Recent Issues
Latest Issue
CS Sep-Oct 2025
CS Jul-Aug 2025
CS May-Jun 2025
CS Mar-Apr 2025
CS Jan-Feb 2025
CS Nov-Dec 2024
CS Sep-Oct 2024
CS Jul-Aug 2024
CS May-Jun 2024
CS Mar-Apr 2024
CS Jan-Feb 2024
CS Nov-Dec 2023
CS Sep-Oct 2023
CS Jul-Aug 2023
CS May-Jun 2023
CS Mar-Apr 2023
CS Jan-Feb 2023
CS Nov-Dec 2022
CS Sep-Oct 2022
CS Jul-Aug 2022
CS May-Jun 2022
CS Mar Apr 2022
CS Jan Feb 2022
CS Sep-Oct 2021
CS May-Jun 2021
CS Mar-Apr 2021
CS Nov-Dec 2020
CS May-Jun 2020
CS Mar-Apr 2020
CS Jan-Feb 2020
Keeper Security KeeperPAM Review...
Product Review | October 2025
Privileged access management (PAM) is an essential cybersecurity strategy that allows businesses to significantly reduce their attack surface - and Keeper Security's KeeperPAM offers a sophisticated solution for protecting access to critical resources.
Where fact and fiction...
Review | January 2025
In an era where artificial intelligence can create content indistinguishable from reality, separating truth from fiction is getting ever more difficult
An honourable quest
Review | September 2024
Cybersecurity has never had an overarching code of ethics and conduct. Authors Paul J. Maurer and Ed Skoudis want to see that failure fully addressed
BackBox Network Automation Platform...
Product Review | July 2024
As enterprise networks grow in complexity, businesses can no longer afford to rely on inefficient and error-prone manual processes to manage and maintain critical infrastructure devices.
Portnox Cloud
Product Review | May 2024
Network access control and endpoint security have a mixed reception in enterprises, as many solutions are challenging to deploy, complex to manage and prohibitively expensive
The dark side of...
Review | May 2024
A new book offers a penetrating look into the murky, darker recesses of artificial intelligence
NetAlly CyberScope Air
Product Review | March 2024
When NetAlly launched its CyberScope last year it proudly hailed it as the world’s first wired and wireless handheld network vulnerability scanner capable of providing in-depth cybersecurity analysis and reporting. NetAlly has now released the CyberScope Air, which places all the same great features in the hands of technicians responsible for wireless security at the network edge.
AI - weapon of...
Review | March 2024
AI has become a vast topic of debate: will it help us thrive or prove our nemesis? A new book tackles the implications for this controversial technology head on
Inside the revolution
Review | November 2023
A range of powerful technologies is disrupting and transforming every corner of our reality. A new book argues why and how we must act and adapt to this
Hornetsecurity 365 Permission Manager
Review | November 2023
Microsoft 365 (MS365) is the productivity and communications platform of choice for organisations of all sizes, with it already having reached a staggering 382 million paid seats this year.
Hornetsecurity Security Awareness Service...
Product Review | October 2023
Cybercriminals never sit still and are always looking for new ways to outwit businesses and breach their security controls.
macmon NAC
Product Review | October 2023
macmon's NAC product is designed to be simple to deploy and maintain, while protecting your network from the outset.
News
Attacks reach internet tsunami...
News | January 2026
DigiCert has released its first RADAR Threat Intelligence Brief, delivering...
Fight gathers pace...
News | January 2026
A digital learning company that operates inside some of the...
STV pushes forward with...
News | January 2026
One of the fastest-growing defence innovators has signed a licence...
Proofpoint completes acquisition of...
News | January 2026
Move reinforces strategy to to extend Proofpoint's human-centric security platform...
Cloudflare outage raises deeper...
News | January 2026
The recent Cloudflare outage, which was caused by a runaway...
Lloyds to support SME...
News | January 2026
Lloyds Banking Group (LBG) has been announced as a National...
Acquistions and partnerships expand...
News | January 2026
Kiteworks has made several acquistions of late and engaged in...
Arctera joins the cloud...
News | January 2026
Cloud Software Group has completed its acquisition of Arctera.
Backup blow
News | November 2025
Gaping holes in organisational backup strategies have been uncovered, despite...
Breach sparks 70-year low...
News | November 2025
The high-profile cyber-attack that was unleashed on Jaguar Land Rover...
No end to cyber-attack...
News | November 2025
Fallout from the cyber-attack on JLR in September - estimated...
Advantech showcases its latest...
News | November 2025
Advantech used the recent SIDO Lyon 2025 exhibition to showcase...
Keeping the enemy beyond...
Feature | January 2026
Cyberattacks are growing in number relentlessly and demand constant testing...
All in a spin...
Feature | January 2026
Nihilistic fears abound that AI could replace humans in many...
Putting the 'resilience' into...
Feature | November 2025
What actions need to be taken to elevate cyber resilience...
Lighting the way forward...
Feature | November 2025
Encryption can be rewarding - but challenging. However, using that...
AI - Friend or...
Feature | August 2025
AI's transformative power is acknowledged in many quarters, yet these...
Data theft onslaught
Feature | August 2025
Attacks and breaches are showing no sign of easing off...
Health issues
Feature | August 2025
The NHS is a huge and vulnerable target for cyber...
Compliance alliance
Feature | June 2025
The continuing threat of a global trade war, diverging regulations...
Threat levels soar to...
Feature | June 2025
Advanced Persistent Threats (APTs) hit a staggering 43% of all...
Action stations!
Feature | April 2025
What exactly are the essential elements of an incident response...
The insider menace
Feature | April 2025
IAM systems not properly integrated or maintained pose multiple issues,...
Cracking up
Feature | April 2025
Once the first quantum computers are 'live', most of our...
Interviews
Role of industry collaboration...
Interview | September 2025
Computing Security has been talking to Mark Hendry, Partner and...
In whom we trust...
Interview | January 2025
Computing Security sat down recently for a fireside chat with...
Inside a hidden world...
Interview | November 2023
Computing Security speaks with Andy Syrewicze, technical evangelist, Hornetsecurity, about...
Welcome to the (third)...
Interview | October 2022
Computing Security recently caught up with Hornetsecurity chief technical officer...
Object Archive software -...
Interview | September 2022
Fujifilm recently launched Object Archive, described as 'an S3-compatible tape...
Perenna - helping to...
Interview Case Study | December 2021
Perenna is creating a bank where mortgages will be funded...
Always at your disposal...
Interview | July 2018
Computer Disposals Ltd (CDL) is one of the UK's leading...
Behind the scenes at...
Interview | September 2017
Significant change is now taking place at Capita Cyber Security....
On your metal!
Case Study | November 2023
When one metal fabrication company suffered several malware attacks, it...
Furness College enjoys 50%...
Case Study | February 2022
In-built ransomware protection enables rapid recovery of individual files and...
Perenna - helping to...
Interview Case Study | December 2021
Perenna is creating a bank where mortgages will be funded...
Helping to redefine the...
Case Study | December 2021
Why Remote Internal Infrastructure...
Case Study | November 2021
“Everything from email servers and internal staff networks, through to...
8am and I.T. is...
Case Study | September 2021
Stark lesson unfolds in the cyber security dangers that are...
Automating identity and access...
Case Study | October 2020
One Identity partners have helped Jumbo Supermarkets to maximise its...
Profits and Pitfalls
Case Study | June 2020
Well-crafted social media content can deliver a multitude of benefits....
KnowBe4 Decreases the Risk...
Case Study | June 2020
SIG plc. is a leading wholesale distributor in Europe of...
Securing privileged access for...
Case Study | June 2020
Prosegur uses RPA to transform its business while reducing the...
Leading the charge
Case Study | May 2020
How savvy businesses have successfully flipped the digital switch
Regional U.S. Credit Union...
Case Study | May 2020
Many U.S. states have shut down most non-essential industries, religious...
Power hungry
Research | November 2024
AI's appetite for electricity is putting pressure on power grids,...
Why orphaned data is...
Research | October 2023
Daniel Hofmann, CEO at Hornetsecurity, looks at the sizable threat...
Cyber risk response grabs...
Research | February 2023
Gartner research shows that 88% of boards now regard cybersecurity...
Why ransomware is 'moving...
Research | December 2022
Signs of a new data extortion technique show threat actors...
Top 8 security and...
Research | December 2021
Global analysis and research company Gartner pinpoints where the greatest...
Cyber strategy hits critical...
Research | March 2021
Cyber security has never had more relevance, when set against...
Ransomware soars
Research | May 2020
Working from home can make IT systems far more susceptible...
Who can you really...
Research | July 2019
Those who rely on their online bank to keep their...
Sealing off the breach...
Research | May 2019
A major cyber security breaches survey of UK businesses and...
Printer hacking in the...
Research | January 2019
Print and be damned? If the right security measures aren't...
NHS breach - the...
Research | November 2018
The WannaCry attack that hit the NHS last year, is...
The million pound gamble...
Research | November 2018
New research reveals that UK businesses would have to spend...
A night when the...
Awards | November 2025
The 2025 Computing Security Awards took place at a top...
Triumphs and Trophies
Awards | October 2025
The 2025 Computing Security Awards, staged at a gala ceremony...
Defending as one
Awards Winner | January 2025
The Security Project of the Year winner at the 2024...
The Computing Security Awards...
Awards | December 2024
WINNER: Metacompliance
The Computing Security Awards...
Awards | December 2024
WINNER: Cybaverse
The Computing Security Awards...
Awards | December 2024
WINNER: RedKey USB - Redkey USB Enterprise Edition
The Computing Security Awards...
Awards | December 2024
WINNER: VIPRE Security Group - VIPRE EDR+MDR
The Computing Security Awards...
Awards | December 2024
WINNER: Socura with CymruSoc
The Computing Security Awards...
Awards | December 2024
WINNER: NetAlly - Cyberscope Air
The Computing Security Awards...
Awards | December 2024
WINNER: Gigacycle
The Computing Security Awards...
Awards | December 2024
WINNER: MTI
The Computing Security Awards...
Awards | December 2024
WINNER: Arctera - Simon Jelley, GM & VP of Product
Opinions
Time for a change...
Opinion | January 2026
To shift the needle in the battle against threat actors,...
Time to rethink the...
Opinion | September 2025
The old way of making a business safe isn't working...
Don't let fear hinder...
Opinion | September 2024
Steve Mellings of ADISA makes the case for why the...
Is AI already beyond...
Opinion | March 2024
We invited consultancy and implementation agency WeAreBrain to give us...
What to do when...
Opinion | May 2023
How do hackers get inside an organisation's defences? Is it...
The dystopian world of...
Opinion | December 2022
BBC's recent drama, 'The Capture', was an alarming take on...
How sensitive is your...
Opinion | October 2022
Keeping track of stored data is a complex, difficult task....
Power vacuum
Opinion | August 2022
Cyber Power may well be a vital component in protecting...
2022: Where Packet Capture...
Opinion | May 2022
In today's rapidly changing threat landscape, why aren't more companies...
7 Reasons why SecurEnvoy...
Opinion | May 2022
The summer of 2020 saw Microsoft roll out Azure AD...
Getting to the heart...
Opinion | April 2022
Top companies now use a raft of tools and software...
Essential grains of truth...
Opinion | February 2022
"If you can't get the basics right, it doesn't matter...
New cyber laws must...
Technology Focus | August 2025
MPs show widespread support for stronger cyber laws, along with...
Quantum quakes
Technology Focus | August 2025
The incredible processing power and speed of quantum computers significantly...
Quantum blast-off
Technology | August 2025
The battle to beat the hackers will be fought in...
Adore DORA or not,...
Technology Focus | April 2025
The Digital Operational Resilience Act (DORA) has a wide remit....
Casting an ugly shadow...
Technology Focus | November 2024
What are the risks associated with Shadow IT/AI? Is it...
Face off!
Technology | May 2024
When it comes to device-based and server-based facial authentication, which,...
Put to the test...
Technology Focus | March 2024
With penetration testing used to identify the level of technical...
A world apart
Technology Focus | August 2022
Interest in the metaverse is on the up, but is...
Steering on the safe...
Technology Focus | August 2022
Autonomous vehicles are increasingly making headlines and not always for...
Quantum goes big!
Technology Focus | May 2022
BT and Toshiba launch first commercial trial of quantum secured...
Hacking gets backing!
Technology Focus | May 2022
University ethical challenge platform wins government backing to prepare for...
Facing up to the...
Technology | February 2022
Facial recognition technology, behavioural biometrics, biometric authentication, homomorphic encryption and...
Webinar: Cybersecurity Trends 2026
Events | January 2026
February 18, 2026 2PM GMT
Join our free webinar to stay ahead of all the latest cyber threats!
Show of Strength and...
Industry Focus | January 2026
A new strategic partnership is developing cybersecurity guidance, focused on what is seen as the unique risks of AI and agentic systems
Keeping the enemy beyond...
Feature | January 2026
Cyberattacks are growing in number relentlessly and demand constant testing of defences to see how robust they are
Why Cloud Security Needs...
Special Focus | January 2026
Storing data in at least three disparate and well separated locations will protect your ability to restart after a serious incident, says one leading cybersecurity expert
Webinar you won't want...
Strategy | January 2026
Make sure you join us for our webinar, with expert speakers bringing you insights on the latest ransomware and cybersecurity threats - and how to stay safe when they come calling
Damage limitation
Industry View | January 2026
Incident response is widely used to minimise damage from cyberattacks and security breaches - and prevent future incidents. In the first of a two-part series, we ask those in the know how this is best implemented and managed
Attacks reach internet tsunami...
News | January 2026
DigiCert has released its first RADAR Threat Intelligence Brief, delivering data-driven insights on several emerging cyber threats.
Fight gathers pace...
News | January 2026
A digital learning company that operates inside some of the world's toughest environments has been named the tenth fastest-growing business in the Midlands and East of England in the UK Fast Growth Index 2025.
STV pushes forward with...
News | January 2026
One of the fastest-growing defence innovators has signed a licence deal to use Post-Quantum's communications platform
Time for a change...
Opinion | January 2026
To shift the needle in the battle against threat actors, UK businesses need to take their efforts in a new direction, they've been warned
Attacks persist on multiple...
Comment | January 2026
If you ever wondered whether the variety and intensity of attacks faced by organisations might level off or even fall at some point, think again
2026: seeing off the...
Special Focus | January 2026
What will the 'dark forces' of cybersecurity unleash on the industry this year? Several observers offer their thoughts on the challenges lying in wait