Recent Issues
Latest Issue
CS Mar-Apr 2020
CS Jan-Feb 2020
CS Nov-Dec 2019
HORNETSECURITY 365 TOTAL PROTECTION
Product Review | November 2020
Microsoft 365 is by far the most prevalent cloud email...
Cybereason Mobile
Product Review | November 2020
The coronavirus pandemic and its continuing impact have changed the...
Flowmon Anomaly Detection System...
Review | March 2020
Traditional security tools, often signature based, can be very effective...
Cloud Protection for Salesforce...
Review | March 2020
Cloud-based services have caught on fast, offering a range of...
VIPRE SafeSend
Review | January 2020
In today's highly pressured work environments, it really is all...
R&S Cloud Protector from...
Review | January 2020
The case for website and web application protection is well...
Kingston Technology IronKey D300S...
Review | January 2020
With the EU GDPR (General Data Protection Regulation) now in...
Enterprise-wide Network Segmentation with...
Review | January 2020
Network segmentation is increasing in popularity, as it is proving...
baramundi Management Suite 2019...
Review | January 2020
Enterprises struggling to manage and secure their desktops and mobiles...
SecurEnvoy SecureIdentity DLP
Review | September 2019
SecurEnvoy is a pioneer in the field of multi-factor authentication...
Libraesva Email Archiver
Review | September 2019
Email is still the dominant form of communication in the...
edgescan
Review | September 2019
As cybercriminals become ever more inventive, enterprises must look for...
News
Flaws leave Cisco devices...
News | November 2020
Three vulnerabilities in Cisco Security Manager – a tool used...
Battling for the best...
News | November 2020
New research suggests many organisations struggle to obtain high-quality threat...
Panorays joins ServiceNow Partner...
News | November 2020
New integration allows Panorays customers to receive third-party security risk...
R&S Trusted VPN Client...
News | November 2020
R&S Trusted VPN Client is said to allow users to...
£18.4 million data breach...
News | November 2020
The UK's data privacy watchdog has fined the Marriott Hotels...
‘Home alone’ execs more...
News | November 2020
A request for a £350,000 payment was approved by...
Serious vulnerability in Jira...
News | November 2020
Positive Technologies expert Mikhail Klyuchnikov has discovered a vulnerability in...
Call goes out for...
News | November 2020
A worrying spike in cyber-attacks has been taking place against...
COVID – new driver...
News | November 2020
The threat of fines, not FUD – fear, uncertainty and...
BA data breach fine...
News | November 2020
The Information Commissioner’s Office (ICO) recently fined British Airways £20m...
Massive data breach
News | November 2020
Yet another tech company has suffered a major data breach,...
Fightback against endpoint and...
News | November 2020
Organisations are retaliating against risk exposure by investing in key...
HACKERS FOR HIRE
Feature | November 2020
Hacker for hire groups are on the rampage globally, leaving...
SMISH, SMASH, BASH!
Feature | November 2020
A relatively new spin on phishing has entered the lexicon,...
Remote workers targeted
Feature | May 2020
Attackers look to exploit any weakness. Now, as an added...
More 20/20 visions
Feature | March 2020
As cyber anxiety manifests itself ever more widely, Part 2...
Cybercrime figures 'tip of...
Feature | March 2020
A reported fall in 'computer misuse' disguises a link with...
Rich vein of possibilities...
Feature | March 2020
Hitachi and Ubisecure are joining forces to integrate their finger...
A failure to protect...
Feature | November 2019
Facebook has suffered a succession of serious data leaks that...
Caught in the cross-hairs...
Feature | September 2019
Ethical hackers can storm through the defences of educational institutions...
Smoke - with plenty...
Feature | September 2019
When a ransomware attack takes place, losses can be measured...
The spies inside your...
Feature | September 2019
Unprotected emails can leave us open to exploitation on a...
Put to the test...
Feature | September 2019
The rise of biometrics has brought a rise in hackers...
Riding the learning curve...
Feature | September 2019
Artificial Intelligence (AI) applies Machine Learning, deep learning and other...
Interviews
Always at your disposal...
Interview | July 2018
Computer Disposals Ltd (CDL) is one of the UK's leading...
Behind the scenes at...
Interview | September 2017
Significant change is now taking place at Capita Cyber Security....
Automating identity and access...
Case Study | October 2020
One Identity partners have helped Jumbo Supermarkets to maximise its...
Profits and Pitfalls
Case Study | June 2020
Well-crafted social media content can deliver a multitude of benefits....
Securing privileged access for...
Case Study | June 2020
Prosegur uses RPA to transform its business while reducing the...
KnowBe4 Decreases the Risk...
Case Study | June 2020
SIG plc. is a leading wholesale distributor in Europe of...
Regional U.S. Credit Union...
Case Study | May 2020
Many U.S. states have shut down most non-essential industries, religious...
Leading the charge
Case Study | May 2020
How savvy businesses have successfully flipped the digital switch
New College Oxford
Case Study | December 2019
Situated in the very heart of the city, New College...
MERTHYR TYDFIL COUNTY BOROUGH...
Case Study | September 2019
Merthyr Tydfil County Borough Council (MTCBC) has worked in partnership...
ALTODIGITAL NETWORKS LTD
Case Study | September 2019
Red Team Assessment
Case Study | March 2019
Bridewell Consulting were engaged by a financial services organization were...
Tailored service - outstanding...
Case Study | November 2018
A FTSE 100 luxury goods retailer, headquartered in London with...
Award winning managed SOC...
Case Study | October 2018
CLIENT BACKGROUND
A FTSE 100 luxury goods retailer, headquartered in London,...
Opinions
Access angst
Opinion | May 2020
When company employees are forced to start working remotely, they...
Remote workers targeted
Opinion | May 2020
Attackers have been quick to seek out ways of exploiting...
Essential building blocks
Opinion | March 2020
From Network Access Control (NAC) to Network Segmentation, addressing the...
The plot thickens
Opinion | March 2020
What chance secure data management might have altered the outcomes...
Invoice Fraud and Business...
Opinion | January 2020
By Dr Debbie Garside, Group Chief Innovation Scientist/CEO GeoLang, The...
The ramifications of misaddressed...
Opinion | January 2020
With the number and sophistication of cyber attacks increasing significantly,...
Cybersecurity in 2020: Key...
Opinion | December 2019
Cybersecurity is a global concern. From the smallest business up...
Enterprise Mobile Security: How...
Opinion | December 2019
Tom Davison, EMEA Technical Director at Lookout examines how modern...
Think before you click...
Opinion | December 2019
Human error is always going to be a major factor...
Eliminating wastage
Opinion | November 2019
A thorough risk assessment is essential when deciding where security...
Figuring out the figures!...
Opinion | September 2019
What are the potential hidden costs of deploying multi-factor authentication?...
Bring your devices, not...
Opinion | September 2019
When staff bring their own devices into work, security can...
Security Company of the...
Awards | November 2019
WINNER: Brookcourt Solutions
The ‘One to Watch’...
Awards | November 2019
WINNER: Adarma
The Contribution to CyberSecurity...
Awards | November 2019
WINNER: Debbie Garside
Threat Intelligence Award -...
Awards | November 2019
WINNER: Webroot
Editors Choice - Computing...
Awards | November 2019
WINNER: Computer Disposals
Cloud-Delivered Security Solution of...
Awards | November 2019
WINNER: SecurEnvoy
Security Project of the...
Awards | November 2019
WINNER: ABAX/KnowBe4
Security Project of the...
Awards | November 2019
WINNER: Stop the Traffik/Cyjax
Security Project of the...
Awards | November 2019
WINNER: King Edward V11’s Hospital/Redscan
The Customer Service Award...
Awards | November 2019
WINNER: Endace
Enterprise Security Solution of...
Awards | November 2019
WINNER: My1Login
SME Security Solution of...
Awards | November 2019
WINNER: Redscan
Ransomware soars
Research | May 2020
Working from home can make IT systems far more susceptible...
Who can you really...
Research | July 2019
Those who rely on their online bank to keep their...
Sealing off the breach...
Research | May 2019
A major cyber security breaches survey of UK businesses and...
Printer hacking in the...
Research | January 2019
Print and be damned? If the right security measures aren't...
The million pound gamble...
Research | November 2018
New research reveals that UK businesses would have to spend...
NHS breach - the...
Research | November 2018
The WannaCry attack that hit the NHS last year, is...
Time for a deep...
Research | July 2018
In our hyper-connected, technology-driven world, data breaches and cyber-attacks remain...
Backup confidence on the...
Research | July 2018
In all of the doom and gloom that often dominates...
The dark destroyers
Research | March 2018
Over one million leaked and hacked credentials found on the...
Council of War
Research | March 2018
A new and deeply disturbing report from Big Brother Watch...
Deadly game of Hide...
Research | March 2018
Bitdefender researchers have uncovered an emerging botnet that uses advanced...
Encrypted USB-drives - ...
Research | July 2017
USB drives are a 'faithful companion' in our professional lives,...
SHATTERED TRUST
Technology Focus | November 2020
A user of a popular health app was inadvertently able...
Off the beaten track...
Technology Focus | May 2020
Contact tracing apps could be one of the keys to...
Malware menace
Technology Focus | May 2020
A privacy-first browser combining a built-in VPN with complete encryption,...
The Quantum crypto revolution...
Technology Focus | March 2020
Commercially available encryption systems are already with us and their...
Clever thinking
Technology | May 2019
Gaining insight into every incoming threat is invaluable to a...
Flaws leave Cisco devices...
News | November 2020
Three vulnerabilities in Cisco Security Manager – a tool used...
OPEN-AND-SHUT CASE
Masterclass | November 2020
Being open to ethical disclosure is vital, states Paul Ritchie,...
HORNETSECURITY 365 TOTAL PROTECTION
Product Review | November 2020
Microsoft 365 is by far the most prevalent cloud email...
Cybereason Mobile
Product Review | November 2020
The coronavirus pandemic and its continuing impact have changed the...
BEYOND THE EU-US PRIVACY...
| November 2020
A new ruling has shaken up how the EU and...
HITTING THE SWEET SPOT...
| November 2020
Digital transformation in the cyber-security sector is forecast to be...
TIME TO REBALANCE THE...
Special Focus | November 2020
Awareness around gender diversity in the cyber security industry is...
THE GOOD… AND THE...
Industry Survey | November 2020
Lack of clarity around certain new technologies is hitting many...
HACKERS FOR HIRE
Feature | November 2020
Hacker for hire groups are on the rampage globally, leaving...
BRAKING BAD!
| November 2020
Car owners could be putting their personal data at risk...
WE HAVE CONTACT
Analysis | November 2020
There is an increasing reliance on data-driven technologies to help...
The New Order
Industry View | November 2020
Is now the perfect time to get your (I.T.) house...