • Security
  • 18 April 2018
North Korean hacking group Lazarus targeting bitcoin and point-of-sale infrastructure in dash for cash
North Korean hacking group Lazarus targeting bitcoin and point-of-sale infrastructure in dash for cash

North Korea's Lazarus Group following the money, warns Proofpoint

  • Security
  • 20 December 2017
Russian hackers looking to take advantage of Adobe Flash vulnerability
Russian hackers looking to take advantage of Adobe Flash vulnerability

Researchers working at enterprise security firm Proofpoint have found that the infamous Fancy Bear hackers are looking to take advantage of a new Adobe Flash vulnerability.

  • Security
  • 20 October 2017
Top five phishing phrases used by online scammers
Top five phishing phrases used by online scammers

Don't think you could be scammed or Trojanised in a phishing scam?

  • Security
  • 11 October 2016
Locky ransomware -  a strain of Dridex - spreading via Word documents, security firms warn
Locky ransomware - a strain of Dridex - spreading via Word documents, security firms warn

Locky has already hit a hospital in the US, which had to pay $17,000 in Bitcoin to decrypt important data

  • Threats and Risks
  • 18 February 2016
Banking Trojan Dyreza morphs to target supply chains
Banking Trojan Dyreza morphs to target supply chains

Bored of banking, Dyreza turns its attention to high-value targets in the supply chain

  • Security
  • 30 September 2015

Most read

Software errors wipes 'thousands' of arrest records from police databases
Software errors wipes 'thousands' of arrest records from police databases
New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach
New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach
Women in IT: don't get stuck in 'glue work' if you want to get on
Women in IT: don't get stuck in 'glue work' if you want to get on
BT faces possible £500m claim for overcharging landline-only customers
BT faces possible £500m claim for overcharging landline-only customers
Google locks out another top AI ethicist
Google locks out another top AI ethicist
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading