With increased insider threats and rigorous data privacy laws, DLP and AI are now emerging more and more as a united force
A new strategic partnership is developing cybersecurity guidance, focused on what is seen as the unique risks of AI and agentic systems
Spend on developing AI is said to be out of synch with investment in securing the technology
The average cost of a data breach has fallen, but cybercriminal attacks continue to increase in sophistication and number
Compliance is no longer just a legal requirement - it's a strategic differentiator, argues one industry voice. How well will GDPR cope with the growing plethora of new challenges it faces?
Data breaches that led to 16 billion passwords being stolen could create a snowball effect of cyber-attacks in the days ahead
Unchecked use of personal tech, from webcams to tablets for work, is said to be creating serious security blind spots
AI is evolving quickly - staying ahead of emerging threats will require "a collaborative effort from all stakeholders"
Aggressors are constantly finding new ways - such as Mishing - to exploit email, in order to breach defences
How can managed detection and response be integrated into an organisation's existing security make-up?
A staggering 99% of UK respondents to a recent study said they had experienced a security attack in the last 12 months
A 2024 survey paints a disturbing picture of the scale of cyber-attacks perpetrated against UK businesses over the last 12 months
Most companies have invested in secure IT infrastructure, but do they know how well it works under pressure?
Scammers are stripping untold sums of money from victims' bank accounts. Tamas Zelczer, CEO and co-founder of Cursor Insight, discusses how biometric cybersecurity can help prevent such fraud
Domain phishing scams have now reached levels never seen before. Vigilance can help to ensure that such scams don’t prove successful
Cybercrime is on the rampage, prompting one expert to say: "Beef up your email security or get ready for a world of hurt."
In a manoeuvre set up to assess the volume of cyber-attacks directed against London, 'honeypot' devices were attacked 91 million times by over 101,000 hackers in just 28 days
MDR, EDR and NDR - what exactly is the POWER behind these acronyms?
Webcam hacking has become a serious concern in recent years, with all of us potentially at risk of having our privacy invaded by cybercriminals
Founder and CEO of ADISA, Steve Mellings, welcomes the 'green shoots of improvement' around asset retirement/asset recovery, but laments the lack of wholesale change
A new survey conducted by The Access Group's Construction division questioned over 1,300 UK-based construction professionals about the incoming turbulent year.
David Trossell, CEO and CTO of Bridgeworks, on delivering higher WAN Performance
The ongoing conflict in Ukraine has seen the resurrection of the infamous Industroyer malware and other threats
Organisations view hardware-assisted security capabilities as critical to a robust security strategy
Move aims to enhance endpoint security with hardware-based ransomware detection
Many UK businesses are dumping their devices before they reach the end of their working life
Paul Harris, Managing Director at Pentest Limited, discusses the importance of security within tech projects
By Mark Coates, International Director of Public Policy and Advocacy, Bentley Systems
Michael Urgero, Senior Security Engineer, SecurEnvoy, offers his insights on solving the problem of lost passwords for users and the support team
The time has come to 'DIAL' it in, states ADISA founder Steve Mellings
The hype is increasing in the construction industry around the digital twin - but are users onboard with the trend yet?
Are we taking proper advantage of the huge amount of data we are now creating? Autodesk's latest industry report has uncovered some decidedly mixed results, writes David Chadwick
As weather patterns increase the erosion of our coastline will speed up, meaning we not only lose land but also a diverse natural environment. David Chadwick outlines a new way to protect it
ADISA Asset Recovery Standard 8.0 formally approved by UK Information Commissioner's Office
THERE HASN'T BEEN MUCH GOOD NEWS IN CYBERSECURITY LATELY, STATES IAN THORNTON-TRUMP, CISO, CYJAX. HIS TAKE BELOW, ON RECENT EVENTS REINFORCES THAT TO A WORRYING DEGREE
Andrew Cowling, Senior Channel Marketing Specialist at PFU (EMEA), introduces the latest promotion for the company's existing and potential ScanSnap partners
Ever wondered whether workplace security, no matter where you are, might be possible? Perhaps biometrics could offer a way forward
SHOULD your data leak, it might well end up for sale on the dark web, making you VULNERABLE and an easy target for advanced attacks
EleVia Software recruits the company's finance department in their drive to improve productivity, writes David Chadwick
Nation-state led cyber-attacks are being unleashed on governments at an ever-growing rate. Vigilance is the key to hindering their impact
Carol Massay, CEO of EasyBuild, considers the views of two local construction industry organisations in Hertfordshire on the impact of Covid-19, planning processes and other issues
NHS Wales Informatics team has taken urgent steps to protect critical systems from a surge in cyber-attacks
Bad actors have been taking increasing advantage of the current crisis to create chaos, locking out employees and paralysing business operations
Fraud has seen an upsurge – vigilance and good practice can save you from being a victim, even after the current crisis has abated
Why you can't rely on others to get your Public Key Infrastructure in order - and what happens if you don't. Andrew Jenkinson, Group CEO, Cybersec Innovation Partners, offers his insights.
Rob Butcher, Design Services Manager at ACO Water Management, shares his top tips for finding the right software for an integrated design approach to drainage
One of the most commonly used man-made materials on earth, concrete is a vital part of the construction industry. However, the practicalities of working with structural concrete, whether precast or poured, can prove highly complex, especially on large projects with tight deadlines or where complex design geometry is required. Here, Ismail Makda, Business Development Manager - Concrete at Trimble Tekla UK explores five of the common issues encountered by concrete contractors and discusses how incorporating digital technology, including BIM, within their workflow could help provide a solution.
Jean-pierre Naylor, director, CDL, takes a look at practices relating to redundant IT equipment - PRACTICES he feels give the industry a bad name
Nearly 80% of organisations rank cyber risk as a top-five concern, yet only 11% have a high degree of confidence in their ability to assess cyber threats, prevent cyber-attacks and respond effectively
Governments and healthcare organisations have now become key targets in an increasingly aggressive campaign of ransomware attacks
Document Logistix uses DAST to ensure security of sensitive customer data
By Scott Gordon (CSSP), CMO, Pulse Secure
Constructing high walls around a corporate environment may well be a security approach that is now delivering ever more diminishing returns
In our third Q an A article in association with EasyBuild we look at some of the issues affecting contractors, house builders, service suppliers and maintenance companies
Andrew Cowling, business development and channel marketing specialist at Fujitsu, explores the digitisation of schools' data and how it can offer a simple solution to GDPR compliance
IoT-based attacks are hitting organisations at an alarming and ever-increasing rate, with global spending on IOT security forecast to hit $1.5 billion next year
The rhetoric around Artificial Intelligence (AI) and Machine Learning (ML) in the battle against cyber security has reached something of a fever pitch. But how accurate is it?
Companies using SAP are digitalising their business, hoping to decrease costs, optimise processes and free up resources. But often their process of capturing information from documents such as invoices and orders is still manual and therefore cumbersome. It doesn't have to be though - it could happen easily, quickly and without errors at the touch of a button, explains Enno Lückel, Vice President EMEA at Ephesoft
Fujitsu's Andrew Cowling explains why partners need look no further than the company's current SP Series scanner range for a reliable, high-quality capture proposition
A wide variety of storage-related challenges are arising as research data peaks for universities and other educational institutions worldwide, and Synology solutions are playing a central role in addressing those issues
The European Union is planning to enhance its cyber resilience with a new EU-wide certification framework. In our pre-Brexit state, what are the 'ins' and 'outs' of this?
With contributions from leading industry figures and commentary from our Editor Ray Smyth, we try and update on both new and well established terms to enhance understanding and consistency and to drive the networking agenda
Legal practices need to integrate digital processes in their everyday operations, or they will find digital transformation an impossible challenge, warns Fergus Wilson, CTO at Repstor
Graphisoft talks to its major Japanese client, Nekken Sekkei about innovation resulting from the use of information and communication technology (ICT) in architecture
Usha B Trivedi explains why DFMA is a natural ally for BIM, helping to change the way buildings will be put together in the future
Andrew Watts, CEO of international building engineers Newtecnic, explains how the construction industry is reducing cost, risk and waste with maths, and looks at how new research and practices are delivering construction industry innovation from concept to fabrication and operation
Fresh from winning BPO/Bureau Company of the Year at the 2016 DM Awards, Restore Document Management's Commercial Director David English explains how the company has built on a winning combination of customer service excellence, technological expertise and great partnership working
Automated bridge building behemoths, bricklaying robots, Smart Buildings and self-repairing cities - these are now real concepts being used to design and construct the built environment. Here, Kenny Ingram, Global Industry Director of Construction at IFS, outlines the key trends and opportunities for companies to leverage in 2017
It is three years since CCube Solutions delivered its first solution for digitising Lloyd George Records for GPs and CCGs; the service has now seen wide take-up
Emmedi's 4Cheque software has become the most time-saving and cost-effective way to scan and manage all bank documents - including cheques - from a single device
Somewhere around 2 million companies exist in Spain, mostly small enterprises, most of them with less than five workers on average
Bentley Systems and Topcon join forces to advance cloud services for 'constructioneering'
Resource constraints at local authorities could be putting sensitive information at risk, according to new research from Iron Mountain
Martyn Williams, Managing Director of industrial automation software supplier, COPA-DATA UK, discusses three steps manufacturers should take to stay safe in the Cloud
IT security training could not be more essential. But what should the practices and policies be that underscore this? Who should be responsible for making the decisions relating to that training and how exactly should employees be monitored?
how do you justify the cost of investing in Security Information and Event Management - SIEM - to those who control the purse strings within your organisation? Computing Security finds out by talking to those in the know.
An email arrives at work from someone you know well. But is it from that person? Has it been forged? Targeted attacks come in many guises. How do you combat such threats?
Despite the widespread use of high-speed scanners in mortgage document processing, throughput has been tended to be limited by the significant volume of variable-sized and multiple-formatted items that require manual preparation prior to scanning. Now though, this is starting to change, says Jim McMahon of OPEX
With today's connected vehicle technologies, the risk of potential cyber security threats is vast – and growing – with cars already forced off the road. What can be done to safeguard these systems and drivers?
What does a successful data protection strategy look like in the face of eroding security perimeters, increasing targeted attacks, and evolving user habits and expectations?
With mobile devices now seemingly everywhere, and more and more applications pouring into the market, mobile monitoring and device management have never been so vital
Businesses place heavy reliance on email - making it a prime target for hackers. But can any single system lock them out?
Truly effective encryption that actually protects data wherever it may reside is an absolute must for any business or organisation dealing with sensitive data
Suffering from Regulation fatigue? Now is the time to take on board the benefits of the new GDPR regulations and the payback they can bring to your business.
By utilising Cloud systems and new technology to make flare gas capture more economical, energy companies can increase revenues and maximise profitability while at the same time significantly reducing their impact on the environment, explains Adam Chapman, Director of Global Marketing, Fluenta
IES looks at past achievements and future trends in Building Performance Analysis
Combating malware means going way beyond locating suspicious programs on servers and workstations, and detecting and interfering with the use of malware on the network
Cyber attacks are costing businesses hundreds of billions annually. With the strongest defence being a skilled and experienced cybersecurity team, lucrative careers are beckoning
The barriers that keep any organisation safe from attack are often guarded by nothing more than a single factor of authentication. Just one weakness and the whole business can be breached.
The massive benefits that IOT can deliver in what has now become a hyper-connected society must be set against the countless risks posed each day by Cyberattacks
Wearables are the latest big innovation for the mobile devices market. But they bring substantial security threats with them
We asked Kenny Ingram, Director of Construction at IFS, to let us know what he considers will be the main issues in the Construction Industry in 2016 and beyond - apart, of course, from the BIM Level 2 deadline in April.
Encryption is vital for protecting precious data. But, in the wrong hands, it can be a weapon that is turned upon its owner - with devastating consequences
How should organisations minimise the likelihood that unauthorised code is able to manipulate applications, in order to access, steal, modify or delete sensitive data? Computing Security investigates
Encryption is vital for protecting precious data. But, in the wrong hands, it can be a weapon that is turned upon its owner - with devastating consequences
What steps can be taken to detect and block exploits as soon as they attempt to use software vulnerabilities? And how can businesses get a clear understanding of the behaviour of legitimate software components?
What steps does any business have to take to get governance, risk and compliance right - and what dangers might surface along the way?
With a newly launched solutions division and two security vendors just signed up, distributor Northamber is aiming to drive growth to new heights
Digital services are expanding rapidly, making the chances of identity theft an ever greater reality. Businesses must take every step necessary to ensure they don’t become the next victim.
‘Shadow IT’ divides companies into IT department and the rest of the people, getting businesses are off to a bad start, warns Roman Foeckl, CEO of CoSoSys