118 total entries
Show entries.
Secure networking in an age of disruption

The security perimeter is dead, according to Jonathan Wright, Chief Product Officer at GCX Managed Services, and it's time to rethink how networking and security are aligned.

A resilient response

The UK Cybersecurity and Resilience Bill provides a new era of accountability for critical infrastructure according to Johnny Carpenter, VP Channels and Alliances EMEA at 11:11 Systems

Cybersecurity burnout: the sleeping giant awakening for UK businesses

Mike Fry, Infrastructure Data and Security Solutions Director at Logicalis UKI, on why the biggest threat to business security may not be hackers but burnout, as overstretched cyber teams struggle to keep pace with an unrelenting wave of attacks.

Filtering out the bad stuff

Why it's time for email security to embrace a smarter, privacy-first approach

Confronting the AI triple threat

David Higgins, Senior Director, Field Technology Office at CyberArk discusses how security identity is key to safe integration

Moving beyond compliance to true resilience

Organisations can no longer afford to rely solely on achieving compliance as a defence strategy argues Sean Tilley, Senior Director of Sales for EMEA at 11:11 Systems.

You're not protecting your data, you're pretending to

Simon Pamplin, CTO, Certes believes that most organisations aren't protecting their data; they're preserving the illusion of security. And it's costing them dearly.

AI’s evolving role in the rising costs of ransomware

Gerald Beuchelt, CISO at Acronis, offers a deep dive into the evolution and ongoing threat of ransomware - and how AI is now being deployed in cyberattacks

Data protection vs. cyber resilience: mastering both in a complex IT landscape

It's no longer a question of whether companies should prioritise data protection or cyber resilience but rather how to integrate both, according to Sean Tilley at 11:11 Systems

Operational resilience

Tech Evangelist Sascha Giese at SolarWinds explains how cybersecurity leaders are rethinking operational resilience in the age of cloud-native infrastructure and AI-driven threats

Unifying automated security

Mike Fry, Infrastructure Data & Security Solutions Director at Logicalis UK&I, on how MXDR can help security teams overcome IT middle management challenges

Identifying NIS2 challenges

Anders Askasen, product marketing director, Omada, on making the connection Between NIS2 compliance and identity management

Planning for cyber incident recovery

Justin Giardina, Chief Technology Officer at 11:11 Systems, on why conventional disaster recovery won't save you from ransomware

Why there should be no You in USB

Jon Fielding, Managing Director for EMEA at Apricorn explains why businesses can't afford to let USB storage devices create a sticky security situation

From Login to Logout: A unified approach to workforce identity protection

The new year is the perfect time to make sure that your workforce identities are secure, according to David Higgins, Senior Director, Field Technology Office at CyberArk

Will AI drive the future of pentesting?

Conor O'Neill, CEO and Co-Founder of online pentest vendor OnSecurity, shares how AI can help enhance the pentesting process - but not without human expertise

Streamlining network security

John Stevenson, Senior Product Marketing Manager at Skybox Security, on automating daily work for network professionals

Serious epidemic looming

Global organisations are said to be facing a ransomware epidemic, due to never-ending breaches. How do they avoid the 'point of no return'?

Cybersecurity Awareness Month: How a collective responsibility strengthens security

Josh Goldfarb, Field CISO, F5 outlines five steps that businesses and consumers can take to enhance cybersecurity and prevent fraud

Why UK organisations can't afford to ignore the EU's NIS2 Directive

"UK organisations must act swiftly to determine if the NIS2 Directive applies to their operations", cautions Horizon3.ai's Keith Poyser

Safeguarding your organisation's AI deployment

Andy Thompson, Offensive Research Evangelist at CyberArk Labs, on how to avoid an AI identity crisis

NIS2 - are you ready?

Keepit CISO Kim Larsen explains why UK IT teams need to prepare for the EU’s new cybersecurity directive

Double Defence

Larry Goldman, Director, Product Marketing at Progress gives us a guide to the powerful security provided by border and web application firewalls

Six of the best?

With six years to its name, how has GDPR fared so far?

Remote work in the face of evolving cyber threats

Critical gaps in network security are an obstacle to the future of work, according to Jonathan Wright, Director of Products and Operations at GCX

It’s not offence or defence - it’s both!

Ed Williams, VP EMEA Consulting and Professional Services at Trustwave explains why a balanced cybersecurity strategy should be your ultimate goal

You shall not pass!

It’s time to embrace the future of authentication and move towards passwordless according to David Higgins, EMEA Technical Director at CyberArk

On-premises vs hybrid cloud: mitigating risk

Zeus Cloud CEO Mark Grindley explains how organisations can best safeguard their data in the wake of the recent 23andMe breach

Avoiding an identity crisis

Thomas Muller-Martin, Global Partner Lead, Omada explains why the evolution of modern identity governance and administration (IGA) solutions is worth your attention

Complying with the NIS 2 Directive to help secure critical assets

Steven Kenny, Industry Liaison, Architecture & Engineering, Axis Communications, examines the latest cybersecurity compliance regulation - the NIS 2 Directive - and what security businesses should be doing to prepare for it

API security threats rising as confidence also increases

API security breaches are increasing, even as many organisations express confidence in their security strategies. Is there a disconnect between perception and reality? Shay Levi, CTO and co-founder, Noname Security, explores the issues.

Tesla data breach 'an insider job'

Tesla blames employee wrongdoing for data breach affecting more than 75,000 company employees

Complying with the NIS 2 Directive to help customers secure critical assets

Steven Kenny at Axis Communications takes a look at the latest cybersecurity compliance regulation - the NIS 2 Directive - and what security businesses should be doing to prepare

Boosting your cloud defence

Anthony Webb, Vice President, A10 International explains the importance of combining application delivery with next-gen WAF to build resilience for hybrid cloud environments

The ROI of Doing Nothing

The average data breach is estimated to cost $10 million but the personal cost to senior management can last a lifetime.

Lost and stolen

The number of lost and stolen devices across several government departments has soared in recent times, raising deep concerns over data safety

The third-party threat

Michael Jenkins, CTO at ThreatLocker, explains the role that Zero Trust can play in hindering third-party vendor cyber threats

The Importance of Investing in EDR for SMEs

David Corlette, Vice President - Product Management, VIPRE Security Group, explains how smart endpoint detection and response can help smaller organisations combat ransomware.

Cyber threats are hitting business leaders hard

Cyberattacks are growing increasingly sophisticated, with 97% of companies being targeted by email-based phishing attacks in 2022.

How businesses can stay safe from undetected cyber attacks

Despite the growing awareness of the necessity for more advanced cyber security, firms are still falling foul of attacks which are undetected when they arrive and can linger for years. Adam Blake, CEO and Founder of ThreatSpike discusses the reasons why businesses are missing the mark and how they can keep one step ahead of cyber-attacks.

Getting your cybersecurity foundations right in 2023

Investing in cybersecurity should be at the top of businesses' priorities for 2023, and a 360-degree approach that combines technology solutions, email protection and security awareness training will be key, as Usman Choudhary, Chief Product Officer, VIPRE explains.

Point of impact

In 2023, some of the biggest corporate names were brought to their knees. Can we expect any better an outcome this year?

Protecting legal files in the golden age of cybercrime

Phil Dunlop, VP EMEA at Progress takes a closer look at how legal files are typically being electronically stored in legal organisations - and the challenges faced by legal tech pros in order to keep them safe

Investing in a phishing prevention toolkit

Lee Schor, Chief Revenue Officer of VIPRE outlines the crucial technology tools and training needed to reduce the threat of phishing attacks and, ultimately, for organisations to create a phishing prevention toolkit

Regulators mean business!

The second largest ever fine for a breach of the European Union's General Data Protection Regulation was slapped on Instagram recently - €405 million. Will this force organisations to adopt stricter data management and protection measures going forward?

Three steps to stay ransomware-free

Michael Jenkins, Chief Technology Officer at ThreatLocker shares his top three methods to protect your business from ransomware cyber threats

Making the case for Managed Detection and Response

Cédric Milloux, Solutions Consultant specialised in SD-WAN and Security at GTT, explains why a cyber strategy that pre-empts attacks is better than one which just reacts

Ransomware Rewind: from the beginning

David Higgins, Senior Director, Field Technology Office at CyberArk, offers a brief history of ransomware, and explains how we can stay one step ahead in the future

Cyber debt: An undetected threat to the public sector?

Dan Lattimer, Director Government & Defence, EMEA at CyberArk assesses the security risks lurking in legacy systems.

Why employee workstation security can't be forgotten

David Higgins, Senior Director, Field Technology Office at CyberArk gives us six endpoint security rules to isolate attacker activity, reduce the impact of a breach and allow organisations to regain control of their environments

The key to cybersecurity

Julia O'Toole, CEO and Founder of MyCena, explains why current cybersecurity approaches creates systemic vulnerabilities

A Legal defence strategy

How can law firms overcome the risk of relying on email? Andrea Babbs at VIPRE offers the case for the defence.

Four-year milestone for GDPR

The General Data Protection Regulation is proving a force for good - but it still has some way to go

Stay aware of ransomware

Ransomware attacks are growing in cost and frequency. Florian Malecki, Executive Vice President Marketing, Arcserve offers 5 steps that companies should take to protect themselves

How to increase security via a zero trust architecture

As cybercriminals continue to develop new attack techniques and become more sophisticated, the traditional notion of a strong external perimeter being the best – and often only – defence against compromise has shown itself to be inadequate. Sanjay Radia, Chief Solutions Architect at NETSCOUT explains why.

Closing Cybercrime Gaps

Andrea Babbs, UK General Manager, VIPRE highlights the importance for IT teams to harden endpoints across the business to effectively manage security threats, and emphasises the importance of vulnerability and patch management.

Ransomware attacks: You can’t protect what you can’t see

If your company hasn’t experienced a ransomware attack yet then brace yourself - because it’s coming, according to Roel Decneut, CMO at Lansweeper

Zero Trust Architecture: 5 Reasons You Need It

Adrian Taylor at A10 Networks explains why a zero trust architecture is the ideal way to mitigate a breach in your network

A resilient approach to hybrid working

Hybrid working presents a number of security challenges for IT teams. Rodolphe Harand, VP of Sales at YesWeHack, looks at how to address them.

Tales of the unexpected

David Higgins, EMEA Technical Director at CyberArk, takes a closer look at three cyber attacks that deserved more attention in 2021

Prioritising levels of risk in your cybersecurity assessment

UK-based IT managed services company TSG offer a guide to determining the biggest cybersecurity risks in your business.

Vulnerabilities of online security systems pinpointed

A recent report from Which? magazine has again highlighted the vulnerabilities of online security systems.

The year ahead in cybersecurity

As we approach the end of the year Network Computing asked industry experts for their 2022 cybersecurity predictions

Why cybersecurity isn’t reserved for the Fortune 500

Avishai Wool, CTO and Co-Founder of AlgoSec looks at how SMBs can mitigate the risks associated with cyberattacks

Harvest Now, Decrypt Later

Paul German, CEO at Certes Networks, on the risks associated with bulk encryption strategies and the importance of crypto-segmentation

Top 6 Home Cybersecurity Techniques for Remote Workers

Amir Hashmi, CEO and founder of managed IT provider zsah, runs through his top tips for remote workers and managers for staying cyber-safe when WFH

Security and the supply chain

With supply chains under extreme pressure and shortages forecast, Paul Harris, Managing Director, Pentest Limited, looks at the implications of such threats from an economic, business - and security - standpoint

Authentication vs Insurance

Are you being forced into the multi-factor authentication market? Nick Evans, Partner Enablement Manager (US & Nordic Regions), SecurEnvoy, examines why this is happening

Cybersecurity – are you confident or complacent?

Paul German, CEO at Certes Networks discusses the often misplaced confidence surrounding cybersecurity in businesses.

A zero-trust future for a hybrid working world

Michele Mabilia at Kyocera Document Solutions UK explains why a holistic approach to security is the best way forward.

How to disrupt the kill-chain

It might take only minutes for a cybercriminal to break into your network - so how do you ensure they never get that far?

I.T. is the new VIP

I.T. teams must have a bigger seat, and budget, at the boardroom table, according to Andrea Babbs, General Manager, VIPRE Security UK and Ireland

Prevention is better than cure

How businesses can strengthen their cybersecurity posture against the ransomware evolution

Three reasons why the security industry is protecting the wrong thing

Why is it that the security industry talks about network security, but not data breaches? It’s clear that something needs to change, and according to Paul German, CEO, Certes Networks, the change is simple.

A modern SOC should include a Threat Intelligence practice

Anthony Perridge at ThreatQuotient explains how to leverage a MSSP/MDR SOC contract to enhance global SecOps maturity

Laying down the law

The General Data Protection Regulation laws are two years old, but are they having the impact expected in forcing organisations to protect their data to the highest standards? Brian Wall reports

Double-edged threat

It's not just cyber security that is at stake when working from home. Your physical safety needs to be taken care of as well

Voice of hope

What is hailed as a significant step forward in the UK's fight against online harm has been taken, with the launch of the Online Safety Tech Industry Association (OSTIA)

5G: the human as supervisor

As 5G gains momentum by offering advances in both speed and reach, Michael Adjei, CyberSecurity specialist at Nuvias considers the often-overlooked role of risk exposure and how it can be managed

Securing at the edge

As networks morph in shape and application, characterised by high growth with high security, a secure access service edge might be the logical next step. Stefan Keller, CTO at Open Systems explains sase

World-wide malice

The impact of indiscriminate malicious activity online is soaring and estimated to hit a global price tag of $6 trillion by next year.

The Professionalisation of the Darknet

Movement away from the Darknet, as actors scatter in all directions, is making it ever harder to keep tabs on who is selling what, where and to whom, says Mark Pearce, chief marketing officer, CYJAX

Evolving cybersecurity

Cybersecurity is still a young industry but it's growing fast. Theresa Lanowitz, Director of Cybersecurity Communications at AT&T Cybersecurity thinks we are at a critical point in cybersecurity's evolution

Disruption agenda

With operational technology and IT naturally coalescing, there is a new emerging cyber-physical threat. Chris Sherry, Regional Vice President of EMEA North at Forescout explains this disruptive threat vector

The security Co-op

As long as cybersecurity is the responsibility of a single department it will remain compromised. Mark Rodbert, CEO at Idax explains the role of identity and access management in changing this

Active Directory exposed

Active Directory is fundamental to digital life. Emmanuel Gras, CEO of Alsid explains why it's time to start paying proper attention to its security

Cloud-centric security

Fast network provisioning needs to be hardwired to the simultaneous provisioning of security. Laurent Zimmerli of Open Systems argues that cloud-ready network management practices are required to deliver a new security reality

A crafted cyber response

An incident response plan designed to deal with inevitable cyber compromise has never been more urgent. Robin Oldham, Head of Cyber Security Consulting Practice at BAE Systems makes the case

Targeting harm

In challenging times, an evaluated threat-centric approach can ensure that cyber resources are used wisely. Marina Kidron, Head of the Skybox Research Lab offers some recommendations

Malware Malaise

Could it be that new malware features matter less than you might think - and that what really matters is behaviour? Computing Security gets some of the industry’s views.

Hunter or hunted?

Cyber threat hunting could be considered an unaffordable luxury. Andrew Bushby, UK director at Fidelis Cybersecurity explains why it is now a necessity to stay safe

Penetrating security costs

Traditional penetration testing has its limitations. Simon Roe, Product Manager at Outpost24 explains how this is evolving and the value proposition improved

Printing risk

Network connected multifunction printers are a credible security threat. Louella Fernandes, Director at Quocirca explains the risk and offers some thoughts on mitigation

The password paradox

we are always recommended to use long, account specific passwords, but remembering them is a challenge. Anjola Adeniyi, Technical Account Manager at Securonix explains why Password Managers are a flawed, but essential, security tool

Containing risk

The progress of DevOps continues, but what about the security risk it brings? Dror Davidoff, CEO and co-founder at Aqua Security shares his thoughts on mitigating the new security risks of containers

VPN efficacy

Magnus Steinberg, Chief Technology Officer at Surfshark says that VPN is the most trending abbreviation of privacy, but he explains that deeper inspection may be warranted

The Intelligence Network is launched

It is true that cyber defence tends to be personal - after all, who can you trust? James Hatch, BAE Systems Applied Intelligence, Cyber Security Director introduces a new way to collaborate

The server threat exposed

Because of their back office and cloud location, server protection has not received adequate attention. Paul Murray, Product Director at Sophos considers server-specific threats and possible responses

Mine your own business?

Organisations of all types are under threat from cryptojackers. Karl Sigler, Threat Intelligence Manager of SpiderLabs at Trustwave, explains how to prevent your organisation from being undermined...

The mobile attack surface

There is no such thing as a fixed attack surface. Moshe Elias, Director of Product Marketing at Allot, explores the vulnerabilities behind mobile and IoT attack surfaces