Recent Issues
Latest Issue
CS Jan-Feb 2024
CS Nov-Dec 2023
CS Sep-Oct 2023
CS Jul-Aug 2023
CS May-Jun 2023
CS Mar-Apr 2023
CS Jan-Feb 2023
CS Nov-Dec 2022
CS Sep-Oct 2022
CS Jul-Aug 2022
CS May-Jun 2022
CS Mar Apr 2022
CS Jan Feb 2022
CS Sep-Oct 2021
CS May-Jun 2021
CS Mar-Apr 2021
CS Nov-Dec 2020
CS May-Jun 2020
CS Mar-Apr 2020
CS Jan-Feb 2020
Inside the revolution
Review | November 2023
A range of powerful technologies is disrupting and transforming every...
Hornetsecurity 365 Permission Manager
Review | November 2023
Microsoft 365 (MS365) is the productivity and communications platform of...
Hornetsecurity Security Awareness Service...
Product Review | October 2023
Cybercriminals never sit still and are always looking for new...
macmon NAC
Product Review | October 2023
macmon's NAC product is designed to be simple to deploy...
ENDACE: ENDACEPROBE CLOUD
Product Review | October 2023
Cloud computing has revolutionised business operations globally, but the ‘shared...
The fightback that must...
Review | September 2023
A new thriller serves as a reminder that the battle...
macmon NAC
Product Review | August 2023
Macmon secure GmbH's powerful NAC product is designed to protect...
Secure communication across locations...
Product Review | March 2023
Daniel Heck, Vice President Marketing, Rohde & Schwarz Cybersecurity, looks...
Gatewatcher AIONIQ
Product Review | September 2022
As cyber-attacks increase in magnitude and sophistication, organisations of all...
Rohde & Schwarz Cybersecurity:...
Product Review | September 2022
Cybercriminals are becoming ever more innovative with their attack vectors,...
Endace EndaceProbe 9200 G4
Review | May 2022
Packet capture is an essential tool for SecOps and NetOps...
Hornetsecurity 365 Total Protection
Product Review | April 2022
The concerted move to home and hybrid working practices has...
News
Cyberattacks breaching defences on...
News | January 2024
Security leadership "needs to be involved in high-end business decision-making.
Hornetsecurity reveals ever-growing threat...
News | January 2024
Cyber Security Report uncovers massive step-up in phishing attacks
Cyber threats are hitting...
News | January 2024
Cyberattacks are growing increasingly sophisticated, with 97% of companies being...
If you're feeling vulnerable…...
News | January 2024
SAP patch monitoring and configuration automated to boost protection
Support-line aims to ward...
News | January 2024
With almost a third of UK businesses reporting a cyber...
Struggling to keep the...
News | November 2023
A worrying 97% of respondents' organisations face challenges in trying...
Massive data breach assaults...
News | November 2023
Almost 340 million people were hit by data breaches in...
How attackers exploit email...
News | November 2023
New tactics help attackers escape security measures
Hornetsecurity unveils its ...
News | November 2023
Cybersecurity provider Hornetsecurity has published 'Microsoft 365: The Essential Companion
Soaring cybercrime and fraud...
News | October 2023
Rebranded business resilience organisation steps up its defences against deepening...
Tenable Holdings acquires Ermetic...
News | October 2023
Ermetic hailed as a "fully integrated cloud-native application protection platform...
Defence industry is 'at...
News | October 2023
The number of attacks on the sector is increasing by...
AI - Where next?...
Feature | January 2024
With ever more alarming news emerging about the perils of...
Staying above the water...
Feature | January 2024
Stealers, loaders, zero-day exploits, ransomware, brute force attacks - the...
Through the ‘lurking’ glass...
Feature | January 2024
How might the 'darker forces' of cyber security impact the...
The top-level fibre behind...
Feature | January 2024
VIPRE Security offers its key points for getting executive support...
Balance of power move...
Feature | November 2023
In the wake of the US government releasing more details...
Enemy No 1 -...
Feature | November 2023
While there are indications that ransomware may be sliding down...
What data privacy means...
Feature | November 2023
Is the battle to keep digital privacy laws and regulations...
Phishing enters deep dark...
Feature | November 2023
The sophistication of phishing attacks is also soaring, with cybercriminals...
False positive
Feature | October 2023
Out of 78% of organisations that claimed they were ready...
New malicious attack spreads...
Feature | October 2023
Sophos reveals worrying details behind complex new tactic
Will 'AI' now prove...
Feature | October 2023
AI continues to divide opinion, but one thing is certain:...
Attacking on all fronts...
Feature | October 2023
Outright assaults on organisations are not only hitting new highs,...
Interviews
Inside a hidden world...
Interview | November 2023
Computing Security speaks with Andy Syrewicze, technical evangelist, Hornetsecurity, about...
Welcome to the (third)...
Interview | October 2022
Computing Security recently caught up with Hornetsecurity chief technical officer...
Object Archive software -...
Interview | September 2022
Fujifilm recently launched Object Archive, described as 'an S3-compatible tape...
Perenna - helping to...
Interview Case Study | December 2021
Perenna is creating a bank where mortgages will be funded...
Always at your disposal...
Interview | July 2018
Computer Disposals Ltd (CDL) is one of the UK's leading...
Behind the scenes at...
Interview | September 2017
Significant change is now taking place at Capita Cyber Security....
On your metal!
Case Study | November 2023
When one metal fabrication company suffered several malware attacks, it...
Furness College enjoys 50%...
Case Study | February 2022
In-built ransomware protection enables rapid recovery of individual files and...
Perenna - helping to...
Interview Case Study | December 2021
Perenna is creating a bank where mortgages will be funded...
Helping to redefine the...
Case Study | December 2021
Why Remote Internal Infrastructure...
Case Study | November 2021
“Everything from email servers and internal staff networks, through to...
8am and I.T. is...
Case Study | September 2021
Stark lesson unfolds in the cyber security dangers that are...
Automating identity and access...
Case Study | October 2020
One Identity partners have helped Jumbo Supermarkets to maximise its...
Profits and Pitfalls
Case Study | June 2020
Well-crafted social media content can deliver a multitude of benefits....
KnowBe4 Decreases the Risk...
Case Study | June 2020
SIG plc. is a leading wholesale distributor in Europe of...
Securing privileged access for...
Case Study | June 2020
Prosegur uses RPA to transform its business while reducing the...
Leading the charge
Case Study | May 2020
How savvy businesses have successfully flipped the digital switch
Regional U.S. Credit Union...
Case Study | May 2020
Many U.S. states have shut down most non-essential industries, religious...
Why orphaned data is...
Research | October 2023
Daniel Hofmann, CEO at Hornetsecurity, looks at the sizable threat...
Cyber risk response grabs...
Research | February 2023
Gartner research shows that 88% of boards now regard cybersecurity...
Why ransomware is 'moving...
Research | December 2022
Signs of a new data extortion technique show threat actors...
Top 8 security and...
Research | December 2021
Global analysis and research company Gartner pinpoints where the greatest...
Cyber strategy hits critical...
Research | March 2021
Cyber security has never had more relevance, when set against...
Ransomware soars
Research | May 2020
Working from home can make IT systems far more susceptible...
Who can you really...
Research | July 2019
Those who rely on their online bank to keep their...
Sealing off the breach...
Research | May 2019
A major cyber security breaches survey of UK businesses and...
Printer hacking in the...
Research | January 2019
Print and be damned? If the right security measures aren't...
NHS breach - the...
Research | November 2018
The WannaCry attack that hit the NHS last year, is...
The million pound gamble...
Research | November 2018
New research reveals that UK businesses would have to spend...
Backup confidence on the...
Research | July 2018
In all of the doom and gloom that often dominates...
Computing Security Awards 2023...
Awards | November 2023
WINNER: Smarttech247 - NoPhish
Computing Security Awards 2023...
Awards | November 2023
WINNER: Hornetsecurity - Hornetsecurity 365 Total Protection
INCIDENT RESPONSE & INVESTIGATION...
Awards | November 2023
WINNER: Cyderes
Computing Security Awards 2023...
Awards | November 2023
WINNER: macmon - macmon NAC
Computing Security Awards 2023...
Awards | November 2023
WINNER: Watchguard - AD360
Computing Security Awards 2023...
Awards | November 2023
WINNER: Gatewatcher - AIONIQ
Computing Security Awards 2023...
Awards | November 2023
WINNER: VIPRE Security Group - SafeSend
Computing Security Awards 2023...
Awards | November 2023
WINNER: Heimdal Security - Threat Prevention Endpoint
Computing Security Awards 2023...
Awards | November 2023
WINNER: SecurEnvoy - Access Management Solution
Computing Security Awards 2023...
Awards | November 2023
WINNER: Metacompliance - MetaPhish
Computing Security Awards 2023...
Awards | November 2023
WINNER: Gigacycle
Computing Security Awards 2023...
Awards | November 2023
WINNER: Cyderes - Cyderes Cloud Identity
Opinions
What to do when...
Opinion | May 2023
How do hackers get inside an organisation's defences? Is it...
The dystopian world of...
Opinion | December 2022
BBC's recent drama, 'The Capture', was an alarming take on...
How sensitive is your...
Opinion | October 2022
Keeping track of stored data is a complex, difficult task....
Power vacuum
Opinion | August 2022
Cyber Power may well be a vital component in protecting...
2022: Where Packet Capture...
Opinion | May 2022
In today's rapidly changing threat landscape, why aren't more companies...
7 Reasons why SecurEnvoy...
Opinion | May 2022
The summer of 2020 saw Microsoft roll out Azure AD...
Getting to the heart...
Opinion | April 2022
Top companies now use a raft of tools and software...
Essential grains of truth...
Opinion | February 2022
"If you can't get the basics right, it doesn't matter...
How to protect business...
Opinion | September 2021
Carmen Oprita, manager sales and business development at Endpoint Protector...
Working from home -...
Opinion | March 2021
COVID-19 has been with us now for almost a year...
Remote workers targeted
Opinion | May 2020
Attackers have been quick to seek out ways of exploiting...
Access angst
Opinion | May 2020
When company employees are forced to start working remotely, they...
A world apart
Technology Focus | August 2022
Interest in the metaverse is on the up, but is...
Steering on the safe...
Technology Focus | August 2022
Autonomous vehicles are increasingly making headlines and not always for...
Quantum goes big!
Technology Focus | May 2022
BT and Toshiba launch first commercial trial of quantum secured...
Hacking gets backing!
Technology Focus | May 2022
University ethical challenge platform wins government backing to prepare for...
Facing up to the...
Technology | February 2022
Facial recognition technology, behavioural biometrics, biometric authentication, homomorphic encryption and...
Quantum leaps - and...
Technology Focus | September 2021
Quantum computers will soon smash through the mathematical cryptography we...
SHATTERED TRUST
Technology Focus | November 2020
A user of a popular health app was inadvertently able...
Malware menace
Technology Focus | May 2020
A privacy-first browser combining a built-in VPN with complete encryption,...
Off the beaten track...
Technology Focus | May 2020
Contact tracing apps could be one of the keys to...
The Quantum crypto revolution...
Technology Focus | March 2020
Commercially available encryption systems are already with us and their...
Clever thinking
Technology | May 2019
Gaining insight into every incoming threat is invaluable to a...
AI - Where next?...
Feature | January 2024
With ever more alarming news emerging about the perils of...
Why AI is on...
Industry View | January 2024
More reflections on artificial intelligence - its threats and promises
Life inside the clouds...
Market Focus | January 2024
Traditional cloud security is failing the modern enterprise, states Illumio,...
Deal or no deal...
Comment | January 2024
A provisional agreement is paving the way for what would...
Staying above the water...
Feature | January 2024
Stealers, loaders, zero-day exploits, ransomware, brute force attacks - the...
Through the ‘lurking’ glass...
Feature | January 2024
How might the 'darker forces' of cyber security impact the...
No compromise on trust...
Special Focus | January 2024
macmon secure is adamant that no device, nor user, should...
Safeguarding HR in the...
| January 2024
Robert O'Brien of MetaCompliance highlights how departmental cyber security training...
Phishing for the answers...
Industry Focus | January 2024
Domain phishing scams have now reached levels never seen before....
We shall not be...
Industry View | January 2024
Several countries have taken a stand against ransomware attacks by...
The top-level fibre behind...
Feature | January 2024
VIPRE Security offers its key points for getting executive support...
Cyberattacks breaching defences on...
News | January 2024
Security leadership "needs to be involved in high-end business decision-making.