Home Articles News Issues eNewsletters Subscribe Media/Events Contact Privacy More
Untitled Document
Latest Issue
CS Jan-Feb 2024
CS Nov-Dec 2023
CS Sep-Oct 2023
CS Jul-Aug 2023
CS May-Jun 2023
CS Mar-Apr 2023
CS Jan-Feb 2023
CS Nov-Dec 2022
CS Sep-Oct 2022
CS Jul-Aug 2022
CS May-Jun 2022
CS Mar Apr 2022
CS Jan Feb 2022
CS Sep-Oct 2021
CS May-Jun 2021
CS Mar-Apr 2021
CS Nov-Dec 2020
CS May-Jun 2020
CS Mar-Apr 2020
CS Jan-Feb 2020
2024 Issues
January-February - Featuring
Editor's Comment: A provisional agreement is paving the way for what would be a landmark deal on the use of artificial intelligence
PDF Version
Support-line aims to ward off attackers
With almost a third of UK businesses reporting a cyber breach or attack in the past 12 months, a cyber and data security support line has been launched
Click here for the full contents...
2023 Issues
November-December - Featuring
Editor's Comment: We all need recourse to legal services at various times in our lives and rely on these firms to protect our interests during those transactions
PDF Version
Leadership skills - why they matter
With so many threats faced by organisations, leaders who can motivate and guide the workforce are vitally important
Click here for the full contents...
September-October - Featuring
Editor's Comment: The idea that we can ever protect the overwhelming majority of organisations from suffering severe cyber-attacks has long been put out to pasture
PDF Version
Tensions mount
The continued geopolitical tensions, stronger regulation and AI-shaped revolution forecast by Infosecurity Europe's security community are all intensifying as 2023 enters its final phase
Click here for the full contents...
July-August - Featuring
Editor's Comment: More than 3,600 people are looking to embark on a new career in cyber this year through applications to the UK government's 'Upskill in Cyber' programme.
PDF Version
Russia's cyber rampage
Businesses warned to brace for impact from barrage of attacks
Click here for the full contents...
May-June - Featuring
Editor's Comment: In the face of escalating attacks on every front, the imperative for organisations to deliver the appropriate levels and quality of cybersecurity training to their workforce has never been greater
PDF Version
Wake-up call goes out to businesses
More than half of IT departments are saddled with the burden of compliance, warns a Hornetsecurity survey
Click here for the full contents...
March-April - Featuring
Editor's Comment: In the face of escalating attacks on every front, the imperative for organisations to deliver the appropriate levels and quality of cybersecurity training to their workforce has never been greater
PDF Version
Do We Still Need Firewalls?
In short, yes - now more than ever. There has never been a greater or more deliberate threat to information and communication systems...
Click here for the full contents...
January-February - Featuring
Editor's Comment: Data ethics is no longer an academic or niche geek issue, as it has been since the inception of the internet and the world wide web. It has never been more urgent.
PDF Version
EU e-signatures – what’s their legal status?
Across Europe, the majority of businesses have replaced wet ink signatures with electronic signatures when handling documents like sales contracts...
Click here for the full contents...
2022 Issues
November-December - Featuring
Editor's Comment: Data ethics is no longer an academic or niche geek issue, as it has been since the inception of the internet and the world wide web. It has never been more urgent.
PDF Version
Why ransomware is 'moving towards data destruction'
Signs of a new data extortion technique show threat actors may leverage Exmatter to destroy, rather than encrypt, data, according to a Cyderes Threat Report
Click here for the full contents...
September-October - Featuring
Editor's Comment: How likely is it that criminal gangs are going to return all your data intact and untarnished after a ransomware attack, if you comply with their requirements and pay whatever it is they demand of you?
PDF Version
Hornetsecurity launches next-generation Security Awareness Training
Cyber criminals are constantly innovating and attacks are on the rise: Hornetsecurity's 2022 Ransomware Report found that 60% of attacks came from phishing attempts.
Click here for the full contents...
July-August - Featuring
Editor's Comment: Saturday, 7 May, this year marked the first anniversary of the infamous Colonial Pipeline hack, which ended with a ransom fee of US$4.4 million being handed over.
PDF Version
Gas giant hit by ransomware attack
IT system brought down as energy crisis mounts
Click here for the full contents...
May-June - Featuring
Editor's Comment: Saturday, 7 May, this year marked the first anniversary of the infamous Colonial Pipeline hack, which ended with a ransom fee of US$4.4 million being handed over.
PDF Version
Chains of freedom
Supply chains are prone to wild swings and uncertainties. How can they be stabilised and less exposed, in order to create a cooperative supply-chain platform?
Click here for the full contents...
March-April - Featuring
Editor's Comment: There is still a clear lack of diversity and inclusion in tech.
PDF Version
The cloud conundrum
Cloud, in its various shapes, is often hailed as the way forward - so why is it sometimes so poorly protected? Computing Security finds out where the cracks are in an increasingly cloud-laden age
Click here for the full contents...
January-February - Featuring
Editor's Comment:The first ever Government Cyber Security Strategy was launched on 25 January, in a move to further protect the public services people rely on.
PDF Version
Ransomware finds its next big victim: governments
Alarming surge in ransomware and malicious cyberattacks
Click here for the full contents...
2021 Issues
November-December - Featuring
Editor's Comment:The 2021 Computing Security Awards were back live at a gala evening in London.
PDF Version
Secure Password Reset 'made easy' with SecurEnvoy SecurPassword
Michael Urgero, Senior Security Engineer, SecurEnvoy, offers his insights on solving the problem of lost passwords for users and the support team
Click here for the full contents...
September-October - Featuring
Editor's Comment:Jeffrey Carpenter and (posthumously) Dan Kaminsky are the latest to be inducted into FIRST's Incident Response Hall of Fame. They join past inductees Ian Cook, Don Stikvoort and Klaus-Peter Kossakowski...
PDF Version
Quantum leaps - and bounds
Quantum computers will soon smash through the mathematical cryptography we rely on as a society, it is forecast. How do we keep ourselves safe then?
Click here for the full contents...
May-June - Featuring
Editor's Comment:NTT launched its annual Global Threat Intelligence Report recently and some of the key findings are not going to provide great reassurance to most organisations...
PDF Version
The real artificial intelligence revealed
Can AI help transform the industry, making it sharper, wiser and less vulnerable?...
Click here for the full contents...
March-April - Featuring
Editor's Comment:Apprenticeships are the solution to attracting more young people into cybersecurity, according to 42.5% of respondents to a new Twitter poll run by Infosecurity Europe, Europe's information security event...
PDF Version
Through a glass darkly
We asked several industry commentators for their views on where 2021 will lead us, as we continue to grapple with COVID19...
Click here for the full contents...
January-February - Featuring
Editor's Comment:Apprenticeships are the solution to attractiing more Young people into cybersecurity,acccording to 42.5% of respondents to new Twitter poll run by infosecurity Europe,...
PDF Version
From data lockdown to digital transformation
Businesses need insight, not just data, when it comes to digital transformation, according to Peter Ruffley at Zizo...
Click here for the full contents...
2020 Issues
November-December - Featuring
Editor's Comment:Recent research has revealed that GDPR doesn't go far enough in the eyes of many IT leaders and employees, who are calling for greater tech regulations around data protection and cyber security....
PDF Version
HACKERS FOR HIRE
Hacker for hire groups are on the rampage globally, leaving a trail of destruction in their wake. The right cyber resilience strategies...
Click here for the full contents...
September-October - Featuring
Editor's Comment:
Cyber threats - legally speaking
Data breaches are becoming more prevalent and the legal sector is a favoured target, falling victim to cyber-attacks at an alarming rate...
Click here for the full contents...
July-August - Featuring
Editor's Comment: It was not good news to see in a recent report that a massive 67% of all malware in Q1 2020 was delivered via encrypted HTTPS connections...
Open and shut case
Being open to ethical disclosure is vital, states Paul Ritchie, Managing Security Consultant, Pentest Limited...
Click here for the full contents...
Working from HOME - Special
Editor's Comment: Nearly half of cybersecurity staff have been taken off security duties to assist with equipping a mobile workforce and incidents have doubled during the pandemic...
PDF Version
Voice of hope
What is hailed as a significant step forward in the UK's fight against online harm has been taken, with the launch of the Online Safety Tech Industry Association (OSTIA)...
Click here for the full contents...
May-June - Featuring
Editor's Comment:By any Measure, the recent revelations that cyber scammers have been using SMS alerts to Wrongly inform people they have been in contact with someone who has tested positive for coronavirus...
PDF Version
Remote workers targeted
Attackers have been quick to seek out ways of exploiting the many vulnerabilities laid bare by home working...
Click here for the full contents...
March-April - Featuring
Editor's Comment:We are all well aware of the 'enemies at the gate': the hackers and attackers looking for every opportunity to seize data by exploiting weaknesses in your defences...
PDF Version
CEOs in the firing line
Why you can't rely on others to get your Public Key Infrastructure in order - and what happens if you don't. Andrew Jenkinson, Group CEO, Cybersec Innovation Partners, offers his insights...
Click here for the full contents...
January-February - Featuring
Editor's Comment:According to a new industry report, one out of every three enterprises is sending its employees to work in challenging conditions without the latest available equipment and technology...
PDF Version
Putting business at peril
Kyle Chrzanowski, AT&T Cybersecurity Consultant, looks at the dangers of tech advancement without the insurance of security risk assessment...
Click here for the full contents...
2019 Issues
November-December - Featuring
Editor's Comment:In yet another high-profile and worrying instance of phishing in action, the United Nations has been made aware of various correspondences, being circulated via e-mail, from Internet web sites...
PDF Version
Riding the learning curve
Facebook has suffered a succession of serious data leaks that have left customer data worryingly exposed. The company's past promises to reform its processes and protect these precious assets...
Click here for the full contents...
September-October - Featuring
Editor's Comment:Some 73% of chief information and security officers (CISOs) of financial institutions plan to ask their organisations' chief financial officer for an increase in cybersecurity investments in the next year...
PDF Version
Riding the learning curve
Artificial Intelligence (AI) applies Machine Learning, deep learning and other techniques to solve actual problems. But there are downsides, too...
Click here for the full contents...
July-August - Featuring
Editor's Comment:I note that a new report (yes, I know - how many more can there be!) is claiming to serve as a reality check on digital transformation by outlining where organisations actually are in the process...
PDF Version
The state we're in
It isn't just the energy sector, communications and industrial organisations that are at risk of attack from nation state and other malicious actors...
Click here for the full contents..
May-June - Featuring
Editor's Comment:It is deeply concerning to hear that universities' high-value data can be obtained by hackers in less than two hours - concerning, though not surprising...
PDF Version
Think like an Attacker: A strategic risk-based approach to cyber security
Occurrences of data theft, corporate reputational damage, cybercrime, state-sponsored actors and hacktivists would fill several volumes...
Click here for the full contents..
Mar-Apr - Featuring
Editor's Comment:It seems that organisations are struggling to keep their cybersecurity workforce fully staffed, as competitors increasingly pick off employees enticed by higher pay and bonuses...
PDF Version
Future imperfect
In Part 2 of our coverage of top predictions for cybersecurity in 2019, we offer further expert insights and future-gazing from those in the know
Click here for the full contents..
Jan-Feb - Featuring
Editor's Comment:Security web scans and analysis on over 80,000 European Magento websites - the most popular e-commerce platform globally...
PDF Version
Brought down to earth
Cybercriminals who carried out a hack on British Airways compromised the data of around 380,000 passengers
Click here for the full contents..
2018 Issues
November-December - Featuring
Editor's Comment:Following a recent spate of aggressive phishing attacks on NHSmail - the email service approved by the Department of Health and Social Care...
PDF Version
9 million Brits fall victim to cybercrime
Consumers increasingly feel companies should be responsible for protecting victims - but is that simply surrendering responsibility?
Click here for the full contents..
September-October - Featuring
Editor's Comment:When I misplace something - phone, house keys, bank card etc - it tends not to have devastating consequences for thousands of other people...
PDF Version
Education, Education, Education - And Phishing!
An organisation's worst enemy can still be its staff when it comes phishing attacks
Click here for the full contents..
July-August - Featuring
Editor's Comment: It would appear that many leading websites, including Amazon and Wikipedia, are failing to support users with advice on how to securely protect their data...
PDF Version
Full-on visibility
When fast-growing company HubSpot needed to gain better visibility of devices on their network and track down potential malicious activity, it turned to ForeScout
Click here for the full contents..
May-June - Featuring
Editor's Comment: Every NHS trust that has been tested against cyber security standards since 2017's WannaCry attack has failed, NHS Digital has revealed, with plans...
PDF Version
Sun or rain, bring it on!
Is the cloud right for everyone? That, says one leading observer, is the wrong question. "Like any evolutionary development, it's our current reality."
Click here for the full contents..
Mar-Apr - Featuring
Editor's Comment: A new and deeply disturbing report from Big Brother Watch reveals that UK councils are severely unprepared for cybersecurity threats, with 25%...
PDF Version
Deadly game of Hide 'n' Seek
Bitdefender researchers have uncovered an emerging botnet that uses advanced communication techniques to exploit victims and build its infrastructure
Click here for the full contents..
Jan-Feb - Featuring
Editor's Comment: It is worrying to hear that some UK banks still aren't telling regulators about all the cyber-attacks wreaked on the financial services industry...
PDF Version
Hacking on the cheap
A team of experts bypassed an iPhone's fingerprint sensor and manipulated facial and voice recognition security systems on various banking apps.
Click here for the full contents..
2017 Issues
Nov-Dec - Featuring
Editor's Comment: The breach of the Appleby law firm, now dubbed the 'Paradise Papers', has seen a raft of salacious information pour out into the public domain...
PDF Version
Mighty storm unleashed
New cyber-storm clouds are gathering, threatening even more potential damage than the fearsome Mirai botnet of 2016
Click here for the full contents..
Sept-Oct - Featuring
Editor's Comment:I note that the Institute of Information Security Professionals (IISP) has released the first IISP Knowledge Framework as part of its commitment...
PDF Version
Pragmatism and computing security
Rodolfo Saccani, Libraesva Security R&D manager, outlines the benefits of a pragmatic approach to email security
Click here for the full contents..
July-August - Featuring
Editor's Comment:A total of 69% of board-level executives are neglecting to ensure the UK businesses they run will comply with the General Data Protection Regulation (GDPR...
PDF Version
Torn by tough choices
Organisations face a dichotomy - while mobile technology brings operational benefits, it also introduces the compromise of network security...
Click here for the full contents..
May-June - Featuring
Editor's Comment:Should we be surprised by the news that one in five businesses have fallen victim to cyber attacks in the past year - or is this now almost a given?...
PDF Version
Mass data breaches eliminated
Panoptex Technologies is a software company out of the U.S. that's making waves by providing an industry first: a massive scale NoSQL database...
Click here for the full contents..
March-April - Featuring
Editor's Comment:The recent revelation (in a blog) by security researcher Troy Hunt that data from CloudPets teddy bears was being leaked and ransomed online...
PDF Version
Malware malevolence
The average data breach results in a cost of $158 per stolen record and is often not detected for an average of 229 days, it is estimated.
Click here for the full contents..
Jan-Feb - Featuring
Editor's Comment:It is a mark of the times we live in that a new line-up of cybersecurity degrees has been launched to help fight hackers and online criminals, as demand for skilled specialists grows...
PDF Version
Time to stop living in fantasy land
National Lottery operator Camelot did not have the greatest of years in 2016. No doubt it took plenty of money, but it also took plenty of flak...
Click here for the full contents..
2016 Issues
Nov-Dec - Featuring
Editor's Comment:The dark web is regarded as a breeding ground for crime - a secretive and murky part of the world wide web that requires special software to gain entry...
PDF Version
Who's afraid of APT?
An advanced persistent threat (APT) uses multiple phases to break into a network, avoid detection and harvest valuable information over the long term...
Click here for the full contents..
Sept-Oct - Featuring
Editor's Comment:The loss or theft of important data over the past two years has been on a staggering scale...
PDF Version
Beyond The Nightmare
Governance, risk and compliance are vitally important, especially as more and more legislation is introduced that could have grave consequences for any enterprise that flouts its rules...
Click here for the full contents..
July-August- Featuring
Editor's Comment:The loss or theft of important data over the past two years has been on a staggering scale....
PDF Version
Battle for Cloud domination
The biggest concern in cloud right now is security. According to Oracle executive chairman Larry Ellison: "We need much better security. We need a next-generation of security...
Click here for the full contents..
May-June - Featuring
Editor's Comment: At a time when too many enterprises are succumbing to cyber attacks and breaches that often leave their businesses badly damaged, even devastated...
PDF Version
After the flood
With mobile devices now seemingly everywhere, and more and more applications pouring into the market, mobile monitoring and device management have never been so vital...
Click here for the full contents..
Mar-Apr - Featuring
Editor's Comment: The top security threats plaguing enterprises over the past year figure prominently in a new report released by Hewlett Packard Enterprise (HPE)...
PDF Version
Upping the ante with anti-malware
Combating malware means going way beyond locating suspicious programs on servers and workstations, and detecting and interfering with the use of malware on the network...
Click here for the full contents..
Jan-Feb - Featuring
Editor's Comment: As we wend our way through the early part of 2016, thoughts inevitably turn to the threat landscape and that niggling worry in the back of the mind...
PDF Version
The race to better cyber security
GCHQ seeks to draw line under UK organisations' poor cyber strategies...
Click here for the full contents..
2015 Issues
Nov-Dec - Featuring
Editor's Comment: Encryption is vital for protecting precious data. But, in the wrong hands, it can be a weapon that is turned upon its owner - with devastating consequences...
PDF Version
CODE RED! An essential guide to protecting your data
How should organisations minimise the likelihood that unauthorised code is able to manipulate applications, in order to access, steal...
Click here for the full contents..
Sept-Oct - Featuring
Editor's Comment: It's alarming to hear that the services used by hundreds of thousands of people � legitimately to protect their identity on the web ...
PDF Version
Chasing away the turbulent clouds
Security skills are in limited supply and, as such, cost and retention of security teams can be a significant challenge. ...
Click here for the full contents..
July-August - Featuring
Editor's Comment: According to a new survey by iStorage, almost a third of public and private sector professionals are not aware of what the forthcoming EU General...
PDF Version
Hand-to-hand combat
How concerned should businesses in the UK be about cyber assaults � are the attackers gaining the upper hand...
Click here for the full contents..
May-June - Featuring
Editor's Comment: Would you consider stripping your employees of company smart phones and memory sticks to protect your business from cyber attacks...
PDF Version
Acunetix Online Vulnerability Scanner
In today's competitive global markets, SMBs need to protect their web sites from hackers just as much as enterprises do, but few have the financial resources...
Click here for the full contents..
Mar-Apr - Featuring
Editor's Comment: Following the recent Anthem breach � where the USA's second largest health insurer was hacked, exposing personal details...
PDF Version
Risk - And Reward
The message is clear: organisations must adopt a more agile risk-based approach to cyber security, if they are to address new challenges at short notice...
Click here for the full contents..
Jan-Feb - Featuring
Editor's Comment: No new year can ever come along without a wealth of security predictions already hanging on tenaciously to its young coat-tails...
PDF Version
Negotiating the more slippery slopes
With the average cost of security breaches to large organisations increasing to between �600k-�1.15m* in the last year...
Click here for the full contents..