Recent Issues
Latest Issue
CS Mar Apr 2022
CS Jan Feb 2022
CS Sep-Oct 2021
CS May-Jun 2021
CS Mar-Apr 2021
CS Nov-Dec 2020
CS May-Jun 2020
CS Mar-Apr 2020
CS Jan-Feb 2020
Endace EndaceProbe 9200 G4
Review | May 2022
Packet capture is an essential tool for SecOps and NetOps...
Hornetsecurity 365 Total Protection
Product Review | April 2022
The concerted move to home and hybrid working practices has...
Redkey USB
Product Review | October 2021
With all the focus on cybercriminals and internet attacks, it's...
Zivver Secure Email
Product Review | October 2021
Email is responsible for the majority of data breaches -...
Wandera Private Access
Review | March 2021
The COVID-19 crisis will continue to have a lasting impact...
Cybereason Mobile
Product Review | November 2020
The coronavirus pandemic and its continuing impact have changed the...
Hornetsecurity 365 Total Protection
Product Review | November 2020
Microsoft 365 is by far the most prevalent cloud email...
Cloud Protection for Salesforce...
Review | March 2020
Cloud-based services have caught on fast, offering a range of...
Flowmon Anomaly Detection System...
Review | March 2020
Traditional security tools, often signature based, can be very effective...
baramundi Management Suite 2019...
Review | January 2020
Enterprises struggling to manage and secure their desktops and mobiles...
Enterprise-wide Network Segmentation with...
Review | January 2020
Network segmentation is increasing in popularity, as it is proving...
Kingston Technology IronKey D300S...
Review | January 2020
With the EU GDPR (General Data Protection Regulation) now in...
News
Thieves through the front...
News | June 2022
92% of IT decision makers fear passwords being stolen
Cyberattacks on the rampage...
News | June 2022
Two in five UK firms have experienced cyberattacks in the...
Colonial Pipeline hack remembered...
News | May 2022
Saturday 7 May 2022 – first anniversary of infamous ransomware
Highly sensitive data put...
News | May 2022
Employee behaviour seen as bigger threat than external hackers
Quantum computing revolution could...
News | May 2022
White House warns agencies to prepare for the worst
Finger on the Pulse...
News | May 2022
New advanced malware prevention software launched by SecureAge Technology
More Zero-Days Exploited Than...
News | May 2022
Massive increase in state-sponsored attacks
Identity-related cybersecurity ‘debt’ leaves...
News | May 2022
Soaring levels of human and machine identities pinpointed in CyberArk...
Education sector bombarded by...
News | April 2022
University College London faced almost 60 million malicious email attacks...
Musk’s $44 billion Twitter...
News | April 2022
Social media platform’s algorithm could go open source, while mission...
Egress names CISO to...
News | April 2022
Robin Bell to partner with customers and advance security strategy
One in three...
News | April 2022
Study pinpoints dire state of European cyberthreats
Isolated and vulnerable
Feature | May 2022
Hackers are driving up the levels of human error by...
Chains of freedom
Feature | May 2022
Supply chains are prone to wild swings and uncertainties. How...
The cloud conundrum
Feature | April 2022
Cloud, in its various shapes, is often hailed as the...
Logjam of concerns
Feature | April 2022
Log4shell is a critical vulnerability in the widely used logging...
Virtual world, real danger...
Feature | April 2022
The metaverse is a virtual reality world characterised by a...
The MSP attack target...
Feature | April 2022
Managed services providers are quickly overtaking their customers as a...
NHS breaches - just...
Feature | April 2022
What will it take to stop the countless hacks on...
The never-ending nightmare
Feature | March 2022
Ransomware hackers have the power not just to take files,...
Beware the ticking clock...
Feature | March 2022
Use of deep fake tech, 'killerware', ransomware and insider threats...
Skilling up the UK...
Feature | February 2022
Lack of cyber talent hits critical point as threat actors...
Threat landscape alive and...
Feature | February 2022
More than a third of security technologies used by organisations...
The relentless rise of...
Feature | December 2021
Stealth attacks to infiltrate networks and steal data are soaring....
Interviews
Perenna - helping to...
Interview Case Study | December 2021
Perenna is creating a bank where mortgages will be funded...
Always at your disposal...
Interview | July 2018
Computer Disposals Ltd (CDL) is one of the UK's leading...
Behind the scenes at...
Interview | September 2017
Significant change is now taking place at Capita Cyber Security....
Furness College enjoys 50%...
Case Study | February 2022
In-built ransomware protection enables rapid recovery of individual files and...
Perenna - helping to...
Interview Case Study | December 2021
Perenna is creating a bank where mortgages will be funded...
Helping to redefine the...
Case Study | December 2021
Why Remote Internal Infrastructure...
Case Study | November 2021
“Everything from email servers and internal staff networks, through to...
8am and I.T. is...
Case Study | September 2021
Stark lesson unfolds in the cyber security dangers that are...
Automating identity and access...
Case Study | October 2020
One Identity partners have helped Jumbo Supermarkets to maximise its...
Profits and Pitfalls
Case Study | June 2020
Well-crafted social media content can deliver a multitude of benefits....
KnowBe4 Decreases the Risk...
Case Study | June 2020
SIG plc. is a leading wholesale distributor in Europe of...
Securing privileged access for...
Case Study | June 2020
Prosegur uses RPA to transform its business while reducing the...
Leading the charge
Case Study | May 2020
How savvy businesses have successfully flipped the digital switch
Regional U.S. Credit Union...
Case Study | May 2020
Many U.S. states have shut down most non-essential industries, religious...
New College Oxford
Case Study | December 2019
Situated in the very heart of the city, New College...
Top 8 security and...
Research | December 2021
Global analysis and research company Gartner pinpoints where the greatest...
Cyber strategy hits critical...
Research | March 2021
Cyber security has never had more relevance, when set against...
Ransomware soars
Research | May 2020
Working from home can make IT systems far more susceptible...
Who can you really...
Research | July 2019
Those who rely on their online bank to keep their...
Sealing off the breach...
Research | May 2019
A major cyber security breaches survey of UK businesses and...
Printer hacking in the...
Research | January 2019
Print and be damned? If the right security measures aren't...
NHS breach - the...
Research | November 2018
The WannaCry attack that hit the NHS last year, is...
The million pound gamble...
Research | November 2018
New research reveals that UK businesses would have to spend...
Backup confidence on the...
Research | July 2018
In all of the doom and gloom that often dominates...
Time for a deep...
Research | July 2018
In our hyper-connected, technology-driven world, data breaches and cyber-attacks remain...
Deadly game of Hide...
Research | March 2018
Bitdefender researchers have uncovered an emerging botnet that uses advanced...
Council of War
Research | March 2018
A new and deeply disturbing report from Big Brother Watch...
Computing Security Awards hit...
Awards | December 2021
December 2021 was a momentous month for all involved in...
Computing Security Awards hit...
Awards | December 2021
'Back in the room' live to great fanfare - and...
The Computing Security Awards...
Awards | December 2021
Winner: Libraesva - Email Security Gateway
The Computing Security Awards...
Awards | December 2021
Winner: Watchguard - Panda AD360
The Computing Security Awards...
Awards | December 2021
Winner: Kroll
The Computing Security Awards...
Awards | December 2021
Winner: Endace - EndaceProbe Analytics Platform
The Computing Security Awards...
Awards | December 2021
Winner: Hornetsecurity - Advanced Threat Protection
The Computing Security Awards...
Awards | December 2021
Winner: Veritas - BackUp Exec 21
The Computing Security Awards...
Awards | December 2021
Winner: Xcina Consulting
The Computing Security Awards...
Awards | December 2021
Winner: Heimdal Security - Heimdal Threat Prevention
The Computing Security Awards...
Awards | December 2021
Winner: SecurEnvoy - SecureIdentity Identity and Access Management
The Computing Security Awards...
Awards | December 2021
Winner: Metacompliance - MetaPhish
Opinions
2022: Where Packet Capture...
Opinion | May 2022
In today's rapidly changing threat landscape, why aren't more companies...
7 Reasons why SecurEnvoy...
Opinion | May 2022
The summer of 2020 saw Microsoft roll out Azure AD...
Getting to the heart...
Opinion | April 2022
Top companies now use a raft of tools and software...
Essential grains of truth...
Opinion | February 2022
"If you can't get the basics right, it doesn't matter...
How to protect business...
Opinion | September 2021
Carmen Oprita, manager sales and business development at Endpoint Protector...
Working from home -...
Opinion | March 2021
COVID-19 has been with us now for almost a year...
Remote workers targeted
Opinion | May 2020
Attackers have been quick to seek out ways of exploiting...
Access angst
Opinion | May 2020
When company employees are forced to start working remotely, they...
The plot thickens
Opinion | March 2020
What chance secure data management might have altered the outcomes...
Essential building blocks
Opinion | March 2020
From Network Access Control (NAC) to Network Segmentation, addressing the...
The ramifications of misaddressed...
Opinion | January 2020
With the number and sophistication of cyber attacks increasing significantly,...
Invoice Fraud and Business...
Opinion | January 2020
By Dr Debbie Garside, Group Chief Innovation Scientist/CEO GeoLang, The...
Quantum goes big!
Technology Focus | May 2022
BT and Toshiba launch first commercial trial of quantum secured...
Hacking gets backing!
Technology Focus | May 2022
University ethical challenge platform wins government backing to prepare for...
Facing up to the...
Technology | February 2022
Facial recognition technology, behavioural biometrics, biometric authentication, homomorphic encryption and...
Quantum leaps - and...
Technology Focus | September 2021
Quantum computers will soon smash through the mathematical cryptography we...
SHATTERED TRUST
Technology Focus | November 2020
A user of a popular health app was inadvertently able...
Malware menace
Technology Focus | May 2020
A privacy-first browser combining a built-in VPN with complete encryption,...
Off the beaten track...
Technology Focus | May 2020
Contact tracing apps could be one of the keys to...
The Quantum crypto revolution...
Technology Focus | March 2020
Commercially available encryption systems are already with us and their...
Clever thinking
Technology | May 2019
Gaining insight into every incoming threat is invaluable to a...
Thieves through the front...
News | June 2022
92% of IT decision makers fear passwords being stolen
Cyberattacks on the rampage...
News | June 2022
Two in five UK firms have experienced cyberattacks in the...
Colonial Pipeline hack remembered...
News | May 2022
Saturday 7 May 2022 – first anniversary of infamous ransomware
Colonial pipeline attack remembered...
Comment | May 2022
Saturday, 7 May, this year marked the first anniversary of...
RansomCloud: How Ransomware ...
Special Focus | May 2022
John Tipton, Senior Security Consultant at Adarma, looks at the...
Get the basics right…...
Industry View | May 2022
The exponential adoption of new cyber security-related tools is a...
Quantum goes big!
Technology Focus | May 2022
BT and Toshiba launch first commercial trial of quantum secured...
2022: Where Packet Capture...
Opinion | May 2022
In today's rapidly changing threat landscape, why aren't more companies...
Hacking gets backing!
Technology Focus | May 2022
University ethical challenge platform wins government backing to prepare for...
If you can't stand...
Industry View | May 2022
… then do something about it. Time to fight back...
All set to ExCeL!...
Events | May 2022
Infosecurity Europe, billed as the biggest gathering of the information...
Isolated and vulnerable
Feature | May 2022
Hackers are driving up the levels of human error by...