• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      event logo
      The Pesky Password Problem: What place do passwords have in the modern workplace?

      In this webinar you'll learn: Why passwords are so easy to hack, and how the bad guys do it. How to craft a secure, risk-focused password security policy. The truth about password managers and multi-factor authentication and how they impact our risk. How to empower your end users to become your best last line of defence

      • Date: 21 Jan 2021
      event logo
      Where the buck stops: Why a shared responsibility model will help you own your cloud security flaws

      This webinar, and accompanying dedicated research, will reveal to what extent organisations are practicing a shared responsibility model for cloud security today and the degree to which IT leaders are aware of what they should be doing to ensure the secure use of their multi- and hybrid-cloud environments.

      • Date: 27 Jan 2021
      event logo
      Leveraging the Cloud to Defeat Data Disasters

      Join us and learn how your IT team can realize many of the powerful advantages of the cloud and solve the operational complexity behind managing data across hybrid and multi-cloud IT environments with centralized management, automation, end-to-end security, and lower TCO.

      • Date: 28 Jan 2021
      event logo
      Deskflix Hybrid and Multi Cloud

      One of the most powerful tools for breaking down silos and integrating resources is cloud computing. But multi-tenancy cloud is not the ideal environment for every application or every class of data and some will need to remain on-prem for the foreseeable future; nor are all clouds equal. Tune in to Deskflix season 1 to hear industry experts speak on the questions you need answered on hybrid and multi cloud.

      • Date: 10 Feb 2021
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    • Spotlights

      Welcome to Computing's Spotlight section, where we focus in on particularly important themes and topics of enterprise IT.

      Intel logo

       

      Endpoint Management and Security Hub

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 

Risk Management

Interview: Richard Hunt, Turnkey
Interview: Richard Hunt, Turnkey

  • Security
  • 09 December 2020
The risks and rewards of evergreen IT
The risks and rewards of evergreen IT

Evergreen IT will become the default model for new technologies, predicts RSA CIO David Germain, but securing evergreen systems requires an holistic approach

  • Security
  • 17 November 2020
Where next for the mainframe, part 2 - drivers for change
Where next for the mainframe, part 2 - drivers for change

Risk, costs, legacy modernisation, lacking innovation and the need for agility are all drivers pushing businesses away from mainframes today

  • Server
  • 06 October 2020
"Security campaigns do not work," says infosec professor Adam Joinson
"Security campaigns do not work," says infosec professor Adam Joinson

The psychologist and IT expert insists that employees are not the weak link in security that everyone assumes them to be

  • Security
  • 28 November 2019
How to prepare for GDPR: Experts share their top tips
How to prepare for GDPR: Experts share their top tips

Experts from Balfour Beatty, IBM, ACCA and Age UK share their strategies and warn of the pitfalls in preparing for GDPR compliance

  • Legislation and Regulation
  • 01 December 2017
Continental business leaders trounce UK leaders on cyber risk management
Continental business leaders trounce UK leaders on cyber risk management

Business leaders in France and Germany are more aware of cyber risks and more likely to take steps to mitigate failures than those in the UK

  • Security
  • 18 July 2017
Almost half of top websites present a risk to visitors, says report
Almost half of top websites present a risk to visitors, says report

Menlo Security report finds 46 per cent of top sites run outdated software, host malware or have been attacked

  • Threats and Risks
  • 21 December 2016
Risk remediation: beware the silver bullet solution says National Trust security chief
Risk remediation: beware the silver bullet solution says National Trust security chief

There is no quick fix when it comes to tackling vulnerabilities, says Jon Townsend

  • Threats and Risks
  • 25 November 2016
Cyber security pros say boards, CEOs and CFOs don't 'get' cyber security risk
Cyber security pros say boards, CEOs and CFOs don't 'get' cyber security risk

Half of infosec pros believe boards have big gaps in their understanding of cyber risk - or don't understand it at all

  • Security
  • 21 January 2016
What we learned following a DDoS attack
What we learned following a DDoS attack

A DDoS attack on the Royal Borough of Windsor and Maidenhead taught IT chief Rocco Labellarte that ticking boxes for compliance is not enough

  • Security
  • 30 November 2015
Constructing a cloud-based IT strategy: an interview with Aggregate Industries CIO Mike Gibbons
Constructing a cloud-based IT strategy: an interview with Aggregate Industries CIO Mike Gibbons

Gibbons says decisions including replacing IBM with Qlik and dropping Microsoft in favour of Google are boosting efficiency at the building materials firm

  • Business Software
  • 20 October 2015
Apple's security reputation takes a knock, but enterprise use of Macs is still growing - report
Apple's security reputation takes a knock, but enterprise use of Macs is still growing - report

Dose of realism brought about by WireLurker fails to dent enthusiasm for the Mac in business

  • Threats and Risks
  • 13 October 2015
Coats plc beefs up cyber security with Zscaler
Coats plc beefs up cyber security with Zscaler

'You can be bullet-proof with 99 per cent of your site but you only need to leave one door open to ruin all of your security controls,' says CIO Richard Cammish

  • Security Technology
  • 07 September 2015
How businesses are benefiting from the technology behind CERN's Large Hadron Collider
How businesses are benefiting from the technology behind CERN's Large Hadron Collider

The internet isn't the only mainstream technology to come out of CERN

  • Business Software
  • 29 July 2015
Robot kills man at German Volkswagen plant
Robot kills man at German Volkswagen plant

Human error official cause of accident

  • Appliances
  • 02 July 2015
The CMO and CFO 'are Shadow CIOs', argue Lloyd's and ex-American Airlines CIOs
The CMO and CFO 'are Shadow CIOs', argue Lloyd's and ex-American Airlines CIOs

But speaking at Bloomberg Enterprise Technology Summit, they argued that the role of the CIO still remains important, especially when managing risk

  • Strategy
  • 09 December 2014
Security vs performance
Security vs performance

Imposing security from above can make IT the 'Department of No', writes John Leonard, meaning it's important to strike the right balance

  • Security Technology
  • 21 July 2014
Connecting risk management to cyber security
Connecting risk management to cyber security

Danny Palmer investigates how businesses can protect themselves against uncertain cyber threats in light of the increasing number of connected devices in the world

  • Threats and Risks
  • 14 July 2014
Assigning a value to corporate data
Assigning a value to corporate data

How are some of Britain's top organisations trying to promote the value of their data to the biggest leakers - their own staff and clients? Peter Gothard reports

  • Hacking
  • 14 July 2014
Applying best practice risk management in IT projects
Applying best practice risk management in IT projects

Dennis Sheehan, senior training consultant at ILX Group, explains how IT projects must be run in order to minimise risk

  • Strategy
  • 08 July 2014
Email isn't secure but it's here to stay, says Websense information security officer
Email isn't secure but it's here to stay, says Websense information security officer

People dislike email but businesses are stuck with it, Neil Thacker tells Computing's Enterprise Security and Risk Management Summit

  • Business Software
  • 01 July 2014
BBC board wary of security projects, says info security manager
BBC board wary of security projects, says info security manager

'It's all about reputation, availability and staying on the telly' reveals Cooper

  • Threats and Risks
  • 01 July 2014
No more castle building - enterprise security and risk management
No more castle building - enterprise security and risk management

Research for Enterprise Security & Risk Management Summit 2014 finds IT moving away from a protect-at-all-costs mentality

  • Security
  • 01 July 2014
Enterprise Security and Risk Management Summit 2014 Live!
Enterprise Security and Risk Management Summit 2014 Live!

The latest news and views from Computing's summit held in Hilton Tower Bridge

  • Security
  • 01 July 2014
12

Most read

Parler data breach: Hackers claim they downloaded everything from Parler before it was taken offline
Parler data breach: Hackers claim they downloaded everything from Parler before it was taken offline
Microsoft fixes Windows 10 bug forcing restarts
Microsoft fixes Windows 10 bug forcing restarts
Software errors wipes 'thousands' of arrest records from police databases
Software errors wipes 'thousands' of arrest records from police databases
Twitter's Trump ban raises social media regulation questions, says Hancock
Twitter's Trump ban raises social media regulation questions, says Hancock
Twitter CEO defends Trump ban while Telegram purges far-right channels
Twitter CEO defends Trump ban while Telegram purges far-right channels
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading