computing_logo
Sign in Join
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
logo
  • logo

    Search Computing

     

     

  • Latest
  • Topics

    Choose a topic from the list below

    • Diversity in Tech
    • Big Data & Analytics
    • DevOps
    • Security
    • GDPR
    • AI & ML
    • Cloud & Infrastructure
    • CIO
    • Deskflix
  • Tech Impact
  • Diversity in Tech
  • Deskflix
  • Events
  • Whitepapers
  • More

    Most Popular content

    • Delta
    • Big Data & Analytics
    • Cloud
    • Leadership & Strategy
    • Open Source
    • Storage
    • Telecoms
    • Top 100 IT Leaders

    Featured content

    • On-demand webinars
    • Identity Access Management Hub
    • Research
    • Delta
    • Tech Marketing Hub

    Authors

    • Stuart Sumner
    • John Leonard
    • Tom Allen
    • Computing Contributors

    Computing Resources

    • English
    • Français
    • Deutsch
    • Espagnol
    • Italien
  • Searchlogo

    Search Computing

    x
Join Sign in
 
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
    • Sign in

Security

Staying cybersecure when 'bringing your own devices'

Strategy

Staying cybersecure when 'bringing your own devices'

Kevin Curran, IEEE senior member and professor of cybersecurity at Ulster University, describes how to remain secure whilst enabling personal devices

clock 06 April 2022 • 4 min read
The rise of the token CISO

Security

The rise of the token CISO

Ian Hill, Global Director of Cyber Security, Royal BAM Group, shares a disturbing recent experience with a fellow professional, and argues that some CISOs don't truly understand the nature of their role

clock 21 June 2021 • 4 min read
Top four technology trends for 2021

Leadership

Top four technology trends for 2021

Computing gazes into its crystal ball and outlines what it expects to be the big ticket items on IT leaders' agendas in 2021, including remote working, cyber security challenges, enterprise open source and automation

clock 09 December 2020 • 11 min read
Do we need tougher breach notification rules?

Security

Do we need tougher breach notification rules?

The Travelex ransomware raises the question, once again, of whether organisations should be obliged to provide more information

clock 14 May 2020 •
Russian authorities arrest 25 for running stolen credit card marketplace

Security

Russian authorities arrest 25 for running stolen credit card marketplace

Websites trading in stolen debit and credit cards, as well as personal information, have gone dark following raids last week by the FSB

clock 30 March 2020 •
ICO approves use of British mobile phone tracking data to fight spread of coronavirus

Privacy

ICO approves use of British mobile phone tracking data to fight spread of coronavirus

Regulator okays the use of anonymised phone tracking data to help tackle the spread of COVID-19

clock 30 March 2020 •
Flaws in Diameter signalling protocol make all 4G networks prone to denial-of-service attacks

Threats and Risks

Flaws in Diameter signalling protocol make all 4G networks prone to denial-of-service attacks

The protocol is used to authenticate message and information distribution in 4G networks

clock 27 March 2020 •
South Korean APT uses five zero-day flaws to turn the tables on North Korea

Hacking

South Korean APT uses five zero-day flaws to turn the tables on North Korea

The group, linked to South Korea, used bugs in Internet Explorer, Google Chrome and the Windows Kernel to target North Koreans

clock 27 March 2020 •
Cyber security experts collaborate to block coronavirus-related cyber campaigns

Hacking

Cyber security experts collaborate to block coronavirus-related cyber campaigns

The new group includes professionals from technology firms like Amazon and Microsoft

clock 26 March 2020 •
Tupperware accused of ignoring warnings over ecommerce website compromised by web-skimming JavaScript

Hacking

Tupperware accused of ignoring warnings over ecommerce website compromised by web-skimming JavaScript

Tupperware finally gets round to cleaning its ecommerce site days after being told that it had been compromised by a credit-card-stealing Magecart group

clock 26 March 2020 •
123
Most read
01

Brexit is having a negative impact, say 47% of UK IT leaders

15 August 2022 • 2 min read
02

Microsoft warns of Russian 'Seaborgium' phishing, reconnaissance activities

17 August 2022 • 2 min read
03

South Staffordshire Water victim of cyber attack, customers not at risk

16 August 2022 • 2 min read
04

UK scammers mailing counterfeit Microsoft Office USB drives

18 August 2022 • 3 min read
05

Darktrace confirms takeover proposal by US private equity firm Thoma Bravo

17 August 2022 • 2 min read
  • Contact us
  • Marketing Solutions
  • About The Channel Company
  • Privacy Settings
  • Terms & Conditions
  • Policies
  • Careers
FOLLOW US

© The Channel Company EMEA
New London House, 172 Drury Lane, London WC2B 5QR.Registered in England and Wales with company registration number 14078896

Loading