Recent Issues
Latest Issue
CS Jan-Feb 2026
CS Nov-Dec 2025
CS Sep-Oct 2025
CS Jul-Aug 2025
CS May-Jun 2025
CS Mar-Apr 2025
CS Jan-Feb 2025
CS Nov-Dec 2024
CS Sep-Oct 2024
CS Jul-Aug 2024
CS May-Jun 2024
CS Mar-Apr 2024
CS Jan-Feb 2024
CS Nov-Dec 2023
CS Sep-Oct 2023
CS Jul-Aug 2023
CS May-Jun 2023
CS Mar-Apr 2023
CS Jan-Feb 2023
CS Nov-Dec 2022
CS Sep-Oct 2022
CS Jul-Aug 2022
CS May-Jun 2022
CS Mar-Apr 2022
CS Jan-Feb 2022
CS Sep-Oct 2021
CS May-Jun 2021
CS Mar-Apr 2021
CS Nov-Dec 2020
CS May-Jun 2020
CS Mar-Apr 2020
CS Jan-Feb 2020
Keeper Security KeeperPAM Review...
Product Review | October 2025
Privileged access management (PAM) is an essential cybersecurity strategy that allows businesses to significantly reduce their attack surface - and Keeper Security's KeeperPAM offers a sophisticated solution for protecting access to critical resources.
Where fact and fiction...
Review | January 2025
In an era where artificial intelligence can create content indistinguishable from reality, separating truth from fiction is getting ever more difficult
An honourable quest
Review | September 2024
Cybersecurity has never had an overarching code of ethics and conduct. Authors Paul J. Maurer and Ed Skoudis want to see that failure fully addressed
BackBox Network Automation Platform...
Product Review | July 2024
As enterprise networks grow in complexity, businesses can no longer afford to rely on inefficient and error-prone manual processes to manage and maintain critical infrastructure devices.
Portnox Cloud
Product Review | May 2024
Network access control and endpoint security have a mixed reception in enterprises, as many solutions are challenging to deploy, complex to manage and prohibitively expensive
The dark side of...
Review | May 2024
A new book offers a penetrating look into the murky, darker recesses of artificial intelligence
NetAlly CyberScope Air
Product Review | March 2024
When NetAlly launched its CyberScope last year it proudly hailed it as the world’s first wired and wireless handheld network vulnerability scanner capable of providing in-depth cybersecurity analysis and reporting. NetAlly has now released the CyberScope Air, which places all the same great features in the hands of technicians responsible for wireless security at the network edge.
AI - weapon of...
Review | March 2024
AI has become a vast topic of debate: will it help us thrive or prove our nemesis? A new book tackles the implications for this controversial technology head on
Inside the revolution
Review | November 2023
A range of powerful technologies is disrupting and transforming every corner of our reality. A new book argues why and how we must act and adapt to this
Hornetsecurity 365 Permission Manager
Review | November 2023
Microsoft 365 (MS365) is the productivity and communications platform of choice for organisations of all sizes, with it already having reached a staggering 382 million paid seats this year.
Hornetsecurity Security Awareness Service...
Product Review | October 2023
Cybercriminals never sit still and are always looking for new ways to outwit businesses and breach their security controls.
macmon NAC
Product Review | October 2023
macmon's NAC product is designed to be simple to deploy and maintain, while protecting your network from the outset.
News
At the speed of...
News | May 2026
Threat actors are moving on average four times faster than...
Agentic AI and the...
News | May 2026
The CISO Report: From Risk to Resilience in the AI...
Product integration phase completed...
News | May 2026
Wireless management platforms, security services and connected vehicle programs company...
Regulation and AI reshaping...
News | May 2026
Zimperium has released new analysis outlining how regulatory changes and...
Adopting Agentic AI is...
News | May 2026
Ivanti's '2026 State of Cybersecurity Report: Bridging the Divide' reveals...
Kiteworks and Kasm enter...
News | May 2026
Kiteworks has entered into a new technology alliance with Kasm,...
Advantech goes DEEP into...
News | May 2026
Advantech is partnering with DEEPX, a leading Korean AI...
In the Zone
News | May 2026
Infosecurity Europe has unveiled big news ahead of the show...
Outages down to ignoring...
News | March 2026
Three-quarters of UK IT teams say they've experienced outages as...
Agents going rogue sparks...
News | March 2026
In 2026, "protecting sensitive data is no longer a simple...
Partnership seeks to protect...
News | March 2026
Kiteworks has announced a strategic partnership with Concentric AI to...
AI: organisations falling short...
News | March 2026
UK organisations are said to be significantly overestimating their readiness...
Quantum Overkill
Feature | May 2026
Managing cryptographic security can create operational overload that leaves organisations...
Time for urgent steps...
Feature | March 2026
Encryption has long been the valiant protector that is almost...
Seeking out the 'invisible'...
Feature | March 2026
When it comes to network security, how can organisations be...
Keeping the enemy beyond...
Feature | January 2026
Cyberattacks are growing in number relentlessly and demand constant testing...
All in a spin...
Feature | January 2026
Nihilistic fears abound that AI could replace humans in many...
Putting the 'resilience' into...
Feature | November 2025
What actions need to be taken to elevate cyber resilience...
Lighting the way forward...
Feature | November 2025
Encryption can be rewarding - but challenging. However, using that...
AI - Friend or...
Feature | August 2025
AI's transformative power is acknowledged in many quarters, yet these...
Data theft onslaught
Feature | August 2025
Attacks and breaches are showing no sign of easing off...
Health issues
Feature | August 2025
The NHS is a huge and vulnerable target for cyber...
Compliance alliance
Feature | June 2025
The continuing threat of a global trade war, diverging regulations...
Threat levels soar to...
Feature | June 2025
Advanced Persistent Threats (APTs) hit a staggering 43% of all...
Interviews
Role of industry collaboration...
Interview | September 2025
Computing Security has been talking to Mark Hendry, Partner and...
In whom we trust...
Interview | January 2025
Computing Security sat down recently for a fireside chat with...
Inside a hidden world...
Interview | November 2023
Computing Security speaks with Andy Syrewicze, technical evangelist, Hornetsecurity, about...
Welcome to the (third)...
Interview | October 2022
Computing Security recently caught up with Hornetsecurity chief technical officer...
Object Archive software -...
Interview | September 2022
Fujifilm recently launched Object Archive, described as 'an S3-compatible tape...
Perenna - helping to...
Interview Case Study | December 2021
Perenna is creating a bank where mortgages will be funded...
Always at your disposal...
Interview | July 2018
Computer Disposals Ltd (CDL) is one of the UK's leading...
Behind the scenes at...
Interview | September 2017
Significant change is now taking place at Capita Cyber Security....
On your metal!
Case Study | November 2023
When one metal fabrication company suffered several malware attacks, it...
Furness College enjoys 50%...
Case Study | February 2022
In-built ransomware protection enables rapid recovery of individual files and...
Perenna - helping to...
Interview Case Study | December 2021
Perenna is creating a bank where mortgages will be funded...
Helping to redefine the...
Case Study | December 2021
Why Remote Internal Infrastructure...
Case Study | November 2021
“Everything from email servers and internal staff networks, through to...
8am and I.T. is...
Case Study | September 2021
Stark lesson unfolds in the cyber security dangers that are...
Automating identity and access...
Case Study | October 2020
One Identity partners have helped Jumbo Supermarkets to maximise its...
Profits and Pitfalls
Case Study | June 2020
Well-crafted social media content can deliver a multitude of benefits....
KnowBe4 Decreases the Risk...
Case Study | June 2020
SIG plc. is a leading wholesale distributor in Europe of...
Securing privileged access for...
Case Study | June 2020
Prosegur uses RPA to transform its business while reducing the...
Leading the charge
Case Study | May 2020
How savvy businesses have successfully flipped the digital switch
Regional U.S. Credit Union...
Case Study | May 2020
Many U.S. states have shut down most non-essential industries, religious...
Power hungry
Research | November 2024
AI's appetite for electricity is putting pressure on power grids,...
Why orphaned data is...
Research | October 2023
Daniel Hofmann, CEO at Hornetsecurity, looks at the sizable threat...
Cyber risk response grabs...
Research | February 2023
Gartner research shows that 88% of boards now regard cybersecurity...
Why ransomware is 'moving...
Research | December 2022
Signs of a new data extortion technique show threat actors...
Top 8 security and...
Research | December 2021
Global analysis and research company Gartner pinpoints where the greatest...
Cyber strategy hits critical...
Research | March 2021
Cyber security has never had more relevance, when set against...
Ransomware soars
Research | May 2020
Working from home can make IT systems far more susceptible...
Who can you really...
Research | July 2019
Those who rely on their online bank to keep their...
Sealing off the breach...
Research | May 2019
A major cyber security breaches survey of UK businesses and...
Printer hacking in the...
Research | January 2019
Print and be damned? If the right security measures aren't...
NHS breach - the...
Research | November 2018
The WannaCry attack that hit the NHS last year, is...
The million pound gamble...
Research | November 2018
New research reveals that UK businesses would have to spend...
A night when the...
Awards | November 2025
The 2025 Computing Security Awards took place at a top...
Triumphs and Trophies
Awards | October 2025
The 2025 Computing Security Awards, staged at a gala ceremony...
Defending as one
Awards Winner | January 2025
The Security Project of the Year winner at the 2024...
The Computing Security Awards...
Awards | December 2024
WINNER: Metacompliance
The Computing Security Awards...
Awards | December 2024
WINNER: Cybaverse
The Computing Security Awards...
Awards | December 2024
WINNER: RedKey USB - Redkey USB Enterprise Edition
The Computing Security Awards...
Awards | December 2024
WINNER: VIPRE Security Group - VIPRE EDR+MDR
The Computing Security Awards...
Awards | December 2024
WINNER: Socura with CymruSoc
The Computing Security Awards...
Awards | December 2024
WINNER: NetAlly - Cyberscope Air
The Computing Security Awards...
Awards | December 2024
WINNER: Gigacycle
The Computing Security Awards...
Awards | December 2024
WINNER: MTI
The Computing Security Awards...
Awards | December 2024
WINNER: Arctera - Simon Jelley, GM & VP of Product
Opinions
Time for a change...
Opinion | January 2026
To shift the needle in the battle against threat actors,...
Time to rethink the...
Opinion | September 2025
The old way of making a business safe isn't working...
Don't let fear hinder...
Opinion | September 2024
Steve Mellings of ADISA makes the case for why the...
Is AI already beyond...
Opinion | March 2024
We invited consultancy and implementation agency WeAreBrain to give us...
What to do when...
Opinion | May 2023
How do hackers get inside an organisation's defences? Is it...
The dystopian world of...
Opinion | December 2022
BBC's recent drama, 'The Capture', was an alarming take on...
How sensitive is your...
Opinion | October 2022
Keeping track of stored data is a complex, difficult task....
Power vacuum
Opinion | August 2022
Cyber Power may well be a vital component in protecting...
2022: Where Packet Capture...
Opinion | May 2022
In today's rapidly changing threat landscape, why aren't more companies...
7 Reasons why SecurEnvoy...
Opinion | May 2022
The summer of 2020 saw Microsoft roll out Azure AD...
Getting to the heart...
Opinion | April 2022
Top companies now use a raft of tools and software...
Essential grains of truth...
Opinion | February 2022
"If you can't get the basics right, it doesn't matter...
Living on the edge...
Technology Focus | May 2026
A small group of people, it is claimed, gained access...
When threats come knocking…...
Technology Focus | March 2026
In the second of our 2-part series, we ask how...
New cyber laws must...
Technology Focus | August 2025
MPs show widespread support for stronger cyber laws, along with...
Quantum quakes
Technology Focus | August 2025
The incredible processing power and speed of quantum computers significantly...
Quantum blast-off
Technology | August 2025
The battle to beat the hackers will be fought in...
Adore DORA or not,...
Technology Focus | April 2025
The Digital Operational Resilience Act (DORA) has a wide remit....
Casting an ugly shadow...
Technology Focus | November 2024
What are the risks associated with Shadow IT/AI? Is it...
Face off!
Technology | May 2024
When it comes to device-based and server-based facial authentication, which,...
Put to the test...
Technology Focus | March 2024
With penetration testing used to identify the level of technical...
A world apart
Technology Focus | August 2022
Interest in the metaverse is on the up, but is...
Steering on the safe...
Technology Focus | August 2022
Autonomous vehicles are increasingly making headlines and not always for...
Quantum goes big!
Technology Focus | May 2022
BT and Toshiba launch first commercial trial of quantum secured...
Living on the edge...
Technology Focus | May 2026
A small group of people, it is claimed, gained access to Anthropic's Claude Mythos model - a tool said to be too powerful to release to the public
Quantum Overkill
Feature | May 2026
Managing cryptographic security can create operational overload that leaves organisations dangerously exposed to threats
Crime pays… and pays...
Special Focus | May 2026
Global cybercrime damage is projected to cost more than $12 USD trillion annually by 2031. How can that profligate waste be halted?
Trust left in tatters...
Security Update | May 2026
Users are suffering from email fatigue as cybercriminals wear down their defences. Now is the time to fight back
Who dares wins at...
Events | May 2026
From 'SAS: Who Dares Wins' star Jason Fox to England Rugby World Cup winner Maggie Alphonsi, this year's Infosec show will have a host of top speakers to inspire attendees
Quantum Quandry
Analysis | May 2026
A pioneering UK government programme worth up to £2 billion is being invested in quantum computing innovation. But is it too little - and is it too late?
At the speed of...
News | May 2026
Threat actors are moving on average four times faster than just a year ago, by using AI to speed up and scale cyber-attacks. That is the alarming statistic from a report released by Palo Alto
Agentic AI and the...
News | May 2026
The CISO Report: From Risk to Resilience in the AI Era', which surveys 650 global chief information security officers (CISOs), has been released.
Product integration phase completed...
News | May 2026
Wireless management platforms, security services and connected vehicle programs company Aeris has completed its product integration with Palo Alto Networks Prisma SASE 5G.
Regulation and AI reshaping...
News | May 2026
Zimperium has released new analysis outlining how regulatory changes and advances in artificial intelligence are transforming the mobile threat landscape and creating new challenges for enterprises.
Adopting Agentic AI is...
News | May 2026
Ivanti's '2026 State of Cybersecurity Report: Bridging the Divide' reveals a rapidly widening divide between escalating cyberthreats and organisations' ability to defend against them.
Kiteworks and Kasm enter...
News | May 2026
Kiteworks has entered into a new technology alliance with Kasm, aimed at enhancing how organisations securely interact with sensitive data.