Recent Issues
Latest Issue
CS Oct 2021
CS May-Jun 2021
CS Mar-Apr 2021
CS Nov-Dec 2020
CS May-Jun 2020
CS Mar-Apr 2020
CS Jan-Feb 2020
Redkey USB
Product Review | October 2021
With all the focus on cybercriminals and internet attacks, it's...
Zivver Secure Email
Product Review | October 2021
Email is responsible for the majority of data breaches -...
Wandera Private Access
Review | March 2021
The COVID-19 crisis will continue to have a lasting impact...
Cybereason Mobile
Product Review | November 2020
The coronavirus pandemic and its continuing impact have changed the...
Hornetsecurity 365 Total Protection
Product Review | November 2020
Microsoft 365 is by far the most prevalent cloud email...
Cloud Protection for Salesforce...
Review | March 2020
Cloud-based services have caught on fast, offering a range of...
Flowmon Anomaly Detection System...
Review | March 2020
Traditional security tools, often signature based, can be very effective...
baramundi Management Suite 2019...
Review | January 2020
Enterprises struggling to manage and secure their desktops and mobiles...
Enterprise-wide Network Segmentation with...
Review | January 2020
Network segmentation is increasing in popularity, as it is proving...
Kingston Technology IronKey D300S...
Review | January 2020
With the EU GDPR (General Data Protection Regulation) now in...
R&S Cloud Protector from...
Review | January 2020
The case for website and web application protection is well...
VIPRE SafeSend
Review | January 2020
In today's highly pressured work environments, it really is all...
News
Shell shock for Log4Shell...
News | January 2022
Attackers actively target Log4Shell vulnerabilities in VMware Horizon servers in...
NCC Group launches new...
News | January 2022
‘Replicate & Recover’ aims to help customers plan for software...
Collaboration tools becoming key...
News | January 2022
Hackers exploiting weaknesses to steal sensitive information
Cloudflare expands Zero Trust...
News | January 2022
New firewall capabilities aim to help customers leave hardware behind
Hybrid working leaves organisations...
News | January 2022
Average print-related breach cost hits almost £632,000
MI6 chief comes out...
News | December 2021
Bitdefender endorses intelligence agency’s call for collaboration with private tech...
Cybersecurity expertise: knowledge can...
News | December 2021
Aptitude for creative problem-solving and hunger to learn are main...
Masses of customer data...
News | December 2021
Cyber hackers on the loose in wake of GoDaddy breach
Transformation projects exposed to...
News | December 2021
75% admit they had increased risk tolerances to allow changes...
BT launches ‘Inflame’
News | December 2021
Automatic detection and response to cyber-attacks
Supply chain under stress...
News | December 2021
Organisations facing significant security risks
Collective action against ransomware...
News | December 2021
But businesses everywhere are under threat and urged to look...
The relentless rise of...
Feature | December 2021
Stealth attacks to infiltrate networks and steal data are soaring....
2022: where will it...
Feature | December 2021
We asked several industry observers to give us their top...
To pay or not...
Feature | October 2021
Paying ransomware is a topic that greatly divides opinion. Cold...
A shape-shifting world
Feature | October 2021
Attackers use trusted cloud services and constantly change their tactics...
Calling for backup
Feature | October 2021
What approach should an enterprise take to ensure it has...
Cruising for a bruising...
Feature | September 2021
Carnival Cruises suffering four data breaches in 15 months flags...
Cyber agencies flex their...
Feature | September 2021
International allies share details of top 30 vulnerabilities that were...
Fighting the ransomware war...
Feature | September 2021
In the first six months of 2021, global ransomware volume...
The real artificial intelligence...
Feature | June 2021
Can AI help transform the industry, making it sharper, wiser...
What else awaits in...
Feature | June 2021
In part 2 of our glance into the (possible) future,...
Fraud and cybercrime soar...
Feature | June 2021
More than 6,000 cases of Covid-related fraud and cybercrime were...
All-out war
Feature | June 2021
Espionage, fraud and ransomware were the weapons of choice in...
Interviews
Perenna - helping to...
Interview Case Study | December 2021
Perenna is creating a bank where mortgages will be funded...
Always at your disposal...
Interview | July 2018
Computer Disposals Ltd (CDL) is one of the UK's leading...
Behind the scenes at...
Interview | September 2017
Significant change is now taking place at Capita Cyber Security....
Perenna - helping to...
Interview Case Study | December 2021
Perenna is creating a bank where mortgages will be funded...
Helping to redefine the...
Case Study | December 2021
Why Remote Internal Infrastructure...
Case Study | November 2021
“Everything from email servers and internal staff networks, through to...
8am and I.T. is...
Case Study | September 2021
Stark lesson unfolds in the cyber security dangers that are...
Automating identity and access...
Case Study | October 2020
One Identity partners have helped Jumbo Supermarkets to maximise its...
Profits and Pitfalls
Case Study | June 2020
Well-crafted social media content can deliver a multitude of benefits....
KnowBe4 Decreases the Risk...
Case Study | June 2020
SIG plc. is a leading wholesale distributor in Europe of...
Securing privileged access for...
Case Study | June 2020
Prosegur uses RPA to transform its business while reducing the...
Leading the charge
Case Study | May 2020
How savvy businesses have successfully flipped the digital switch
Regional U.S. Credit Union...
Case Study | May 2020
Many U.S. states have shut down most non-essential industries, religious...
New College Oxford
Case Study | December 2019
Situated in the very heart of the city, New College...
ALTODIGITAL NETWORKS LTD
Case Study | September 2019
Top 8 security and...
Research | December 2021
Global analysis and research company Gartner pinpoints where the greatest...
Cyber strategy hits critical...
Research | March 2021
Cyber security has never had more relevance, when set against...
Ransomware soars
Research | May 2020
Working from home can make IT systems far more susceptible...
Who can you really...
Research | July 2019
Those who rely on their online bank to keep their...
Sealing off the breach...
Research | May 2019
A major cyber security breaches survey of UK businesses and...
Printer hacking in the...
Research | January 2019
Print and be damned? If the right security measures aren't...
NHS breach - the...
Research | November 2018
The WannaCry attack that hit the NHS last year, is...
The million pound gamble...
Research | November 2018
New research reveals that UK businesses would have to spend...
Backup confidence on the...
Research | July 2018
In all of the doom and gloom that often dominates...
Time for a deep...
Research | July 2018
In our hyper-connected, technology-driven world, data breaches and cyber-attacks remain...
Deadly game of Hide...
Research | March 2018
Bitdefender researchers have uncovered an emerging botnet that uses advanced...
Council of War
Research | March 2018
A new and deeply disturbing report from Big Brother Watch...
The Computing Security Awards...
Awards | December 2022
Winner: Heimdal Security - Heimdal Threat Prevention
Computing Security Awards hit...
Awards | December 2021
December 2021 was a momentous month for all involved in...
Computing Security Awards hit...
Awards | December 2021
'Back in the room' live to great fanfare - and...
The Computing Security Awards...
Awards | December 2021
Winner: Libraesva - Email Security Gateway
The Computing Security Awards...
Awards | December 2021
Winner: Watchguard - Panda AD360
The Computing Security Awards...
Awards | December 2021
Winner: Kroll
The Computing Security Awards...
Awards | December 2021
Winner: Endace - EndaceProbe Analytics Platform
The Computing Security Awards...
Awards | December 2021
Winner: Hornetsecurity - Advanced Threat Protection
The Computing Security Awards...
Awards | December 2021
Winner: Veritas - BackUp Exec 21
The Computing Security Awards...
Awards | December 2021
Winner: Xcina Consulting
The Computing Security Awards...
Awards | December 2021
Winner: SecurEnvoy - SecureIdentity Identity and Access Management
The Computing Security Awards...
Awards | December 2021
Winner: Metacompliance - MetaPhish
Opinions
How to protect business...
Opinion | September 2021
Carmen Oprita, manager sales and business development at Endpoint Protector...
Working from home -...
Opinion | March 2021
COVID-19 has been with us now for almost a year...
Remote workers targeted
Opinion | May 2020
Attackers have been quick to seek out ways of exploiting...
Access angst
Opinion | May 2020
When company employees are forced to start working remotely, they...
The plot thickens
Opinion | March 2020
What chance secure data management might have altered the outcomes...
Essential building blocks
Opinion | March 2020
From Network Access Control (NAC) to Network Segmentation, addressing the...
The ramifications of misaddressed...
Opinion | January 2020
With the number and sophistication of cyber attacks increasing significantly,...
Invoice Fraud and Business...
Opinion | January 2020
By Dr Debbie Garside, Group Chief Innovation Scientist/CEO GeoLang, The...
Think before you click...
Opinion | December 2019
Human error is always going to be a major factor...
Enterprise Mobile Security: How...
Opinion | December 2019
Tom Davison, EMEA Technical Director at Lookout examines how modern...
Cybersecurity in 2020: Key...
Opinion | December 2019
Cybersecurity is a global concern. From the smallest business up...
Eliminating wastage
Opinion | November 2019
A thorough risk assessment is essential when deciding where security...
Quantum leaps - and...
Technology Focus | September 2021
Quantum computers will soon smash through the mathematical cryptography we...
SHATTERED TRUST
Technology Focus | November 2020
A user of a popular health app was inadvertently able...
Malware menace
Technology Focus | May 2020
A privacy-first browser combining a built-in VPN with complete encryption,...
Off the beaten track...
Technology Focus | May 2020
Contact tracing apps could be one of the keys to...
The Quantum crypto revolution...
Technology Focus | March 2020
Commercially available encryption systems are already with us and their...
Clever thinking
Technology | May 2019
Gaining insight into every incoming threat is invaluable to a...
The Computing Security Awards...
Awards | December 2022
Winner: Heimdal Security - Heimdal Threat Prevention
Shell shock for Log4Shell...
News | January 2022
Attackers actively target Log4Shell vulnerabilities in VMware Horizon servers in...
NCC Group launches new...
News | January 2022
‘Replicate & Recover’ aims to help customers plan for software...
Collaboration tools becoming key...
News | January 2022
Hackers exploiting weaknesses to steal sensitive information
Cloudflare expands Zero Trust...
News | January 2022
New firewall capabilities aim to help customers leave hardware behind
Hybrid working leaves organisations...
News | January 2022
Average print-related breach cost hits almost £632,000
MI6 chief comes out...
News | December 2021
Bitdefender endorses intelligence agency’s call for collaboration with private tech...
Cybersecurity expertise: knowledge can...
News | December 2021
Aptitude for creative problem-solving and hunger to learn are main...
Masses of customer data...
News | December 2021
Cyber hackers on the loose in wake of GoDaddy breach
Secure Password Reset 'made...
Industry Focus | December 2021
Michael Urgero, Senior Security Engineer, SecurEnvoy, offers his insights on...
Perenna - helping to...
Interview Case Study | December 2021
Perenna is creating a bank where mortgages will be funded...
GDPR Certification Schemes -...
Special Focus | December 2021
Was GDPR all hot air or, three years on, are...