38 total entries
Show entries.
Think Your Data Is Safe in the Cloud? Think Again

Ahead of World Backup Day, experts from Keepit, Scality and NAKIVO, highlight the hidden risks around SaaS data, storage resilience and modern backup strategies.

Damage limitation

Incident response is widely used to minimise damage from cyberattacks and security breaches - and prevent future incidents. In the first of a two-part series, we ask those in the know how this is best implemented and managed

Having a blast!

AI has already reshaped the cybersecurity landscape and this will only accelerate as we move through the rest of 2025.

The end game

Organisations are dependent on their networks to maintain productivity. Mitigating risk is about adopting a proactive network security strategy.

The Journey to Cyber Resilience

Formalising Threat Detection and Incident Response Strategies: by Scott Scheppers, Chief Experience Officer at LevelBlue

Why AI is on all our minds

More reflections on artificial intelligence - its threats and promises

We shall not be moved!

Several countries have taken a stand against ransomware attacks by agreeing not to make payments to hackers

Security by design

New cybersecurity measures being imposed in the US will hit software companies hard. What might this mean for the UK?

Powerful trains of thought

Poorly conceived cyber security training can be a massive turn-off. But, delivered properly, it can really empower the workforce to make decisions that help protect the business

Is your data out of control?

Nick Evans, Business Development Manager at Geolang, looks at how data discovery might be a solution for your business

To trust or not to trust - that is the question

What exactly is Zero Trust and how can this be achieved? Tom Hills, Pre-Sales Consultant, SecurEnvoy, offers his insights on this challenging topic

Get the basics right…

The exponential adoption of new cyber security-related tools is a growing problem in the cyber security world, cautions Steven Usher, Senior Analyst, Brookcourt Solutions

If you can't stand the heat…

… then do something about it. Time to fight back as Highly Evasive Adaptive Threats strike hard

KIOXIA announces 2nd generation 24G SAS SSD

PM7 Series leverages latest BiCS FLASH 3D Flash memory technology

Should you pay the ransom?

When threatened with a ransom demand, should you simply submit? There is no simple answer to the question, as Steven Usher, Senior Security Analyst, Brookcourt Solutions, explains

All the latest intel

How do you measure the success of a cyber threat intelligence program? Steven Usher, Senior Security Analyst, Brookcourt Solutions, offers his insights on a challenging topic

Tangled Web

Is there a hacker staring in on you through your devices and gadgets, ready to pounce? We find out how vital it is to keep webcams covered when they're not in use

PUT A SOC IN IT!

A Security Operations Centre (SOC) has become one of the vital components of a well-rounded cyber security programme

Digital Access for All - helping to bridge the technology divide

Steve Mellings, founder of ADISA, looks at how COVID-19 has helped to illuminate a gap in society where technology for many isn't a given

The patient approach pays off

NHS Management adopts a security-first mindset, with help from AT&T Cybersecurity

The New Order

Is now the perfect time to get your (I.T.) house in order? Paul Harris, managing director, Pentest, offers his thoughts

Homing in on COVID-19

As the impact of the COVID-19 virus escalates, more and more employees are working from home. But dangers lurk there as well and urgent action needs to be taken

Why cybersecurity policy & GDPR compliance aren't so different

The combined forces of further regulation and new technology will underpin data security in the years ahead, argues Robert Allen - European Director of Marketing & Technical Services at Kingston Technology

Promoting IT sustainability through risk management

E-waste is the largest-growing waste stream. By changing our 'use and discard' approach, this is an area where we can make a significant impact, says Steve Mellings, CEO and founder of ADISA

Joining forces in Fightback

Email and data security company Mimecast has launched a Cyber Alliance Program, designed to align security vendors into an extensive cyber resilience ecosystem

Winning ways

When the UK's largest commercial FTSE 100 property company went in search of a technology partner to deliver at the highest level, it turned to OryxAlign

Deep, dark and dangerous

Half of industrial control system networks have faced a cyber-attack, as hacking groups seek out geo-political advantage or financial gain

Brexit realities

Carol Massay, CEO of EasyBuild looks at the implications of Brexit for the construction industry, whatever the outcome on 31 October

Thick Data and Smart Cities

Are we in danger of being smothered by information? Nathan Sykes of Kolabtree explains how 'thick data' is being used to build the smart cities of the future

Education, education, education!

Cybersecurity needs to be a priority for the education sector, argues Adrian Jones, CEO of Swivel Secure

Threat or treat

How organisations should best manage, detect and respond to a data breach is an on-going question. But an intelligence-driven strategy is an essential part of that

Why 'proper' disposal is more important now than ever

The introduction of the GDPR regulation last year meant organisations responsible for IT disposal had no option but to review their processes for WEEE and data-bearing assets, as Jean-Pierre Naylor, managing director and owner, Computer Disposals Ltd (CDL), explains

How AI sidekicks can help security heroes save the day

What superpowers would help your organisation to defeat the cybercriminals? Matt Walmsley, EMEA director at Vectra, offers his thoughts

Data security for your mobile workforce

We live in a flexible, mobile world that is constantly reinventing itself. Paul Norbury, Chief Executive, Cardwave Services, steps inside for a closer view

Breaking with tradition

John Stokoe of Dassault Systèmes explains why the construction industry needs an industrial revolution

Life after the EU

Britain is to leave the EU - the votes were cast and the deed is done. But what is this likely to mean for our industry? Computing Security has been finding out

What will be Big in 2014?

The burning issues that organisations are in the throes of dealing with this year are already proving to be highly challenging, as we enter the second quarter of 2014. Brian Wall reports

Into The Unknown

The storage market is changing all the time. But where do the vendors think the biggest transformations will be - and what will be their effect? Brian Wall reports