315,000 new malicious files detected every day
The overall global Internet threat level has grown by 6.9 percentage points – during 2013, 41.6% of user computers were attacked..
BYOD - How to make it your friend
BYOD - bring your own device - is enjoying enormous growth and that is likely only to accelerate. However, opinion is still..
The data security divide
Barely a week goes by without yet another media report about a high-profile leak of confidential data. How can these breaches be stopped?
The Internet's Light And Dark Sides
While the internet is a positive force for good, it is also a haven for the very bad. And it doesn't get much worse than cybercrime..
Taking Phishing Off The Menu
Halon security's dmarc prevents attacks from spammers targeting spoof weaknesses
Sun Shines On Cloud
The market for cloud, or Internet, computing is hitting the stratosphere. Market research firm IDC expects businesses worldwide..
Cold Shoulder Treatment
Many organisations are failing to adopt established industry best practice to protect their clients' information. The need for increased..
Celestix Networks HOTPin v3.7
The exponential growth of mobile workforces is making businesses rethink their security strategy for remote access, as simple usernames..
2014: Into The Unknown
We need to keep evolving ways in which to authenticate our trusted users, if we are to stay ahead of the game, says Tim Ager
Massive strides forward
If there is one thing that the 2013 Computing Security Awards demonstrated above all else, it's the fact that the industry is moving in the right direction
DDoS trends show leap in attack size
Global distributed denial of service (DDoS) attack trends continue to be a global threat, with alarming increases in attack size
Powerful new alliance offers advanced threat protection
FireEye has acquired privately-held Mandiant, provider of advanced endpoint security products and security incident response management solutions
Tom Cross wins top honour
Lancope's director of security research, Tom Cross, has been named a Ponemon Institute Distinguished Fellow
UK office workers bombarded with phishing scams
UK office workers are being bombarded with phishing emails, with the majority seeing as many as 10 attacks hitting their inboxes every day
A year in recovery
The continuing proliferation of new drive types and the ever-growing problem of malware were among the biggest trends impacting the data recovery industry in 2013..
Beware the demands of Ransomware
A new type of computer virus has begun attacking professional firms: Ransomware
Is the time right for the EU Data Protection Regulation?
The timing of the EU Data Protection Regulation is critical according to John O'Connor, Head of the Technology Group at leading Irish law firm Matheson
Raising the standard for cyber security is vital
Organisations will now have to meet a rigorous new cyber security 'kitemark' if they want to work with the UK government
Securing the Mobility Age through the Cloud
Employee mobility will be the rule, rather than the exception, in 2014. Michael Sutton, VP of security research at Zscaler, explains why
Tackling the fraudsters
Fraud is on the rise. Wherever you surf, tweet or otherwise go online, it rears its devious and lucrative head..
The security challenges ahead for 2014
Tim 'TK' Keanini, CTO at Lancope, has put together his thoughts on some promising, as well as some concerning, innovations that will shape the way we secure..