Recent Issues
Latest Issue
CS Mar Apr 2022
CS Jan Feb 2022
CS Sep-Oct 2021
CS May-Jun 2021
CS Mar-Apr 2021
CS Nov-Dec 2020
CS May-Jun 2020
CS Mar-Apr 2020
CS Jan-Feb 2020
Endace EndaceProbe 9200 G4
Review | May 2022
Packet capture is an essential tool for SecOps and NetOps...
Hornetsecurity 365 Total Protection
Product Review | April 2022
The concerted move to home and hybrid working practices has...
Redkey USB
Product Review | October 2021
With all the focus on cybercriminals and internet attacks, it's...
Zivver Secure Email
Product Review | October 2021
Email is responsible for the majority of data breaches -...
Wandera Private Access
Review | March 2021
The COVID-19 crisis will continue to have a lasting impact...
Cybereason Mobile
Product Review | November 2020
The coronavirus pandemic and its continuing impact have changed the...
Hornetsecurity 365 Total Protection
Product Review | November 2020
Microsoft 365 is by far the most prevalent cloud email...
Cloud Protection for Salesforce...
Review | March 2020
Cloud-based services have caught on fast, offering a range of...
Flowmon Anomaly Detection System...
Review | March 2020
Traditional security tools, often signature based, can be very effective...
baramundi Management Suite 2019...
Review | January 2020
Enterprises struggling to manage and secure their desktops and mobiles...
Enterprise-wide Network Segmentation with...
Review | January 2020
Network segmentation is increasing in popularity, as it is proving...
Kingston Technology IronKey D300S...
Review | January 2020
With the EU GDPR (General Data Protection Regulation) now in...
News
Attacks on federal courts...
News | August 2022
Threat level to all underscored by targeting of judiciary
Manufacturing singled out as...
News | August 2022
280 days on average to identify and resolve a cyberattack
Teen extortion group exposes...
News | July 2022
LAPSUS$ puts even most mature organisations at risk
Data on 'a billion...
News | July 2022
More than 23 terabytes of stolen data offered for sale
Thieves through the front...
News | June 2022
92% of IT decision makers fear passwords being stolen
Cyberattacks on the rampage...
News | June 2022
Two in five UK firms have experienced cyberattacks in the...
Colonial Pipeline hack remembered...
News | May 2022
Saturday 7 May 2022 – first anniversary of infamous ransomware
Highly sensitive data put...
News | May 2022
Employee behaviour seen as bigger threat than external hackers
Quantum computing revolution could...
News | May 2022
White House warns agencies to prepare for the worst
Finger on the Pulse...
News | May 2022
New advanced malware prevention software launched by SecureAge Technology
More Zero-Days Exploited Than...
News | May 2022
Massive increase in state-sponsored attacks
Identity-related cybersecurity ‘debt’ leaves...
News | May 2022
Soaring levels of human and machine identities pinpointed in CyberArk...
Cyber woes
Feature | August 2022
Many organisations feel no more confident in their ability to...
'Two-thirds of malware encrypted'...
Feature | August 2022
Report highlights dangers that threaten without HTTPS inspection and finds...
Ransomware devastation
Feature | August 2022
Despite spending billions on cybersecurity tools, businesses are alleged still...
Isolated and vulnerable
Feature | May 2022
Hackers are driving up the levels of human error by...
Chains of freedom
Feature | May 2022
Supply chains are prone to wild swings and uncertainties. How...
The cloud conundrum
Feature | April 2022
Cloud, in its various shapes, is often hailed as the...
Logjam of concerns
Feature | April 2022
Log4shell is a critical vulnerability in the widely used logging...
Virtual world, real danger...
Feature | April 2022
The metaverse is a virtual reality world characterised by a...
The MSP attack target...
Feature | April 2022
Managed services providers are quickly overtaking their customers as a...
NHS breaches - just...
Feature | April 2022
What will it take to stop the countless hacks on...
The never-ending nightmare
Feature | March 2022
Ransomware hackers have the power not just to take files,...
Beware the ticking clock...
Feature | March 2022
Use of deep fake tech, 'killerware', ransomware and insider threats...
Interviews
Perenna - helping to...
Interview Case Study | December 2021
Perenna is creating a bank where mortgages will be funded...
Always at your disposal...
Interview | July 2018
Computer Disposals Ltd (CDL) is one of the UK's leading...
Behind the scenes at...
Interview | September 2017
Significant change is now taking place at Capita Cyber Security....
Furness College enjoys 50%...
Case Study | February 2022
In-built ransomware protection enables rapid recovery of individual files and...
Perenna - helping to...
Interview Case Study | December 2021
Perenna is creating a bank where mortgages will be funded...
Helping to redefine the...
Case Study | December 2021
Why Remote Internal Infrastructure...
Case Study | November 2021
“Everything from email servers and internal staff networks, through to...
8am and I.T. is...
Case Study | September 2021
Stark lesson unfolds in the cyber security dangers that are...
Automating identity and access...
Case Study | October 2020
One Identity partners have helped Jumbo Supermarkets to maximise its...
Profits and Pitfalls
Case Study | June 2020
Well-crafted social media content can deliver a multitude of benefits....
KnowBe4 Decreases the Risk...
Case Study | June 2020
SIG plc. is a leading wholesale distributor in Europe of...
Securing privileged access for...
Case Study | June 2020
Prosegur uses RPA to transform its business while reducing the...
Leading the charge
Case Study | May 2020
How savvy businesses have successfully flipped the digital switch
Regional U.S. Credit Union...
Case Study | May 2020
Many U.S. states have shut down most non-essential industries, religious...
New College Oxford
Case Study | December 2019
Situated in the very heart of the city, New College...
Top 8 security and...
Research | December 2021
Global analysis and research company Gartner pinpoints where the greatest...
Cyber strategy hits critical...
Research | March 2021
Cyber security has never had more relevance, when set against...
Ransomware soars
Research | May 2020
Working from home can make IT systems far more susceptible...
Who can you really...
Research | July 2019
Those who rely on their online bank to keep their...
Sealing off the breach...
Research | May 2019
A major cyber security breaches survey of UK businesses and...
Printer hacking in the...
Research | January 2019
Print and be damned? If the right security measures aren't...
NHS breach - the...
Research | November 2018
The WannaCry attack that hit the NHS last year, is...
The million pound gamble...
Research | November 2018
New research reveals that UK businesses would have to spend...
Backup confidence on the...
Research | July 2018
In all of the doom and gloom that often dominates...
Time for a deep...
Research | July 2018
In our hyper-connected, technology-driven world, data breaches and cyber-attacks remain...
Deadly game of Hide...
Research | March 2018
Bitdefender researchers have uncovered an emerging botnet that uses advanced...
Council of War
Research | March 2018
A new and deeply disturbing report from Big Brother Watch...
Computing Security Awards hit...
Awards | December 2021
December 2021 was a momentous month for all involved in...
Computing Security Awards hit...
Awards | December 2021
'Back in the room' live to great fanfare - and...
The Computing Security Awards...
Awards | December 2021
Winner: Libraesva - Email Security Gateway
The Computing Security Awards...
Awards | December 2021
Winner: Watchguard - Panda AD360
The Computing Security Awards...
Awards | December 2021
Winner: Kroll
The Computing Security Awards...
Awards | December 2021
Winner: Endace - EndaceProbe Analytics Platform
The Computing Security Awards...
Awards | December 2021
Winner: Hornetsecurity - Advanced Threat Protection
The Computing Security Awards...
Awards | December 2021
Winner: Veritas - BackUp Exec 21
The Computing Security Awards...
Awards | December 2021
Winner: Xcina Consulting
The Computing Security Awards...
Awards | December 2021
Winner: Heimdal Security - Heimdal Threat Prevention
The Computing Security Awards...
Awards | December 2021
Winner: SecurEnvoy - SecureIdentity Identity and Access Management
The Computing Security Awards...
Awards | December 2021
Winner: Metacompliance - MetaPhish
Opinions
Power vacuum
Opinion | August 2022
Cyber Power may well be a vital component in protecting...
2022: Where Packet Capture...
Opinion | May 2022
In today's rapidly changing threat landscape, why aren't more companies...
7 Reasons why SecurEnvoy...
Opinion | May 2022
The summer of 2020 saw Microsoft roll out Azure AD...
Getting to the heart...
Opinion | April 2022
Top companies now use a raft of tools and software...
Essential grains of truth...
Opinion | February 2022
"If you can't get the basics right, it doesn't matter...
How to protect business...
Opinion | September 2021
Carmen Oprita, manager sales and business development at Endpoint Protector...
Working from home -...
Opinion | March 2021
COVID-19 has been with us now for almost a year...
Remote workers targeted
Opinion | May 2020
Attackers have been quick to seek out ways of exploiting...
Access angst
Opinion | May 2020
When company employees are forced to start working remotely, they...
The plot thickens
Opinion | March 2020
What chance secure data management might have altered the outcomes...
Essential building blocks
Opinion | March 2020
From Network Access Control (NAC) to Network Segmentation, addressing the...
The ramifications of misaddressed...
Opinion | January 2020
With the number and sophistication of cyber attacks increasing significantly,...
A world apart
Technology Focus | August 2022
Interest in the metaverse is on the up, but is...
Steering on the safe...
Technology Focus | August 2022
Autonomous vehicles are increasingly making headlines and not always for...
Quantum goes big!
Technology Focus | May 2022
BT and Toshiba launch first commercial trial of quantum secured...
Hacking gets backing!
Technology Focus | May 2022
University ethical challenge platform wins government backing to prepare for...
Facing up to the...
Technology | February 2022
Facial recognition technology, behavioural biometrics, biometric authentication, homomorphic encryption and...
Quantum leaps - and...
Technology Focus | September 2021
Quantum computers will soon smash through the mathematical cryptography we...
SHATTERED TRUST
Technology Focus | November 2020
A user of a popular health app was inadvertently able...
Malware menace
Technology Focus | May 2020
A privacy-first browser combining a built-in VPN with complete encryption,...
Off the beaten track...
Technology Focus | May 2020
Contact tracing apps could be one of the keys to...
The Quantum crypto revolution...
Technology Focus | March 2020
Commercially available encryption systems are already with us and their...
Clever thinking
Technology | May 2019
Gaining insight into every incoming threat is invaluable to a...
Attacks on federal courts...
News | August 2022
Threat level to all underscored by targeting of judiciary
Manufacturing singled out as...
News | August 2022
280 days on average to identify and resolve a cyberattack
May this force NOT...
Comment | August 2022
The main feature on page 20 in this issue is...
Cyber woes
Feature | August 2022
Many organisations feel no more confident in their ability to...
'Two-thirds of malware encrypted'...
Feature | August 2022
Report highlights dangers that threaten without HTTPS inspection and finds...
At war with cyber-attacks...
Industry Focus | August 2022
The ongoing conflict in Ukraine has seen the resurrection of...
Four-year milestone for GDPR...
Security Update | August 2022
The General Data Protection Regulation is proving a force for...
Infosec Europe makes welcome...
Events | August 2022
After all the trials and tribulations of the Covid lockdowns,...
A world apart
Technology Focus | August 2022
Interest in the metaverse is on the up, but is...
Is compliance enough when...
Market Focus | August 2022
Paul Harris, Managing Director at Pentest Limited, looks at the...
Phishing in the dark...
Special Focus | August 2022
Phishing is no new phenomenon - but it is being...
Power vacuum
Opinion | August 2022
Cyber Power may well be a vital component in protecting...