Recent Issues
Latest Issue
CS May-Jun 2021
CS Mar-Apr 2021
CS Nov-Dec 2020
CS May-Jun 2020
CS Mar-Apr 2020
CS Jan-Feb 2020
Wandera Private Access
Review | March 2021
The COVID-19 crisis will continue to have a lasting impact...
Cybereason Mobile
Product Review | November 2020
The coronavirus pandemic and its continuing impact have changed the...
Hornetsecurity 365 Total Protection
Product Review | November 2020
Microsoft 365 is by far the most prevalent cloud email...
Cloud Protection for Salesforce...
Review | March 2020
Cloud-based services have caught on fast, offering a range of...
Flowmon Anomaly Detection System...
Review | March 2020
Traditional security tools, often signature based, can be very effective...
baramundi Management Suite 2019...
Review | January 2020
Enterprises struggling to manage and secure their desktops and mobiles...
Enterprise-wide Network Segmentation with...
Review | January 2020
Network segmentation is increasing in popularity, as it is proving...
Kingston Technology IronKey D300S...
Review | January 2020
With the EU GDPR (General Data Protection Regulation) now in...
R&S Cloud Protector from...
Review | January 2020
The case for website and web application protection is well...
VIPRE SafeSend
Review | January 2020
In today's highly pressured work environments, it really is all...
edgescan
Review | September 2019
As cybercriminals become ever more inventive, enterprises must look for...
Libraesva Email Archiver
Review | September 2019
Email is still the dominant form of communication in the...
News
T-Mobile breach not spotted...
Company News | August 2021
Customers now at ‘greater risk of phishing scams’ following the...
Finger on the button...
News | August 2021
Jump in demand for biometric authentication in consumer and enterprise...
Why random thinking works!...
News | August 2021
The National Cyber Security Centre has come up with its...
Fightback against ransomware accelerates...
News | July 2021
6 million-plus people helped to recover their files following attacks
Touched by REvil
News | July 2021
Gang demands huge ransomware fee
Millions of businesses vulnerable...
News | June 2021
Many overwhelmed by sheer volume of security alerts
Massive flaw in library...
News | June 2021
Failure creates significant security risk for software vendors and users
Joint Cyber Unit plan...
News | June 2021
27 EU member countries to coordinate single response to cyber
'Poor collaboration’ between security...
News | June 2021
Failure blamed for holding back digital transformation projects in Europe
Remote working fears undiminished...
News | June 2021
Majority of businesses still have cybersecurity concerns one year into...
Is quantum computing about...
News | May 2021
Experts believe its time may be approaching
Hacked US fuel pipeline...
News | May 2021
Declaration of a state of emergency ‘could become the new...
Cruising for a bruising...
Feature | September 2021
Carnival Cruises suffering four data breaches in 15 months flags...
Cyber agencies flex their...
Feature | September 2021
International allies share details of top 30 vulnerabilities that were...
Fighting the ransomware war...
Feature | September 2021
In the first six months of 2021, global ransomware volume...
The real artificial intelligence...
Feature | June 2021
Can AI help transform the industry, making it sharper, wiser...
What else awaits in...
Feature | June 2021
In part 2 of our glance into the (possible) future,...
Fraud and cybercrime soar...
Feature | June 2021
More than 6,000 cases of Covid-related fraud and cybercrime were...
All-out war
Feature | June 2021
Espionage, fraud and ransomware were the weapons of choice in...
Homing in on the...
Feature | June 2021
Remote working is working! Employers, in the main, have seen...
Through a glass darkly...
Feature | March 2021
We asked several industry commentators for their views on where...
Attacks hit record high...
Feature | March 2021
Cyber security incidents are now outstripping anything that the UK's...
You've got email... breaches...
Feature | March 2021
Misdirected emails have been identified as the UK's top cause...
SMISH, SMASH, BASH!
Feature | November 2020
A relatively new spin on phishing has entered the lexicon,...
Interviews
Always at your disposal...
Interview | July 2018
Computer Disposals Ltd (CDL) is one of the UK's leading...
Behind the scenes at...
Interview | September 2017
Significant change is now taking place at Capita Cyber Security....
8am and I.T. is...
Case Study | September 2021
Stark lesson unfolds in the cyber security dangers that are...
8am and IT is...
Case Study | June 2021
A stark lesson unfolds on the cyber security dangers that...
Automating identity and access...
Case Study | October 2020
One Identity partners have helped Jumbo Supermarkets to maximise its...
Profits and Pitfalls
Case Study | June 2020
Well-crafted social media content can deliver a multitude of benefits....
KnowBe4 Decreases the Risk...
Case Study | June 2020
SIG plc. is a leading wholesale distributor in Europe of...
Securing privileged access for...
Case Study | June 2020
Prosegur uses RPA to transform its business while reducing the...
Leading the charge
Case Study | May 2020
How savvy businesses have successfully flipped the digital switch
Regional U.S. Credit Union...
Case Study | May 2020
Many U.S. states have shut down most non-essential industries, religious...
New College Oxford
Case Study | December 2019
Situated in the very heart of the city, New College...
ALTODIGITAL NETWORKS LTD
Case Study | September 2019
MERTHYR TYDFIL COUNTY BOROUGH...
Case Study | September 2019
Merthyr Tydfil County Borough Council (MTCBC) has worked in partnership...
Red Team Assessment
Case Study | March 2019
Bridewell Consulting were engaged by a financial services organization were...
Cyber strategy hits critical...
Research | March 2021
Cyber security has never had more relevance, when set against...
Ransomware soars
Research | May 2020
Working from home can make IT systems far more susceptible...
Who can you really...
Research | July 2019
Those who rely on their online bank to keep their...
Sealing off the breach...
Research | May 2019
A major cyber security breaches survey of UK businesses and...
Printer hacking in the...
Research | January 2019
Print and be damned? If the right security measures aren't...
NHS breach - the...
Research | November 2018
The WannaCry attack that hit the NHS last year, is...
The million pound gamble...
Research | November 2018
New research reveals that UK businesses would have to spend...
Backup confidence on the...
Research | July 2018
In all of the doom and gloom that often dominates...
Time for a deep...
Research | July 2018
In our hyper-connected, technology-driven world, data breaches and cyber-attacks remain...
Deadly game of Hide...
Research | March 2018
Bitdefender researchers have uncovered an emerging botnet that uses advanced...
Council of War
Research | March 2018
A new and deeply disturbing report from Big Brother Watch...
The dark destroyers
Research | March 2018
Over one million leaked and hacked credentials found on the...
Nominations Open NOW -...
Awards | September 2021
The Computing Security Awards 2021 are fast approaching, so it's...
Fame reaches out
Awards | September 2021
Industry stalwarts inducted into Hall of Fame
Computing Security Awards 2020
Awards | March 2021
EXCELLENCE SHINES THROUGH
Opinions
How to protect business...
Opinion | September 2021
Carmen Oprita, manager sales and business development at Endpoint Protector...
Working from home -...
Opinion | March 2021
COVID-19 has been with us now for almost a year...
Remote workers targeted
Opinion | May 2020
Attackers have been quick to seek out ways of exploiting...
Access angst
Opinion | May 2020
When company employees are forced to start working remotely, they...
The plot thickens
Opinion | March 2020
What chance secure data management might have altered the outcomes...
Essential building blocks
Opinion | March 2020
From Network Access Control (NAC) to Network Segmentation, addressing the...
The ramifications of misaddressed...
Opinion | January 2020
With the number and sophistication of cyber attacks increasing significantly,...
Invoice Fraud and Business...
Opinion | January 2020
By Dr Debbie Garside, Group Chief Innovation Scientist/CEO GeoLang, The...
Think before you click...
Opinion | December 2019
Human error is always going to be a major factor...
Enterprise Mobile Security: How...
Opinion | December 2019
Tom Davison, EMEA Technical Director at Lookout examines how modern...
Cybersecurity in 2020: Key...
Opinion | December 2019
Cybersecurity is a global concern. From the smallest business up...
Eliminating wastage
Opinion | November 2019
A thorough risk assessment is essential when deciding where security...
Quantum leaps - and...
Technology Focus | September 2021
Quantum computers will soon smash through the mathematical cryptography we...
SHATTERED TRUST
Technology Focus | November 2020
A user of a popular health app was inadvertently able...
Malware menace
Technology Focus | May 2020
A privacy-first browser combining a built-in VPN with complete encryption,...
Off the beaten track...
Technology Focus | May 2020
Contact tracing apps could be one of the keys to...
The Quantum crypto revolution...
Technology Focus | March 2020
Commercially available encryption systems are already with us and their...
Clever thinking
Technology | May 2019
Gaining insight into every incoming threat is invaluable to a...
How Northern Ireland is...
Special Focus | September 2021
A small, nascent cluster of native businesses has been nurtured...
Cyber-attacks soar in wake...
Analysis | September 2021
Changes to working practices leave businesses ever more exposed
Ransomware onslaught batters more...
Industry Survey | September 2021
Of all the organisations hit by ransom-related distributed denial of...
ADISA sets the Standard...
Industry Focus | September 2021
ADISA Asset Recovery Standard 8.0 formally approved by UK Information...
How to disrupt the...
Security Update | September 2021
It might take only minutes for a cybercriminal to break...
Assumptions - more than...
Special Focus | September 2021
Making assumptions can be a big mistake - yet sometimes...
Adding Multi-Factor Authentication to...
Masterclass | September 2021
One key area of security that can often be overlooked...
2021 Computing Security Awards.......
Comment | September 2021
After what seems like an eternity of lockdown, we can...
How to protect business...
Opinion | September 2021
Carmen Oprita, manager sales and business development at Endpoint Protector...
Cruising for a bruising...
Feature | September 2021
Carnival Cruises suffering four data breaches in 15 months flags...
Nominations Open NOW -...
Awards | September 2021
The Computing Security Awards 2021 are fast approaching, so it's...
8am and I.T. is...
Case Study | September 2021
Stark lesson unfolds in the cyber security dangers that are...