Recent Issues
Latest Issue
CS Mar Apr 2022
CS Jan Feb 2022
CS Sep-Oct 2021
CS May-Jun 2021
CS Mar-Apr 2021
CS Nov-Dec 2020
CS May-Jun 2020
CS Mar-Apr 2020
CS Jan-Feb 2020
Hornetsecurity 365 Total Protection
Product Review | April 2022
The concerted move to home and hybrid working practices has...
Redkey USB
Product Review | October 2021
With all the focus on cybercriminals and internet attacks, it's...
Zivver Secure Email
Product Review | October 2021
Email is responsible for the majority of data breaches -...
Wandera Private Access
Review | March 2021
The COVID-19 crisis will continue to have a lasting impact...
Cybereason Mobile
Product Review | November 2020
The coronavirus pandemic and its continuing impact have changed the...
Hornetsecurity 365 Total Protection
Product Review | November 2020
Microsoft 365 is by far the most prevalent cloud email...
Cloud Protection for Salesforce...
Review | March 2020
Cloud-based services have caught on fast, offering a range of...
Flowmon Anomaly Detection System...
Review | March 2020
Traditional security tools, often signature based, can be very effective...
baramundi Management Suite 2019...
Review | January 2020
Enterprises struggling to manage and secure their desktops and mobiles...
Enterprise-wide Network Segmentation with...
Review | January 2020
Network segmentation is increasing in popularity, as it is proving...
Kingston Technology IronKey D300S...
Review | January 2020
With the EU GDPR (General Data Protection Regulation) now in...
R&S Cloud Protector from...
Review | January 2020
The case for website and web application protection is well...
News
Education sector bombarded by...
News | April 2022
University College London faced almost 60 million malicious email attacks...
Musk’s $44 billion Twitter...
News | April 2022
Social media platform’s algorithm could go open source, while mission...
Egress names CISO to...
News | April 2022
Robin Bell to partner with customers and advance security strategy
One in three...
News | April 2022
Study pinpoints dire state of European cyberthreats
What war in Ukraine...
News | April 2022
University professor fears Russia’s invasion will unleash cyber nightmare
Top court rules against...
News | April 2022
Ongoing saga over data retention in Europe likely to continue,...
New malware needs 30...
News | April 2022
Qbot has returned with a vengeance delivering speed-of-light attacks
Governments are 'ransomware's next...
News | April 2022
A sustained meteoric rise in ransomware is identified in a...
Cloudflare swoops in to...
News | April 2022
Cloudflare has acquired Vectrix, a provider of one-click visibility and...
The cyberthreat HEAT is...
News | April 2022
Menlo Security has identified a surge in cyberthreats, termed Highly...
Adarma research findings reveal...
News | April 2022
UK independent cyber threat management company Adarma has released research...
Return to the office...
News | April 2022
IT departments must weigh up risks of employees reconnecting their...
The cloud conundrum
Feature | April 2022
Cloud, in its various shapes, is often hailed as the...
Logjam of concerns
Feature | April 2022
Log4shell is a critical vulnerability in the widely used logging...
Virtual world, real danger...
Feature | April 2022
The metaverse is a virtual reality world characterised by a...
The MSP attack target...
Feature | April 2022
Managed services providers are quickly overtaking their customers as a...
NHS breaches - just...
Feature | April 2022
What will it take to stop the countless hacks on...
The never-ending nightmare
Feature | March 2022
Ransomware hackers have the power not just to take files,...
Beware the ticking clock...
Feature | March 2022
Use of deep fake tech, 'killerware', ransomware and insider threats...
Skilling up the UK...
Feature | February 2022
Lack of cyber talent hits critical point as threat actors...
Threat landscape alive and...
Feature | February 2022
More than a third of security technologies used by organisations...
The relentless rise of...
Feature | December 2021
Stealth attacks to infiltrate networks and steal data are soaring....
2022: where will it...
Feature | December 2021
We asked several industry observers to give us their top...
To pay or not...
Feature | October 2021
Paying ransomware is a topic that greatly divides opinion. Cold...
Interviews
Perenna - helping to...
Interview Case Study | December 2021
Perenna is creating a bank where mortgages will be funded...
Always at your disposal...
Interview | July 2018
Computer Disposals Ltd (CDL) is one of the UK's leading...
Behind the scenes at...
Interview | September 2017
Significant change is now taking place at Capita Cyber Security....
Furness College enjoys 50%...
Case Study | February 2022
In-built ransomware protection enables rapid recovery of individual files and...
Perenna - helping to...
Interview Case Study | December 2021
Perenna is creating a bank where mortgages will be funded...
Helping to redefine the...
Case Study | December 2021
Why Remote Internal Infrastructure...
Case Study | November 2021
“Everything from email servers and internal staff networks, through to...
8am and I.T. is...
Case Study | September 2021
Stark lesson unfolds in the cyber security dangers that are...
Automating identity and access...
Case Study | October 2020
One Identity partners have helped Jumbo Supermarkets to maximise its...
Profits and Pitfalls
Case Study | June 2020
Well-crafted social media content can deliver a multitude of benefits....
KnowBe4 Decreases the Risk...
Case Study | June 2020
SIG plc. is a leading wholesale distributor in Europe of...
Securing privileged access for...
Case Study | June 2020
Prosegur uses RPA to transform its business while reducing the...
Leading the charge
Case Study | May 2020
How savvy businesses have successfully flipped the digital switch
Regional U.S. Credit Union...
Case Study | May 2020
Many U.S. states have shut down most non-essential industries, religious...
New College Oxford
Case Study | December 2019
Situated in the very heart of the city, New College...
Top 8 security and...
Research | December 2021
Global analysis and research company Gartner pinpoints where the greatest...
Cyber strategy hits critical...
Research | March 2021
Cyber security has never had more relevance, when set against...
Ransomware soars
Research | May 2020
Working from home can make IT systems far more susceptible...
Who can you really...
Research | July 2019
Those who rely on their online bank to keep their...
Sealing off the breach...
Research | May 2019
A major cyber security breaches survey of UK businesses and...
Printer hacking in the...
Research | January 2019
Print and be damned? If the right security measures aren't...
NHS breach - the...
Research | November 2018
The WannaCry attack that hit the NHS last year, is...
The million pound gamble...
Research | November 2018
New research reveals that UK businesses would have to spend...
Backup confidence on the...
Research | July 2018
In all of the doom and gloom that often dominates...
Time for a deep...
Research | July 2018
In our hyper-connected, technology-driven world, data breaches and cyber-attacks remain...
Deadly game of Hide...
Research | March 2018
Bitdefender researchers have uncovered an emerging botnet that uses advanced...
Council of War
Research | March 2018
A new and deeply disturbing report from Big Brother Watch...
Computing Security Awards hit...
Awards | December 2021
December 2021 was a momentous month for all involved in...
Computing Security Awards hit...
Awards | December 2021
'Back in the room' live to great fanfare - and...
The Computing Security Awards...
Awards | December 2021
Winner: Libraesva - Email Security Gateway
The Computing Security Awards...
Awards | December 2021
Winner: Watchguard - Panda AD360
The Computing Security Awards...
Awards | December 2021
Winner: Kroll
The Computing Security Awards...
Awards | December 2021
Winner: Endace - EndaceProbe Analytics Platform
The Computing Security Awards...
Awards | December 2021
Winner: Hornetsecurity - Advanced Threat Protection
The Computing Security Awards...
Awards | December 2021
Winner: Veritas - BackUp Exec 21
The Computing Security Awards...
Awards | December 2021
Winner: Xcina Consulting
The Computing Security Awards...
Awards | December 2021
Winner: Heimdal Security - Heimdal Threat Prevention
The Computing Security Awards...
Awards | December 2021
Winner: SecurEnvoy - SecureIdentity Identity and Access Management
The Computing Security Awards...
Awards | December 2021
Winner: Metacompliance - MetaPhish
Opinions
Getting to the heart...
Opinion | April 2022
Top companies now use a raft of tools and software...
Essential grains of truth...
Opinion | February 2022
"If you can't get the basics right, it doesn't matter...
How to protect business...
Opinion | September 2021
Carmen Oprita, manager sales and business development at Endpoint Protector...
Working from home -...
Opinion | March 2021
COVID-19 has been with us now for almost a year...
Remote workers targeted
Opinion | May 2020
Attackers have been quick to seek out ways of exploiting...
Access angst
Opinion | May 2020
When company employees are forced to start working remotely, they...
The plot thickens
Opinion | March 2020
What chance secure data management might have altered the outcomes...
Essential building blocks
Opinion | March 2020
From Network Access Control (NAC) to Network Segmentation, addressing the...
The ramifications of misaddressed...
Opinion | January 2020
With the number and sophistication of cyber attacks increasing significantly,...
Invoice Fraud and Business...
Opinion | January 2020
By Dr Debbie Garside, Group Chief Innovation Scientist/CEO GeoLang, The...
Think before you click...
Opinion | December 2019
Human error is always going to be a major factor...
Enterprise Mobile Security: How...
Opinion | December 2019
Tom Davison, EMEA Technical Director at Lookout examines how modern...
Facing up to the...
Technology | February 2022
Facial recognition technology, behavioural biometrics, biometric authentication, homomorphic encryption and...
Quantum leaps - and...
Technology Focus | September 2021
Quantum computers will soon smash through the mathematical cryptography we...
SHATTERED TRUST
Technology Focus | November 2020
A user of a popular health app was inadvertently able...
Malware menace
Technology Focus | May 2020
A privacy-first browser combining a built-in VPN with complete encryption,...
Off the beaten track...
Technology Focus | May 2020
Contact tracing apps could be one of the keys to...
The Quantum crypto revolution...
Technology Focus | March 2020
Commercially available encryption systems are already with us and their...
Clever thinking
Technology | May 2019
Gaining insight into every incoming threat is invaluable to a...
Education sector bombarded by...
News | April 2022
University College London faced almost 60 million malicious email attacks...
Musk’s $44 billion Twitter...
News | April 2022
Social media platform’s algorithm could go open source, while mission...
Egress names CISO to...
News | April 2022
Robin Bell to partner with customers and advance security strategy
One in three...
News | April 2022
Study pinpoints dire state of European cyberthreats
What war in Ukraine...
News | April 2022
University professor fears Russia’s invasion will unleash cyber nightmare
Top court rules against...
News | April 2022
Ongoing saga over data retention in Europe likely to continue,...
The cloud conundrum
Feature | April 2022
Cloud, in its various shapes, is often hailed as the...
Altering the balance of...
Comment | April 2022
There is still a clear lack of diversity and inclusion...
Call for help prompts...
Special Focus | April 2022
A team of experts has been set up to help...
ESET and Intel join...
Industry Focus | April 2022
Move aims to enhance endpoint security with hardware-based ransomware detection
Getting to the heart...
Opinion | April 2022
Top companies now use a raft of tools and software...
Hornetsecurity 365 Total Protection
Product Review | April 2022
The concerted move to home and hybrid working practices has...