Recent Issues
Latest Issue
CS May-Jun 2025
CS Mar-Apr 2025
CS Jan-Feb 2025
CS Nov-Dec 2024
CS Sep-Oct 2024
CS Jul-Aug 2024
CS May-Jun 2024
CS Mar-Apr 2024
CS Jan-Feb 2024
CS Nov-Dec 2023
CS Sep-Oct 2023
CS Jul-Aug 2023
CS May-Jun 2023
CS Mar-Apr 2023
CS Jan-Feb 2023
CS Nov-Dec 2022
CS Sep-Oct 2022
CS Jul-Aug 2022
CS May-Jun 2022
CS Mar Apr 2022
CS Jan Feb 2022
CS Sep-Oct 2021
CS May-Jun 2021
CS Mar-Apr 2021
CS Nov-Dec 2020
CS May-Jun 2020
CS Mar-Apr 2020
CS Jan-Feb 2020
Where fact and fiction...
Review | January 2025
In an era where artificial intelligence can create content indistinguishable...
An honourable quest
Review | September 2024
Cybersecurity has never had an overarching code of ethics and...
BackBox Network Automation Platform...
Product Review | July 2024
As enterprise networks grow in complexity, businesses can no longer...
Portnox Cloud
Product Review | May 2024
Network access control and endpoint security have a mixed reception...
The dark side of...
Review | May 2024
A new book offers a penetrating look into the murky,...
NetAlly CyberScope Air
Product Review | March 2024
When NetAlly launched its CyberScope last year it proudly hailed...
AI - weapon of...
Review | March 2024
AI has become a vast topic of debate: will it...
Inside the revolution
Review | November 2023
A range of powerful technologies is disrupting and transforming every...
Hornetsecurity 365 Permission Manager
Review | November 2023
Microsoft 365 (MS365) is the productivity and communications platform of...
Hornetsecurity Security Awareness Service...
Product Review | October 2023
Cybercriminals never sit still and are always looking for new...
macmon NAC
Product Review | October 2023
macmon's NAC product is designed to be simple to deploy...
ENDACE: ENDACEPROBE CLOUD
Product Review | October 2023
Cloud computing has revolutionised business operations globally, but the ‘shared...
News
Data leak exposes 5.7...
News | August 2025
Cybernews researchers recently uncovered a massive data leak, which was...
Kiteworks expands market reach...
News | August 2025
Kiteworks has acquired Zivver, a secure email platform headquartered in...
Marco Rubio impostor used...
News | August 2025
Artificial Intelligence was employed to impersonate US secretary of state...
Partnering up to tackle...
News | August 2025
Sophos has formed a new partnership with Capsule, a specialist...
JumpCloud Acquires VaultOne
News | August 2025
JumpCloud sees its recent acquisition of VaultOne as a step...
Key appointment at HackerOne...
News | August 2025
HackerOne, a global leader in offensive security solutions, has appointed...
Growing gains
News | August 2025
Advania UK, one of Microsoft's leading partners in Northern Europe,...
Major move in quantum...
News | August 2025
Sir Jeremy Fleming, the former head of GCHQ, has joined...
Hornetsecurity's AI Cyber Assistant...
News | June 2025
Hornetsecurity's AI Cyber Assistant powers two potent new tools as...
SMEs feel the sharp...
News | June 2025
Sophos's Annual Threat Report 2025 highlights the biggest threats unleashed...
New benchmark seeks to...
News | June 2025
ETSI has unveiled its latest technical specification, which aims to...
Atlético shores up its...
News | June 2025
Google Cloud has extended its partnership with Atlético de Madrid,...
AI - Friend or...
Feature | August 2025
AI's transformative power is acknowledged in many quarters, yet these...
Data theft onslaught
Feature | August 2025
Attacks and breaches are showing no sign of easing off...
Health issues
Feature | August 2025
The NHS is a huge and vulnerable target for cyber...
Compliance alliance
Feature | June 2025
The continuing threat of a global trade war, diverging regulations...
Threat levels soar to...
Feature | June 2025
Advanced Persistent Threats (APTs) hit a staggering 43% of all...
Action stations!
Feature | April 2025
What exactly are the essential elements of an incident response...
The insider menace
Feature | April 2025
IAM systems not properly integrated or maintained pose multiple issues,...
Cracking up
Feature | April 2025
Once the first quantum computers are 'live', most of our...
Spreading the message
Feature | April 2025
YEO Messaging has launched YEO for Business, described as a...
New dawn: the golden...
Feature | April 2025
A phishing campaign deliberately generated by IBM engineers took technically...
From maelstrom to mail-storm...
Feature | April 2025
Effective email security demands the selection of the correct products,...
Planning for disaster
Feature | January 2025
Eliminating threats entirely is seeking the impossible. The strategy should...
Interviews
In whom we trust...
Interview | January 2025
Computing Security sat down recently for a fireside chat with...
Inside a hidden world...
Interview | November 2023
Computing Security speaks with Andy Syrewicze, technical evangelist, Hornetsecurity, about...
Welcome to the (third)...
Interview | October 2022
Computing Security recently caught up with Hornetsecurity chief technical officer...
Object Archive software -...
Interview | September 2022
Fujifilm recently launched Object Archive, described as 'an S3-compatible tape...
Perenna - helping to...
Interview Case Study | December 2021
Perenna is creating a bank where mortgages will be funded...
Always at your disposal...
Interview | July 2018
Computer Disposals Ltd (CDL) is one of the UK's leading...
Behind the scenes at...
Interview | September 2017
Significant change is now taking place at Capita Cyber Security....
On your metal!
Case Study | November 2023
When one metal fabrication company suffered several malware attacks, it...
Furness College enjoys 50%...
Case Study | February 2022
In-built ransomware protection enables rapid recovery of individual files and...
Perenna - helping to...
Interview Case Study | December 2021
Perenna is creating a bank where mortgages will be funded...
Helping to redefine the...
Case Study | December 2021
Why Remote Internal Infrastructure...
Case Study | November 2021
“Everything from email servers and internal staff networks, through to...
8am and I.T. is...
Case Study | September 2021
Stark lesson unfolds in the cyber security dangers that are...
Automating identity and access...
Case Study | October 2020
One Identity partners have helped Jumbo Supermarkets to maximise its...
Profits and Pitfalls
Case Study | June 2020
Well-crafted social media content can deliver a multitude of benefits....
KnowBe4 Decreases the Risk...
Case Study | June 2020
SIG plc. is a leading wholesale distributor in Europe of...
Securing privileged access for...
Case Study | June 2020
Prosegur uses RPA to transform its business while reducing the...
Leading the charge
Case Study | May 2020
How savvy businesses have successfully flipped the digital switch
Regional U.S. Credit Union...
Case Study | May 2020
Many U.S. states have shut down most non-essential industries, religious...
Power hungry
Research | November 2024
AI's appetite for electricity is putting pressure on power grids,...
Why orphaned data is...
Research | October 2023
Daniel Hofmann, CEO at Hornetsecurity, looks at the sizable threat...
Cyber risk response grabs...
Research | February 2023
Gartner research shows that 88% of boards now regard cybersecurity...
Why ransomware is 'moving...
Research | December 2022
Signs of a new data extortion technique show threat actors...
Top 8 security and...
Research | December 2021
Global analysis and research company Gartner pinpoints where the greatest...
Cyber strategy hits critical...
Research | March 2021
Cyber security has never had more relevance, when set against...
Ransomware soars
Research | May 2020
Working from home can make IT systems far more susceptible...
Who can you really...
Research | July 2019
Those who rely on their online bank to keep their...
Sealing off the breach...
Research | May 2019
A major cyber security breaches survey of UK businesses and...
Printer hacking in the...
Research | January 2019
Print and be damned? If the right security measures aren't...
NHS breach - the...
Research | November 2018
The WannaCry attack that hit the NHS last year, is...
The million pound gamble...
Research | November 2018
New research reveals that UK businesses would have to spend...
Defending as one
Awards Winner | January 2025
The Security Project of the Year winner at the 2024...
The Computing Security Awards...
Awards | December 2024
WINNER: Metacompliance
The Computing Security Awards...
Awards | December 2024
WINNER: Cybaverse
The Computing Security Awards...
Awards | December 2024
WINNER: RedKey USB - Redkey USB Enterprise Edition
The Computing Security Awards...
Awards | December 2024
WINNER: VIPRE Security Group - VIPRE EDR+MDR
The Computing Security Awards...
Awards | December 2024
WINNER: Socura with CymruSoc
The Computing Security Awards...
Awards | December 2024
WINNER: NetAlly - Cyberscope Air
The Computing Security Awards...
Awards | December 2024
WINNER: Gigacycle
The Computing Security Awards...
Awards | December 2024
WINNER: MTI
The Computing Security Awards...
Awards | December 2024
WINNER: Arctera - Simon Jelley, GM & VP of Product
The Computing Security Awards...
Awards | December 2024
WINNER: NGS - Rob Jeffery, CTO
The Computing Security Awards...
Awards | December 2024
WINNER: MTI - Kevin Foster, Senior IT Security Consultant
Opinions
Don't let fear hinder...
Opinion | September 2024
Steve Mellings of ADISA makes the case for why the...
Is AI already beyond...
Opinion | March 2024
We invited consultancy and implementation agency WeAreBrain to give us...
What to do when...
Opinion | May 2023
How do hackers get inside an organisation's defences? Is it...
The dystopian world of...
Opinion | December 2022
BBC's recent drama, 'The Capture', was an alarming take on...
How sensitive is your...
Opinion | October 2022
Keeping track of stored data is a complex, difficult task....
Power vacuum
Opinion | August 2022
Cyber Power may well be a vital component in protecting...
2022: Where Packet Capture...
Opinion | May 2022
In today's rapidly changing threat landscape, why aren't more companies...
7 Reasons why SecurEnvoy...
Opinion | May 2022
The summer of 2020 saw Microsoft roll out Azure AD...
Getting to the heart...
Opinion | April 2022
Top companies now use a raft of tools and software...
Essential grains of truth...
Opinion | February 2022
"If you can't get the basics right, it doesn't matter...
How to protect business...
Opinion | September 2021
Carmen Oprita, manager sales and business development at Endpoint Protector...
Working from home -...
Opinion | March 2021
COVID-19 has been with us now for almost a year...
New cyber laws must...
Technology Focus | August 2025
MPs show widespread support for stronger cyber laws, along with...
Quantum quakes
Technology Focus | August 2025
The incredible processing power and speed of quantum computers significantly...
Quantum blast-off
Technology | August 2025
The battle to beat the hackers will be fought in...
Adore DORA or not,...
Technology Focus | April 2025
The Digital Operational Resilience Act (DORA) has a wide remit....
Casting an ugly shadow...
Technology Focus | November 2024
What are the risks associated with Shadow IT/AI? Is it...
Face off!
Technology | May 2024
When it comes to device-based and server-based facial authentication, which,...
Put to the test...
Technology Focus | March 2024
With penetration testing used to identify the level of technical...
A world apart
Technology Focus | August 2022
Interest in the metaverse is on the up, but is...
Steering on the safe...
Technology Focus | August 2022
Autonomous vehicles are increasingly making headlines and not always for...
Quantum goes big!
Technology Focus | May 2022
BT and Toshiba launch first commercial trial of quantum secured...
Hacking gets backing!
Technology Focus | May 2022
University ethical challenge platform wins government backing to prepare for...
Facing up to the...
Technology | February 2022
Facial recognition technology, behavioural biometrics, biometric authentication, homomorphic encryption and...
Gaping holes around compliance...
Comment | August 2025
Significant gaps in CMMC 2.0 preparedness have been identified across...
Data leak exposes 5.7...
News | August 2025
Cybernews researchers recently uncovered a massive data leak, which was...
Kiteworks expands market reach...
News | August 2025
Kiteworks has acquired Zivver, a secure email platform headquartered in...
Marco Rubio impostor used...
News | August 2025
Artificial Intelligence was employed to impersonate US secretary of state...
Partnering up to tackle...
News | August 2025
Sophos has formed a new partnership with Capsule, a specialist...
JumpCloud Acquires VaultOne
News | August 2025
JumpCloud sees its recent acquisition of VaultOne as a step...
Key appointment at HackerOne...
News | August 2025
HackerOne, a global leader in offensive security solutions, has appointed...
Seven-year itch
Industry Focus | August 2025
Compliance is no longer just a legal requirement - it's...
AI - Friend or...
Feature | August 2025
AI's transformative power is acknowledged in many quarters, yet these...
Data theft onslaught
Feature | August 2025
Attacks and breaches are showing no sign of easing off...
NHS cash injection can't...
Comment | August 2025
The NHS received a record cash investment in the UK...
New cyber laws must...
Technology Focus | August 2025
MPs show widespread support for stronger cyber laws, along with...