The security perimeter is dead, according to Jonathan Wright, Chief Product Officer at GCX Managed Services, and it's time to rethink how networking and security are aligned.
The UK Cybersecurity and Resilience Bill provides a new era of accountability for critical infrastructure according to Johnny Carpenter, VP Channels and Alliances EMEA at 11:11 Systems
Mike Fry, Infrastructure Data and Security Solutions Director at Logicalis UKI, on why the biggest threat to business security may not be hackers but burnout, as overstretched cyber teams struggle to keep pace with an unrelenting wave of attacks.
Why it's time for email security to embrace a smarter, privacy-first approach
David Higgins, Senior Director, Field Technology Office at CyberArk discusses how security identity is key to safe integration
Organisations can no longer afford to rely solely on achieving compliance as a defence strategy argues Sean Tilley, Senior Director of Sales for EMEA at 11:11 Systems.
Simon Pamplin, CTO, Certes believes that most organisations aren't protecting their data; they're preserving the illusion of security. And it's costing them dearly.
Gerald Beuchelt, CISO at Acronis, offers a deep dive into the evolution and ongoing threat of ransomware - and how AI is now being deployed in cyberattacks
It's no longer a question of whether companies should prioritise data protection or cyber resilience but rather how to integrate both, according to Sean Tilley at 11:11 Systems
Tech Evangelist Sascha Giese at SolarWinds explains how cybersecurity leaders are rethinking operational resilience in the age of cloud-native infrastructure and AI-driven threats
Mike Fry, Infrastructure Data & Security Solutions Director at Logicalis UK&I, on how MXDR can help security teams overcome IT middle management challenges
Anders Askasen, product marketing director, Omada, on making the connection Between NIS2 compliance and identity management
Justin Giardina, Chief Technology Officer at 11:11 Systems, on why conventional disaster recovery won't save you from ransomware
Jon Fielding, Managing Director for EMEA at Apricorn explains why businesses can't afford to let USB storage devices create a sticky security situation
The new year is the perfect time to make sure that your workforce identities are secure, according to David Higgins, Senior Director, Field Technology Office at CyberArk
Conor O'Neill, CEO and Co-Founder of online pentest vendor OnSecurity, shares how AI can help enhance the pentesting process - but not without human expertise
John Stevenson, Senior Product Marketing Manager at Skybox Security, on automating daily work for network professionals
Global organisations are said to be facing a ransomware epidemic, due to never-ending breaches. How do they avoid the 'point of no return'?
Josh Goldfarb, Field CISO, F5 outlines five steps that businesses and consumers can take to enhance cybersecurity and prevent fraud
"UK organisations must act swiftly to determine if the NIS2 Directive applies to their operations", cautions Horizon3.ai's Keith Poyser
Andy Thompson, Offensive Research Evangelist at CyberArk Labs, on how to avoid an AI identity crisis
Keepit CISO Kim Larsen explains why UK IT teams need to prepare for the EU’s new cybersecurity directive
Larry Goldman, Director, Product Marketing at Progress gives us a guide to the powerful security provided by border and web application firewalls
With six years to its name, how has GDPR fared so far?
Critical gaps in network security are an obstacle to the future of work, according to Jonathan Wright, Director of Products and Operations at GCX
Ed Williams, VP EMEA Consulting and Professional Services at Trustwave explains why a balanced cybersecurity strategy should be your ultimate goal
It’s time to embrace the future of authentication and move towards passwordless according to David Higgins, EMEA Technical Director at CyberArk
Zeus Cloud CEO Mark Grindley explains how organisations can best safeguard their data in the wake of the recent 23andMe breach
Thomas Muller-Martin, Global Partner Lead, Omada explains why the evolution of modern identity governance and administration (IGA) solutions is worth your attention
Steven Kenny, Industry Liaison, Architecture & Engineering, Axis Communications, examines the latest cybersecurity compliance regulation - the NIS 2 Directive - and what security businesses should be doing to prepare for it
API security breaches are increasing, even as many organisations express confidence in their security strategies. Is there a disconnect between perception and reality? Shay Levi, CTO and co-founder, Noname Security, explores the issues.
Tesla blames employee wrongdoing for data breach affecting more than 75,000 company employees
Steven Kenny at Axis Communications takes a look at the latest cybersecurity compliance regulation - the NIS 2 Directive - and what security businesses should be doing to prepare
Anthony Webb, Vice President, A10 International explains the importance of combining application delivery with next-gen WAF to build resilience for hybrid cloud environments
The average data breach is estimated to cost $10 million but the personal cost to senior management can last a lifetime.
The number of lost and stolen devices across several government departments has soared in recent times, raising deep concerns over data safety
Michael Jenkins, CTO at ThreatLocker, explains the role that Zero Trust can play in hindering third-party vendor cyber threats
David Corlette, Vice President - Product Management, VIPRE Security Group, explains how smart endpoint detection and response can help smaller organisations combat ransomware.
Cyberattacks are growing increasingly sophisticated, with 97% of companies being targeted by email-based phishing attacks in 2022.
Despite the growing awareness of the necessity for more advanced cyber security, firms are still falling foul of attacks which are undetected when they arrive and can linger for years. Adam Blake, CEO and Founder of ThreatSpike discusses the reasons why businesses are missing the mark and how they can keep one step ahead of cyber-attacks.
Investing in cybersecurity should be at the top of businesses' priorities for 2023, and a 360-degree approach that combines technology solutions, email protection and security awareness training will be key, as Usman Choudhary, Chief Product Officer, VIPRE explains.
In 2023, some of the biggest corporate names were brought to their knees. Can we expect any better an outcome this year?
Phil Dunlop, VP EMEA at Progress takes a closer look at how legal files are typically being electronically stored in legal organisations - and the challenges faced by legal tech pros in order to keep them safe
Lee Schor, Chief Revenue Officer of VIPRE outlines the crucial technology tools and training needed to reduce the threat of phishing attacks and, ultimately, for organisations to create a phishing prevention toolkit
The second largest ever fine for a breach of the European Union's General Data Protection Regulation was slapped on Instagram recently - €405 million. Will this force organisations to adopt stricter data management and protection measures going forward?
Michael Jenkins, Chief Technology Officer at ThreatLocker shares his top three methods to protect your business from ransomware cyber threats
Cédric Milloux, Solutions Consultant specialised in SD-WAN and Security at GTT, explains why a cyber strategy that pre-empts attacks is better than one which just reacts
David Higgins, Senior Director, Field Technology Office at CyberArk, offers a brief history of ransomware, and explains how we can stay one step ahead in the future
Dan Lattimer, Director Government & Defence, EMEA at CyberArk assesses the security risks lurking in legacy systems.
David Higgins, Senior Director, Field Technology Office at CyberArk gives us six endpoint security rules to isolate attacker activity, reduce the impact of a breach and allow organisations to regain control of their environments
Julia O'Toole, CEO and Founder of MyCena, explains why current cybersecurity approaches creates systemic vulnerabilities
How can law firms overcome the risk of relying on email? Andrea Babbs at VIPRE offers the case for the defence.
The General Data Protection Regulation is proving a force for good - but it still has some way to go
Ransomware attacks are growing in cost and frequency. Florian Malecki, Executive Vice President Marketing, Arcserve offers 5 steps that companies should take to protect themselves
As cybercriminals continue to develop new attack techniques and become more sophisticated, the traditional notion of a strong external perimeter being the best – and often only – defence against compromise has shown itself to be inadequate. Sanjay Radia, Chief Solutions Architect at NETSCOUT explains why.
Andrea Babbs, UK General Manager, VIPRE highlights the importance for IT teams to harden endpoints across the business to effectively manage security threats, and emphasises the importance of vulnerability and patch management.
If your company hasn’t experienced a ransomware attack yet then brace yourself - because it’s coming, according to Roel Decneut, CMO at Lansweeper
Adrian Taylor at A10 Networks explains why a zero trust architecture is the ideal way to mitigate a breach in your network
Hybrid working presents a number of security challenges for IT teams. Rodolphe Harand, VP of Sales at YesWeHack, looks at how to address them.
David Higgins, EMEA Technical Director at CyberArk, takes a closer look at three cyber attacks that deserved more attention in 2021
UK-based IT managed services company TSG offer a guide to determining the biggest cybersecurity risks in your business.
A recent report from Which? magazine has again highlighted the vulnerabilities of online security systems.
As we approach the end of the year Network Computing asked industry experts for their 2022 cybersecurity predictions
Avishai Wool, CTO and Co-Founder of AlgoSec looks at how SMBs can mitigate the risks associated with cyberattacks
Paul German, CEO at Certes Networks, on the risks associated with bulk encryption strategies and the importance of crypto-segmentation
Amir Hashmi, CEO and founder of managed IT provider zsah, runs through his top tips for remote workers and managers for staying cyber-safe when WFH
With supply chains under extreme pressure and shortages forecast, Paul Harris, Managing Director, Pentest Limited, looks at the implications of such threats from an economic, business - and security - standpoint
Are you being forced into the multi-factor authentication market? Nick Evans, Partner Enablement Manager (US & Nordic Regions), SecurEnvoy, examines why this is happening
Paul German, CEO at Certes Networks discusses the often misplaced confidence surrounding cybersecurity in businesses.
Michele Mabilia at Kyocera Document Solutions UK explains why a holistic approach to security is the best way forward.
It might take only minutes for a cybercriminal to break into your network - so how do you ensure they never get that far?
I.T. teams must have a bigger seat, and budget, at the boardroom table, according to Andrea Babbs, General Manager, VIPRE Security UK and Ireland
How businesses can strengthen their cybersecurity posture against the ransomware evolution
Why is it that the security industry talks about network security, but not data breaches? It’s clear that something needs to change, and according to Paul German, CEO, Certes Networks, the change is simple.
Anthony Perridge at ThreatQuotient explains how to leverage a MSSP/MDR SOC contract to enhance global SecOps maturity
The General Data Protection Regulation laws are two years old, but are they having the impact expected in forcing organisations to protect their data to the highest standards? Brian Wall reports
It's not just cyber security that is at stake when working from home. Your physical safety needs to be taken care of as well
What is hailed as a significant step forward in the UK's fight against online harm has been taken, with the launch of the Online Safety Tech Industry Association (OSTIA)
As 5G gains momentum by offering advances in both speed and reach, Michael Adjei, CyberSecurity specialist at Nuvias considers the often-overlooked role of risk exposure and how it can be managed
As networks morph in shape and application, characterised by high growth with high security, a secure access service edge might be the logical next step. Stefan Keller, CTO at Open Systems explains sase
The impact of indiscriminate malicious activity online is soaring and estimated to hit a global price tag of $6 trillion by next year.
Movement away from the Darknet, as actors scatter in all directions, is making it ever harder to keep tabs on who is selling what, where and to whom, says Mark Pearce, chief marketing officer, CYJAX
Cybersecurity is still a young industry but it's growing fast. Theresa Lanowitz, Director of Cybersecurity Communications at AT&T Cybersecurity thinks we are at a critical point in cybersecurity's evolution
With operational technology and IT naturally coalescing, there is a new emerging cyber-physical threat. Chris Sherry, Regional Vice President of EMEA North at Forescout explains this disruptive threat vector
As long as cybersecurity is the responsibility of a single department it will remain compromised. Mark Rodbert, CEO at Idax explains the role of identity and access management in changing this
Active Directory is fundamental to digital life. Emmanuel Gras, CEO of Alsid explains why it's time to start paying proper attention to its security
Fast network provisioning needs to be hardwired to the simultaneous provisioning of security. Laurent Zimmerli of Open Systems argues that cloud-ready network management practices are required to deliver a new security reality
An incident response plan designed to deal with inevitable cyber compromise has never been more urgent. Robin Oldham, Head of Cyber Security Consulting Practice at BAE Systems makes the case
In challenging times, an evaluated threat-centric approach can ensure that cyber resources are used wisely. Marina Kidron, Head of the Skybox Research Lab offers some recommendations
Could it be that new malware features matter less than you might think - and that what really matters is behaviour? Computing Security gets some of the industry’s views.
Cyber threat hunting could be considered an unaffordable luxury. Andrew Bushby, UK director at Fidelis Cybersecurity explains why it is now a necessity to stay safe
Traditional penetration testing has its limitations. Simon Roe, Product Manager at Outpost24 explains how this is evolving and the value proposition improved
Network connected multifunction printers are a credible security threat. Louella Fernandes, Director at Quocirca explains the risk and offers some thoughts on mitigation
we are always recommended to use long, account specific passwords, but remembering them is a challenge. Anjola Adeniyi, Technical Account Manager at Securonix explains why Password Managers are a flawed, but essential, security tool
The progress of DevOps continues, but what about the security risk it brings? Dror Davidoff, CEO and co-founder at Aqua Security shares his thoughts on mitigating the new security risks of containers
Magnus Steinberg, Chief Technology Officer at Surfshark says that VPN is the most trending abbreviation of privacy, but he explains that deeper inspection may be warranted
It is true that cyber defence tends to be personal - after all, who can you trust? James Hatch, BAE Systems Applied Intelligence, Cyber Security Director introduces a new way to collaborate
Because of their back office and cloud location, server protection has not received adequate attention. Paul Murray, Product Director at Sophos considers server-specific threats and possible responses
Organisations of all types are under threat from cryptojackers. Karl Sigler, Threat Intelligence Manager of SpiderLabs at Trustwave, explains how to prevent your organisation from being undermined...
There is no such thing as a fixed attack surface. Moshe Elias, Director of Product Marketing at Allot, explores the vulnerabilities behind mobile and IoT attack surfaces