75 total entries
Show entries.
Action Stations!

The cybersecurity industry has undergone enormous change since the Cybersecurity Act was issued in 2019. High time for a rethink

AI's Hidden Security Risk

Why should it be that each tool you use multiplies your attack surface? We asked Rodolfo Saccani, CTO and head of R&D, Libraesva, for his insights

Strengthening Cyber Hygiene across the Partner Network

Cybersecurity is no longer a 'nice to have' or just an optional extra, argues 101 Data Solutions. It’s much more

Why Cloud Security Needs WAN Acceleration

Storing data in at least three disparate and well separated locations will protect your ability to restart after a serious incident, says one leading cybersecurity expert

2026: seeing off the twists and turns

What will the 'dark forces' of cybersecurity unleash on the industry this year? Several observers offer their thoughts on the challenges lying in wait

Compliance goes 'on trial'

A new corporate criminal offence of 'failure to prevent fraud' has hit the statute books, in a bid to drive an anti-fraud culture and improve business confidence

Targeting the right IAM strategy

We report on the key steps that need to be taken - and pitfalls that should be avoided - when implementing Identity and Access Management

Rage of the machine

Are we nearing the point where machines don't just mishandle data, but actively weaponise their own outputs in obedience to an attacker's request?

Beating back against the Post-Quantum threat

A new set of encryption tools designed to withstand the attack of a quantum computer has been released. How valuable a role might this play?

The battle for outer space

Safeguarding satellites in a digital orbit has never been more crucial

What direction now as ransomware hits hard?

Ransomware remains a formidable adversary, especially when its targets are the backbone of national infrastructure

Off the chart

Attacks on organisations are reaching levels that threaten to leave them damaged and dysfunctional, with long-term recovery far from a given

Shutting out the invaders

A data loss prevention solution can bolster an organisation's defences in many ways, while preventing users from accidentally or maliciously sharing sensitive information

Automation now 'a necessity'

Strict regulatory requirements, sophisticated cyber threats and the soaring growth of sensitive data demands a more systematic, automated approach to security and compliance

Making the pen mightier

How can you be sure that a day/week/month after a successful pen test your security has not been compromised and your systems left ripe for exploitation?

Compliance Defiance

With up to two-thirds of European businesses estimated to have missed the latest EU security compliance deadline, the fall-out could prove severe for UK organisations

It's a privilege!

Privileged Access Management has shown itself a powerful ally when keeping businesses safe

Crime gangs can triumph with AI

Generative Artificial Intelligence and its blend with deepfake technology has affected voice, image and video. What protections can be put in place?

Clampdown on compliance failures

Failure to comply with the General Data Protection Regulation could result in fines of up to €20 million or 4% of annual global turnover - and the screws are being tightened

At the AI crossroads

Are the criminals on the front foot in the battle to use AI for good or bad? Editor Brian Wall reports

Fatigue Red Alert

The explosion of digital accounts has led to a significant increase in 'account fatigue,' impacting the way consumers interact with businesses online, states new research

Democracy under siege

Electoral misinformation and disinformation are expected to create distorted and muddied political landscapes throughout this year, prime for exploitation

Uncertainty the only certainty

Part 2 of Computing Security's delve into how the 'darker forces' of cyber security might impact the industry in the months ahead

Getting your Act together!

Edward Machin, of Ropes & Gray, sets out the core obligations of the upcoming Digital Operational Resilience Act

Gone nuclear

Security issues at UK civil nuclear facilities have been on the up, while inspection levels fall away. How vulnerable is that leaving the UK to accidents or worse?

No compromise on trust

macmon secure is adamant that no device, nor user, should be trusted until secure authentication has taken place

Driving employee engagement

MetaCompliance's new departmental-focused cybersecurity training series aims to address department-specific concerns and reduce resistance to user training completion

Faking it with AI

Standing on the cusp of a new frontier is exhilarating, but it's also a precipice we risk tumbling over, warns one AI expert

Ransomware threatens backup files

Could the last line of defence against one of the most pernicious forms of attack now be in danger? Here, Daniel Hofmann, CEO, Hornetsecurity, offers his thoughts

Businesses deeply troubled about ransomware attacks

More than half of leadership teams are ‘actively involved’ in decision-making on preventing attacks

Tensions mount

The continued geopolitical tensions, stronger regulation and AI-shaped revolution forecast by Infosecurity Europe's security community are all intensifying as 2023 enters its final phase

Why being agile matters when it comes to a ransomware attack

Steve Usher, Security Services Manager, Brookcourt Solutions, offers his expert insights

Why we need a return to Prevention-first Cybersecurity

Stopping zero days, ransomware and other never-before-seen malware is a race against the clock, warns Karen Crowley, Director of Product & Solutions Marketing at Deep Instinct

MFA best practices you didn't know you needed

What are the MFA best practices that organisations need to consider? Chris Martin, Head of Solution Architecture, SecurEnvoy, offers his expert insights

From hard-bitten to a bit softer ransoms?

It has emerged that HardBit ransomware operators want to work with victims to negotiate a pay-off behind the back of cyber insurance companies.

Unlocking 'lifesaving' data

The NHS and other key institutions should be leaders in piloting Privacy Enhancing Technologies (PETs), argues the Royal Society

Attacked and ‘Stuffed’!

PayPal was hit late last year by a 'credential stuffing' attack aimed at fraudulently gaining access to user accounts

Do We Still Need Firewalls?

In short, yes - now more than ever. There has never been a greater or more deliberate threat to information and communication systems

Infrastructure crumbling

Lack of skills and resources to secure and manage PKI credentials are leaving organisations "racing to reduce risk", as the threat landscape continues to grow

Strengthening the chain: moving from identifying third-party cyber risk

Joel Molinoff, Global Head of Supply Chain Defence at BlueVoyant, considers how organisations can best prioritise and deal with third-party cyber risk

Complete control of your data with on-premise MFA

Chris Martin, Head of Solution Architecture at SecurEnvoy, explores the options for organisations unable to use cloud-based authentication

The Shifting Cybersecurity Conversation

Over the past several years, there has been a monumental shift in the way businesses operate and prioritise cybersecurity. Robert Herjavec, CEO, Cyderes, explains

Awareness training 'failing'

A massive 83% of organisations are not delivering cyber security awareness training that engages employees, warns MetaCompliance

Can construction adapt to a changing climate?

Richard Szoeke-Schuller, Product Manager at SimScale, is driving technology development on microclimate applications for simulating and designing buildings and cities

Getting the balance right

Mike Nelson, VP of IoT Security at DigiCert, explains what the EU Cyber Resilience Act means, in the first move to legislate cybersecurity for the Internet of Things

Bigger 'phish' to fry!

Phishing is never out of season. Indeed, it remains a much-prized asset by attackers seeking to gain initial access to organisations by hooking in the unprepared

Changing the game

Today, the ITAD - IT Asset Disposal - sector has emerged as a professional value-add industry and it's been a long, hard road getting there. But the battle is far from over, says Steve Mellings, founder and CEO of ADISA

Phishing in the dark

Phishing is no new phenomenon - but it is being used more and more as A formidable weapon to attack victims with. What can be done to negate its impact?

Steal Now - Protect Now

Global cyber security experts Norman Willox and Tom Patterson defend the change of quantum computing from science fiction to science fact

RansomCloud: How Ransomware is Attacking the Cloud

John Tipton, Senior Security Consultant at Adarma, looks at the deeply concerning impact ransomware is now making, especially with the emergence of 'RansomCloud'

Absolute Zero

Organisations are starting to switch from a model based on 'trust anyone and anything inside the network' to a 'trust no one and nothing' architecture. Brian Wall reports

Call for help prompts rapid response

A team of experts has been set up to help defend Ukraine from cyber-attacks

Strategic thinking fightback

In the battle to stay ahead of the threats exploiting a whole gamut of vulnerabilities, organisations must implement security strategies on numerous fronts

GDPR Certification Schemes - doing the heavy lifting for you

Was GDPR all hot air or, three years on, are we sitting on a ticking timebomb? In this article, Steve Mellings, Founder ADISA, weighs up ALL OF the evidence

New trains of thought

Ongoing investment in cyber training and upskilling across a business is essential to prevent a major data breach

How Northern Ireland is helping to build a cyber-secure future

A small, nascent cluster of native businesses has been nurtured into a global centre of excellence

Assumptions - more than a roll of the dice

Making assumptions can be a big mistake - yet sometimes it can pay off handsomely. Information security is one such instance of the latter, says Paul Harris, Managing Director, Pentest Limited

Privacy payoff: championing data vigilance as people consider post-pandemic life

While educating consumers is important, individuals must engage by reflecting on their online security and its impact, states David Emm, principal security researcher at Kaspersky

How an IT asset upgrade could be an opportunity for businesses to tackle data security

Robert Allen, Director of Marketing & Technical Services at Kingston Technology Europe, looks at the fresh challenges that hybrid working will bring and how they can be met

The ever darker web

How can organisations stop their data falling into the wrong hands? Terry Greer-King, VP EMEA, SonicWall, offers his insights

The VAT domestic reverse charge

Delayed for a couple of months but now due for rollout in Spring 2021, the HMRC domestic reverse charge is going to mean that some modifications may need to be made to your accounting software, as VAT payments will no longer be made upfront, but rather withheld and paid by the last VAT registered customer.

TIME TO REBALANCE THE BOOKS

Awareness around gender diversity in the cyber security industry is getting better, but there’s still a long way to go

Shedding new light on virus impact

Addressing the need for cybersecurity training and preparedness during the on-going lockdown is critical, as Deshini Newman, managing director EMEA, (ISC)², explains

Remote Working: Do It Right

How do you ensure your business remains secure during remote working? Phil Underwood, Chief Information Officer, SecurEnvoy, and Chris Cassell, Technical Specialist, SecurEnvoy, offer their insights

The intelligent Approach to Cyber Threat Intelligence

Seeking someone who can understand vulnerability, exploitation and attacker motivation? Ian Thornton-Trump, Chief Information Security Officer for Cyjax, may have the answer

Spoof attack unleashed

The Coronavirus is constantly in our thoughts, as its global impact spreads. And it's proving another means for hackers and attackers to get inside organisation's security defences

ISO 27701: the new international privacy standard to demonstrate compliance with privacy laws

In August 2019, the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) released a new privacy standard set to become the benchmark for helping organisations comply with international privacy frameworks and laws. ISO/IEC 27701:2019 serves as a privacy extension to the internationally recognised management standard for information security, ISO/IEC 27001, which already enjoys significant global adoption rates

Raising the Standard!

Rob Treacey, MD, Technology Risk Management, and Antony Tuttle, Senior Consultant and QSA at Xcina Consulting, a Shearwater Group plc company, offer their insights on the latest PCI-DSS Standard developments

Jumping on the Band Wagon

The latest data breach from Facebook is not all that it seems, states Dr Debbie Garside, Group Chief Innovation Scientist/CEO of GeoLang, A Shearwater Group plc Company

The dark shadow that hangs over everyone

Cryptojacking and shadow mining are terms most of us have heard. But how do they differ and what threats does each of these pose?

Leading scale-ups boost cyber security future

Twenty fast-growth cyber scale-ups have been accepted on to the first national cyber security growth programme - and they mean business

Life Inside the Perimeter: Understanding the Modern CISO

Major Global Study of Senior Cyber Security Professionals reveals increasing pressure, workload and budgetary deficits

Q & As with EasyBuild

EasyBuild's Construction Software platform forms the basis of a Q & A session for companies and contractors taking the first steps towards complete integration of their financial and project management solutions

9 million Brits fall victim to cybercrime

Consumers increasingly feel companies should be responsible for protecting victims - but is that simply surrendering responsibility?