315,000 new malicious files detected every day
The overall global Internet threat level has grown by 6.9 percentage points – during 2013, 41.6% of user computers were attacked..
BYOD - How to make it your friend
BYOD - bring your own device - is enjoying enormous growth and that is likely only to accelerate. However, opinion is still..
The data security divide
Barely a week goes by without yet another media report about a high-profile leak of confidential data.
The Internet's Light And Dark Sides
While the internet is a positive force for good, it is also a haven for the very bad. And it doesn't get much worse than cybercrime..
Taking Phishing Off The Menu
Halon security's dmarc prevents attacks from spammers targeting spoof weaknesses
Sun Shines On Cloud
The market for cloud, or Internet, computing is hitting the stratosphere. Market research firm IDC expects businesses worldwide..
Cold Shoulder Treatment
Many organisations are failing to adopt established industry best practice to protect their clients' information. The need for increased..
ManageEngine EventLog Analyzer
ManageEngine's EventLog Analyzer (MEA) offers an interesting alternative to the mainstream SIEM (security information and event management)...
Celestix Networks' HOTPin v3.7
The exponential growth of mobile workforces is making businesses rethink their security strategy for remote access...
GFI LanGuard 2014
Focusing on endpoint vulnerability assessment, patch management and auditing...
SecurEnvoy SecurAccess 7.1
The use of two-factor authentication (2FA) for online security is growing exponentially as businesses move away from inherently...
SolarWinds Log & Event Manager
Despite the wide choice of SIEM (security information and event management) solutions, their high prices put most of them...
AhnLab Malware Defense System
Currently the largest security company in South Korea, AhnLab now turns it gaze on the European market. Having dealt efficiently...
Titania Nipper Studio
Total compliance with data protection regulations is now essential, otherwise businesses could find themselves....
CenterTools DriveLock Executive Suite 7.2
Data loss and security breaches are rarely out of the news, showing that, despite all the warnings...
Can cyber-risk insurance really keep you safe?
Cyber-risk insurance policies are growing in popularity with the business community, but there’s a danger...
Why Windows 8 is so gr8!
Tim Ager says the demise of Windows xp is no cause for lamentation - Windows 8 has so much to offer...
2014: Into The Unknown
We need to keep evolving ways in which to authenticate our trusted users, if we are to stay ahead...
Managing The Risks
Risk-based authentication is now making its presence felt. Tim Ager of Celestix explains why and what it is all about...
Key factors in a mobile world
As mobile device management becomes an ever greater challenge, its convergence with two-factor authentication...
Don't let it all end in floods of tears
Water has been constantly in the headlines of late, infiltrating communities on a massive scale and leaving a trail of destruction in its wake
Ask those in the know what will be the hot topics for security in 2014 and there is no shortage of response...
Massive strides forward
If there is one thing that the 2013 Computing Security Awards demonstrated above all else, it's the fact that the industry...
Data Breaches - Time To Come Clean
The day that telecoms operators and internet service providers (ISPs) across Europe must have dreaded has finally arrived...
Anxious times signal need for action
The Intelligence and Security Committee (ISC) of Parliament has just published its Annual Report for 2012-2013...
Oxford University School calls for respondents...
As part of a major Cabinet Office effort to help organisations defend themselves against security incidents caused by insiders...
100 million-plus attacks blocked
FireHost has released its 2013 year in review Superfecta report
Be warned - Not being in cyber space...
Reacting to the recent publication of the Office of National Statistics' figures suggesting that some 6.7 million adults...
UK falling behind in cyber-security awareness
Following BT research revealing that the UK trails in big business cyber-security awareness rankings, Amar Singh and Mike Small, both members of the ISACA UK...
Sophos acquires Cyberoam
Sophos has acquired Cyberoam Technologies, a provider of network security products...
Virgin Media raises security level
Virgin Media Business has been accredited to provide safe and secure network services up to the government's published Business Impact...
Move to raise awareness of online threats
Global internet and mobile security company BullGuard is partnering with Get Safe Online, the UK's national internet security awareness initiative...
Endpoint Security: A Call to Action
In a world of constant combat between hackers and security practitioners, corporate IT teams must continually strengthen their IT security...
Raising the standard for cyber security is vital
Organisations will now have to meet a rigorous new cyber security 'kitemark' if they want to work with the UK government
Securing the Mobility Age through the Cloud
Employee mobility will be the rule, rather than the exception, in 2014. Michael Sutton, VP of security research at Zscaler, explains why
Tackling the fraudsters
Fraud is on the rise. Wherever you surf, tweet or otherwise go online, it rears its devious and lucrative head..
The security challenges ahead for 2014
Tim 'TK' Keanini, CTO at Lancope, has put together his thoughts on some promising, as well as some concerning, innovations that will shape the way we secure..
Securing the honours!
It was another night of celebrations at the 2013 Computing Security Awards, as people from right across the industry gathered..
Celebration - and jubilation!
It was another night of huge celebrations at the 2013 Computing Security Awards, as people from right across the industry...
Security - Anti Spam Solution of the Year 2013
WINNER: Kaspersky Lab - Endpoint Security for Business...
Security - Anti Malware Solution of the Year 2013
WINNER: Cloudmark - Server Edition..
Security - Content Security Solution of the Year 2013
WINNER: Check Point - Application Control Software Blade..
Network Security Solution of the Year 2013
WINNER: Emulex - EndaceProbe