Ahead of World Backup Day, experts from Keepit, Scality and NAKIVO, highlight the hidden risks around SaaS data, storage resilience and modern backup strategies.
Incident response is widely used to minimise damage from cyberattacks and security breaches - and prevent future incidents. In the first of a two-part series, we ask those in the know how this is best implemented and managed
AI has already reshaped the cybersecurity landscape and this will only accelerate as we move through the rest of 2025.
Organisations are dependent on their networks to maintain productivity. Mitigating risk is about adopting a proactive network security strategy.
Formalising Threat Detection and Incident Response Strategies: by Scott Scheppers, Chief Experience Officer at LevelBlue
More reflections on artificial intelligence - its threats and promises
Several countries have taken a stand against ransomware attacks by agreeing not to make payments to hackers
New cybersecurity measures being imposed in the US will hit software companies hard. What might this mean for the UK?
Poorly conceived cyber security training can be a massive turn-off. But, delivered properly, it can really empower the workforce to make decisions that help protect the business
Nick Evans, Business Development Manager at Geolang, looks at how data discovery might be a solution for your business
What exactly is Zero Trust and how can this be achieved? Tom Hills, Pre-Sales Consultant, SecurEnvoy, offers his insights on this challenging topic
The exponential adoption of new cyber security-related tools is a growing problem in the cyber security world, cautions Steven Usher, Senior Analyst, Brookcourt Solutions
… then do something about it. Time to fight back as Highly Evasive Adaptive Threats strike hard
PM7 Series leverages latest BiCS FLASH 3D Flash memory technology
When threatened with a ransom demand, should you simply submit? There is no simple answer to the question, as Steven Usher, Senior Security Analyst, Brookcourt Solutions, explains
How do you measure the success of a cyber threat intelligence program? Steven Usher, Senior Security Analyst, Brookcourt Solutions, offers his insights on a challenging topic
Is there a hacker staring in on you through your devices and gadgets, ready to pounce? We find out how vital it is to keep webcams covered when they're not in use
A Security Operations Centre (SOC) has become one of the vital components of a well-rounded cyber security programme
Steve Mellings, founder of ADISA, looks at how COVID-19 has helped to illuminate a gap in society where technology for many isn't a given
NHS Management adopts a security-first mindset, with help from AT&T Cybersecurity
Is now the perfect time to get your (I.T.) house in order? Paul Harris, managing director, Pentest, offers his thoughts
As the impact of the COVID-19 virus escalates, more and more employees are working from home. But dangers lurk there as well and urgent action needs to be taken
The combined forces of further regulation and new technology will underpin data security in the years ahead, argues Robert Allen - European Director of Marketing & Technical Services at Kingston Technology
E-waste is the largest-growing waste stream. By changing our 'use and discard' approach, this is an area where we can make a significant impact, says Steve Mellings, CEO and founder of ADISA
Email and data security company Mimecast has launched a Cyber Alliance Program, designed to align security vendors into an extensive cyber resilience ecosystem
When the UK's largest commercial FTSE 100 property company went in search of a technology partner to deliver at the highest level, it turned to OryxAlign
Half of industrial control system networks have faced a cyber-attack, as hacking groups seek out geo-political advantage or financial gain
Carol Massay, CEO of EasyBuild looks at the implications of Brexit for the construction industry, whatever the outcome on 31 October
Are we in danger of being smothered by information? Nathan Sykes of Kolabtree explains how 'thick data' is being used to build the smart cities of the future
Cybersecurity needs to be a priority for the education sector, argues Adrian Jones, CEO of Swivel Secure
How organisations should best manage, detect and respond to a data breach is an on-going question. But an intelligence-driven strategy is an essential part of that
The introduction of the GDPR regulation last year meant organisations responsible for IT disposal had no option but to review their processes for WEEE and data-bearing assets, as Jean-Pierre Naylor, managing director and owner, Computer Disposals Ltd (CDL), explains
What superpowers would help your organisation to defeat the cybercriminals? Matt Walmsley, EMEA director at Vectra, offers his thoughts
We live in a flexible, mobile world that is constantly reinventing itself. Paul Norbury, Chief Executive, Cardwave Services, steps inside for a closer view
John Stokoe of Dassault Systèmes explains why the construction industry needs an industrial revolution
Britain is to leave the EU - the votes were cast and the deed is done. But what is this likely to mean for our industry? Computing Security has been finding out
The burning issues that organisations are in the throes of dealing with this year are already proving to be highly challenging, as we enter the second quarter of 2014. Brian Wall reports
The storage market is changing all the time. But where do the vendors think the biggest transformations will be - and what will be their effect? Brian Wall reports