183 total entries
Show entries.
AI age of DLP looms large

With increased insider threats and rigorous data privacy laws, DLP and AI are now emerging more and more as a united force

Show of Strength and Unity

A new strategic partnership is developing cybersecurity guidance, focused on what is seen as the unique risks of AI and agentic systems

Is AI on the wrong trajectory?

Spend on developing AI is said to be out of synch with investment in securing the technology

Living off the Land

The average cost of a data breach has fallen, but cybercriminal attacks continue to increase in sophistication and number

Seven-year itch

Compliance is no longer just a legal requirement - it's a strategic differentiator, argues one industry voice. How well will GDPR cope with the growing plethora of new challenges it faces?

16 billion reasons to take action now!

Data breaches that led to 16 billion passwords being stolen could create a snowball effect of cyber-attacks in the days ahead

BYOD ban threat

Unchecked use of personal tech, from webcams to tablets for work, is said to be creating serious security blind spots

RED ALERT!!!

AI is evolving quickly - staying ahead of emerging threats will require "a collaborative effort from all stakeholders"

Mish, mash… bash!

Aggressors are constantly finding new ways - such as Mishing - to exploit email, in order to breach defences

A turnkey experience

How can managed detection and response be integrated into an organisation's existing security make-up?

Defences down!

A staggering 99% of UK respondents to a recent study said they had experienced a security attack in the last 12 months

Battered and breached

A 2024 survey paints a disturbing picture of the scale of cyber-attacks perpetrated against UK businesses over the last 12 months

Put to the test

Most companies have invested in secure IT infrastructure, but do they know how well it works under pressure?

Stopping the remote access scam pandemic

Scammers are stripping untold sums of money from victims' bank accounts. Tamas Zelczer, CEO and co-founder of Cursor Insight, discusses how biometric cybersecurity can help prevent such fraud

Phishing for the answers

Domain phishing scams have now reached levels never seen before. Vigilance can help to ensure that such scams don’t prove successful

The crime-busting challenge

Cybercrime is on the rampage, prompting one expert to say: "Beef up your email security or get ready for a world of hurt."

'Honeypot' trap sprung

In a manoeuvre set up to assess the volume of cyber-attacks directed against London, 'honeypot' devices were attacked 91 million times by over 101,000 hackers in just 28 days

Eye spy - who's watching you?

Webcam hacking has become a serious concern in recent years, with all of us potentially at risk of having our privacy invaded by cybercriminals

Unlock the potential of your redundant IT

Founder and CEO of ADISA, Steve Mellings, welcomes the 'green shoots of improvement' around asset retirement/asset recovery, but laments the lack of wholesale change

New Survey Reveals Construction Industry Confidence In The Face Of Recession

A new survey conducted by The Access Group's Construction division questioned over 1,300 UK-based construction professionals about the incoming turbulent year.

WAN Acceleration or Edge Computing?

David Trossell, CEO and CTO of Bridgeworks, on delivering higher WAN Performance

At war with cyber-attacks

The ongoing conflict in Ukraine has seen the resurrection of the infamous Industroyer malware and other threats

Secure systems: is hardware the starting point?

Organisations view hardware-assisted security capabilities as critical to a robust security strategy

ESET and Intel join forces

Move aims to enhance endpoint security with hardware-based ransomware detection

IT equipment junked prematurely

Many UK businesses are dumping their devices before they reach the end of their working life

Don't leave security until the last minute (or even later)

Paul Harris, Managing Director at Pentest Limited, discusses the importance of security within tech projects

Secure Password Reset 'made easy' with SecurEnvoy SecurPassword

Michael Urgero, Senior Security Engineer, SecurEnvoy, offers his insights on solving the problem of lost passwords for users and the support team

Data impact assurance levels explained

The time has come to 'DIAL' it in, states ADISA founder Steve Mellings

Digital twins: beyond the hype

The hype is increasing in the construction industry around the digital twin - but are users onboard with the trend yet?

Good data, bad practice

Are we taking proper advantage of the huge amount of data we are now creating? Autodesk's latest industry report has uncovered some decidedly mixed results, writes David Chadwick

ECOncrete

As weather patterns increase the erosion of our coastline will speed up, meaning we not only lose land but also a diverse natural environment. David Chadwick outlines a new way to protect it

ADISA sets the Standard

ADISA Asset Recovery Standard 8.0 formally approved by UK Information Commissioner's Office

Great American cyber recovery in peril

THERE HASN'T BEEN MUCH GOOD NEWS IN CYBERSECURITY LATELY, STATES IAN THORNTON-TRUMP, CISO, CYJAX. HIS TAKE BELOW, ON RECENT EVENTS REINFORCES THAT TO A WORRYING DEGREE

Step right up

Andrew Cowling, Senior Channel Marketing Specialist at PFU (EMEA), introduces the latest promotion for the company's existing and potential ScanSnap partners

Change is on the cards

Ever wondered whether workplace security, no matter where you are, might be possible? Perhaps biometrics could offer a way forward

When darkness falls

SHOULD your data leak, it might well end up for sale on the dark web, making you VULNERABLE and an easy target for advanced attacks

The Cash Flow Challenge

EleVia Software recruits the company's finance department in their drive to improve productivity, writes David Chadwick

UNDER SIEGE

Nation-state led cyber-attacks are being unleashed on governments at an ever-growing rate. Vigilance is the key to hindering their impact

County views

Carol Massay, CEO of EasyBuild, considers the views of two local construction industry organisations in Hertfordshire on the impact of Covid-19, planning processes and other issues

NHS Wales bolsters its defences

NHS Wales Informatics team has taken urgent steps to protect critical systems from a surge in cyber-attacks

Under fire at home

Bad actors have been taking increasing advantage of the current crisis to create chaos, locking out employees and paralysing business operations

STAYING ON GUARD

Fraud has seen an upsurge – vigilance and good practice can save you from being a victim, even after the current crisis has abated

CEOs in the firing line

Why you can't rely on others to get your Public Key Infrastructure in order - and what happens if you don't. Andrew Jenkinson, Group CEO, Cybersec Innovation Partners, offers his insights.

Beneath the surface of drainage design

Rob Butcher, Design Services Manager at ACO Water Management, shares his top tips for finding the right software for an integrated design approach to drainage

Concrete results

One of the most commonly used man-made materials on earth, concrete is a vital part of the construction industry. However, the practicalities of working with structural concrete, whether precast or poured, can prove highly complex, especially on large projects with tight deadlines or where complex design geometry is required. Here, Ismail Makda, Business Development Manager - Concrete at Trimble Tekla UK explores five of the common issues encountered by concrete contractors and discusses how incorporating digital technology, including BIM, within their workflow could help provide a solution.

The ITAD rebate scam

Jean-pierre Naylor, director, CDL, takes a look at practices relating to redundant IT equipment - PRACTICES he feels give the industry a bad name

Caught in an endless struggle

Nearly 80% of organisations rank cyber risk as a top-five concern, yet only 11% have a high degree of confidence in their ability to assess cyber threats, prevent cyber-attacks and respond effectively

Ransomware strikes entire cities

Governments and healthcare organisations have now become key targets in an increasingly aggressive campaign of ransomware attacks

Fully in the flow

Document Logistix uses DAST to ensure security of sensitive customer data

Life beyond the walls

Constructing high walls around a corporate environment may well be a security approach that is now delivering ever more diminishing returns

EasyBuild Q and A

In our third Q an A article in association with EasyBuild we look at some of the issues affecting contractors, house builders, service suppliers and maintenance companies

GDPR: solving the problem

Andrew Cowling, business development and channel marketing specialist at Fujitsu, explores the digitisation of schools' data and how it can offer a simple solution to GDPR compliance

IoT attacks surge ahead

IoT-based attacks are hitting organisations at an alarming and ever-increasing rate, with global spending on IOT security forecast to hit $1.5 billion next year

When hype and hope collide

The rhetoric around Artificial Intelligence (AI) and Machine Learning (ML) in the battle against cyber security has reached something of a fever pitch. But how accurate is it?

The road to efficient process documentation

Companies using SAP are digitalising their business, hoping to decrease costs, optimise processes and free up resources. But often their process of capturing information from documents such as invoices and orders is still manual and therefore cumbersome. It doesn't have to be though - it could happen easily, quickly and without errors at the touch of a button, explains Enno Lückel, Vice President EMEA at Ephesoft

Inside Fujitsu's SP Series

Fujitsu's Andrew Cowling explains why partners need look no further than the company's current SP Series scanner range for a reliable, high-quality capture proposition

On the right course

A wide variety of storage-related challenges are arising as research data peaks for universities and other educational institutions worldwide, and Synology solutions are playing a central role in addressing those issues

Ins and outs of cyber resilience

The European Union is planning to enhance its cyber resilience with a new EU-wide certification framework. In our pre-Brexit state, what are the 'ins' and 'outs' of this?

The A to Z of networking

With contributions from leading industry figures and commentary from our Editor Ray Smyth, we try and update on both new and well established terms to enhance understanding and consistency and to drive the networking agenda

Keeping it legal

Legal practices need to integrate digital processes in their everyday operations, or they will find digital transformation an impossible challenge, warns Fergus Wilson, CTO at Repstor

The use of ICT in architecture

Graphisoft talks to its major Japanese client, Nekken Sekkei about innovation resulting from the use of information and communication technology (ICT) in architecture

BIM with DFMA

Usha B Trivedi explains why DFMA is a natural ally for BIM, helping to change the way buildings will be put together in the future

Building with numbers

Andrew Watts, CEO of international building engineers Newtecnic, explains how the construction industry is reducing cost, risk and waste with maths, and looks at how new research and practices are delivering construction industry innovation from concept to fabrication and operation

The partnership principle

Fresh from winning BPO/Bureau Company of the Year at the 2016 DM Awards, Restore Document Management's Commercial Director David English explains how the company has built on a winning combination of customer service excellence, technological expertise and great partnership working

Three construction gamechangers for 2017

Automated bridge building behemoths, bricklaying robots, Smart Buildings and self-repairing cities - these are now real concepts being used to design and construct the built environment. Here, Kenny Ingram, Global Industry Director of Construction at IFS, outlines the key trends and opportunities for companies to leverage in 2017

Clearing the shelves

It is three years since CCube Solutions delivered its first solution for digitising Lloyd George Records for GPs and CCGs; the service has now seen wide take-up

A revolution in bank scanning

Emmedi's 4Cheque software has become the most time-saving and cost-effective way to scan and manage all bank documents - including cheques - from a single device

Spreading the word from Spain

Somewhere around 2 million companies exist in Spain, mostly small enterprises, most of them with less than five workers on average

Innovating in the Cloud

Bentley Systems and Topcon join forces to advance cloud services for 'constructioneering'

An accident waiting to happen?

Resource constraints at local authorities could be putting sensitive information at risk, according to new research from Iron Mountain

Protecting connected manufacturing

Martyn Williams, Managing Director of industrial automation software supplier, COPA-DATA UK, discusses three steps manufacturers should take to stay safe in the Cloud

The right train of thought

IT security training could not be more essential. But what should the practices and policies be that underscore this? Who should be responsible for making the decisions relating to that training and how exactly should employees be monitored?

Not all is what it SIEMs

how do you justify the cost of investing in Security Information and Event Management - SIEM - to those who control the purse strings within your organisation? Computing Security finds out by talking to those in the know.

The Cyber Imposters

An email arrives at work from someone you know well. But is it from that person? Has it been forged? Targeted attacks come in many guises. How do you combat such threats?

The home straight

Despite the widespread use of high-speed scanners in mortgage document processing, throughput has been tended to be limited by the significant volume of variable-sized and multiple-formatted items that require manual preparation prior to scanning. Now though, this is starting to change, says Jim McMahon of OPEX

Under siege - in your own car

With today's connected vehicle technologies, the risk of potential cyber security threats is vast – and growing – with cars already forced off the road. What can be done to safeguard these systems and drivers?

Sealing up the leaks

What does a successful data protection strategy look like in the face of eroding security perimeters, increasing targeted attacks, and evolving user habits and expectations?

After the flood

With mobile devices now seemingly everywhere, and more and more applications pouring into the market, mobile monitoring and device management have never been so vital

Managing email security

Businesses place heavy reliance on email - making it a prime target for hackers. But can any single system lock them out?

Encryption to amaze

Truly effective encryption that actually protects data wherever it may reside is an absolute must for any business or organisation dealing with sensitive data

At your disposal

Suffering from Regulation fatigue? Now is the time to take on board the benefits of the new GDPR regulations and the payback they can bring to your business.

Flare enough?

By utilising Cloud systems and new technology to make flare gas capture more economical, energy companies can increase revenues and maximise profitability while at the same time significantly reducing their impact on the environment, explains Adam Chapman, Director of Global Marketing, Fluenta

Researching the way forward

IES looks at past achievements and future trends in Building Performance Analysis

Upping the ante with anti-malware

Combating malware means going way beyond locating suspicious programs on servers and workstations, and detecting and interfering with the use of malware on the network

The Gold Rush is On!

Cyber attacks are costing businesses hundreds of billions annually. With the strongest defence being a skilled and experienced cybersecurity team, lucrative careers are beckoning

The human factor

The barriers that keep any organisation safe from attack are often guarded by nothing more than a single factor of authentication. Just one weakness and the whole business can be breached.

Land of opportunity - and potential catastrophe

The massive benefits that IOT can deliver in what has now become a hyper-connected society must be set against the countless risks posed each day by Cyberattacks

Be wary of wearables

Wearables are the latest big innovation for the mobile devices market. But they bring substantial security threats with them

Evolution of an Industry

We asked Kenny Ingram, Director of Construction at IFS, to let us know what he considers will be the main issues in the Construction Industry in 2016 and beyond - apart, of course, from the BIM Level 2 deadline in April.

The Smoking Gun

Encryption is vital for protecting precious data. But, in the wrong hands, it can be a weapon that is turned upon its owner - with devastating consequences

CODE RED! An essential guide to protecting your data

How should organisations minimise the likelihood that unauthorised code is able to manipulate applications, in order to access, steal, modify or delete sensitive data? Computing Security investigates

The Smoking Gun

Encryption is vital for protecting precious data. But, in the wrong hands, it can be a weapon that is turned upon its owner - with devastating consequences

The Exploitation Game

What steps can be taken to detect and block exploits as soon as they attempt to use software vulnerabilities? And how can businesses get a clear understanding of the behaviour of legitimate software components?

Sane strategies in risk-infested waters

What steps does any business have to take to get governance, risk and compliance right - and what dangers might surface along the way?

Northamber out to shake up security market

With a newly launched solutions division and two security vendors just signed up, distributor Northamber is aiming to drive growth to new heights

Protecting your digital identity

Digital services are expanding rapidly, making the chances of identity theft an ever greater reality. Businesses must take every step necessary to ensure they don’t become the next victim.

Shadow IT – hassle and bliss for IT departments

‘Shadow IT’ divides companies into IT department and the rest of the people, getting businesses are off to a bad start, warns Roman Foeckl, CEO of CoSoSys