Computing Security (@csmagandawards) 's Twitter Profile
Computing Security

@csmagandawards

Twitter, home of Computing Security Magazine and Awards. To see who won what at the 2024 Computing Security Awards, go to: computingsecurityawards.co.uk

ID: 1944336932

linkhttp://computingsecurity.co.uk calendar_today07-10-2013 14:50:52

2,2K Tweet

1,1K Followers

1,1K Following

Computing Security (@csmagandawards) 's Twitter Profile Photo

EC steps in to drive support for AI innovation European start-ups and SMEs need all the help they can get to develop AI models computingsecurity.co.uk/articles/?arti… Enveil #AI #smallmediumenterprises #regulations #riskmanagement #privacylaws #security

EC steps in to drive support for AI innovation
European start-ups and SMEs need all the help they can get to develop AI models
computingsecurity.co.uk/articles/?arti…
<a href="/enveil_inc/">Enveil</a>
#AI
#smallmediumenterprises
#regulations
#riskmanagement
#privacylaws
#security
Computing Security (@csmagandawards) 's Twitter Profile Photo

Threat or treat? How accurate might Elon Musk, owner of X and Tesla, be when he says AI is one of the "biggest threats" to humanity? computingsecurity.co.uk/articles/?arti… BlackBerry Cybersecurity #cyberattacks #AI #databreaches #malware #emailhacking #security

Threat or treat?
How accurate might Elon Musk, owner of X and Tesla, be when he says AI is one of the "biggest threats" to humanity?
computingsecurity.co.uk/articles/?arti…
<a href="/BlackBerrySpark/">BlackBerry Cybersecurity</a>
#cyberattacks
#AI
#databreaches
#malware
#emailhacking
#security
Computing Security (@csmagandawards) 's Twitter Profile Photo

Gone nuclear Security issues at UK civil nuclear facilities have been on the up - while inspection levels fall away. computingsecurity.co.uk/articles/?arti… Dr Paul Dorfman #nuclearestablishments #cybersecurity #malware #regulations #cyberattacks #security

Gone nuclear
Security issues at UK civil nuclear facilities have been on the up - while inspection levels fall away.
computingsecurity.co.uk/articles/?arti…
<a href="/dorfman_p/">Dr Paul Dorfman</a>
#nuclearestablishments
#cybersecurity
#malware
#regulations
#cyberattacks
#security
Computing Security (@csmagandawards) 's Twitter Profile Photo

Democracy under siege Political misinformation and disinformation are forecast to create distorted and muddied political landscapes computingsecurity.co.uk/articles/?arti… Protection Group International #threatactors #AI #doxxing #digitalisation #personallyidentifieableinformation #security

Democracy under siege
Political misinformation and disinformation are forecast to create distorted and muddied political landscapes
computingsecurity.co.uk/articles/?arti…
<a href="/ProtectionGIntl/">Protection Group International</a>
#threatactors
#AI
#doxxing
#digitalisation
#personallyidentifieableinformation
#security
Computing Security (@csmagandawards) 's Twitter Profile Photo

Face off! When it comes to device-based and server-based facial authentication, which, if either, is the more secure? computingsecurity.co.uk/articles/?arti… Celestix Networks #facialrecognition #identitymanagement #mobiledevices #encryption #security

Face off!
When it comes to device-based and server-based facial authentication, which, if either, is the more secure?
computingsecurity.co.uk/articles/?arti…
<a href="/CelestixNetwork/">Celestix Networks</a>
#facialrecognition
#identitymanagement
#mobiledevices
#encryption
#security
Computing Security (@csmagandawards) 's Twitter Profile Photo

A world in turmoil The growing rift between those who are well protected against attacks and those most vulnerable suggests that no organisation is entirely safe computingsecurity.co.uk/articles/?arti… World Economic Forum #vulnerabilities #attackanalysis #cybersecurity #cyberresilience #deepfake #security

A world in turmoil
The growing rift between those who are well protected against attacks and those most vulnerable suggests that no organisation is entirely safe
computingsecurity.co.uk/articles/?arti…
<a href="/wef/">World Economic Forum</a>
#vulnerabilities
#attackanalysis
#cybersecurity
#cyberresilience
#deepfake
#security
Computing Security (@csmagandawards) 's Twitter Profile Photo

Inside out! Insider threats hit more than 34% of companies worldwide every year. Without real action that figure will only get worse computingsecurity.co.uk/articles/?arti… Titania #insiderthreats #cyberattacks #zerotrust #detectionandresponse #security #phishing

Inside out!
Insider threats hit more than 34% of companies worldwide every year. Without real action that figure will only get worse
computingsecurity.co.uk/articles/?arti…
<a href="/TitaniaLtd/">Titania</a>
#insiderthreats
#cyberattacks
#zerotrust
#detectionandresponse
#security
#phishing
Computing Security (@csmagandawards) 's Twitter Profile Photo

The dark side of emerging AI technologies A new book offers a penetrating look into the murky, darker recesses of artificial intelligence computingsecurity.co.uk/articles/?arti… Wiley Business #AI #cybersecurity #machineintelligence #socialengineering #malwareattacks #security

The dark side of emerging AI technologies
A new book offers a penetrating look into the murky, darker recesses of artificial intelligence
computingsecurity.co.uk/articles/?arti…
<a href="/WileyBusiness/">Wiley Business</a>
#AI
#cybersecurity
#machineintelligence
#socialengineering
#malwareattacks
#security
Computing Security (@csmagandawards) 's Twitter Profile Photo

Fraudulent websites spreading malware Zscaler's ThreatLabz investigations pinpoint threat actor creating fraudulent Skype, Google Meet and Zoom websites computingsecurity.co.uk/articles/?arti… Zscaler #Remoteaccesstrojans #threatactors #malware #remoteaccess #securityupdate #dataprotection

Fraudulent websites spreading malware
Zscaler's ThreatLabz investigations pinpoint threat actor creating fraudulent Skype, Google Meet and Zoom websites
computingsecurity.co.uk/articles/?arti…
<a href="/zscaler/">Zscaler</a>
#Remoteaccesstrojans
#threatactors
#malware
#remoteaccess
#securityupdate
#dataprotection
Computing Security (@csmagandawards) 's Twitter Profile Photo

Confidential data shared online Personal information exposed in the wake of criminal investigation computingsecurity.co.uk/articles/?arti… BlackFog #databreaches #crime #ransomware #extortion #exfiltrationtools #security

Confidential data shared online
Personal information exposed in the wake of criminal investigation
computingsecurity.co.uk/articles/?arti…
<a href="/blackfogprivacy/">BlackFog</a>
#databreaches
#crime
#ransomware
#extortion
#exfiltrationtools
#security
Computing Security (@csmagandawards) 's Twitter Profile Photo

Cybersecurity best practice advice released Guidelines unveiled to aid security boost for cloud computingsecurity.co.uk/articles/?arti… Cado #cloud #onpremise #threatdetection #security

Cybersecurity best practice advice released
Guidelines unveiled to aid security boost for cloud
computingsecurity.co.uk/articles/?arti…
<a href="/CadoSecurity/">Cado</a>
#cloud
#onpremise
#threatdetection
#security
Computing Security (@csmagandawards) 's Twitter Profile Photo

ThreatLocker MDR service Customers alerted to potential malicious activity computingsecurity.co.uk/articles/?arti… ThreatLocker #MDR #malwareattacks #endpointsecurity #threatdetection #security

ThreatLocker MDR service
Customers alerted to potential malicious activity
computingsecurity.co.uk/articles/?arti…
<a href="/ThreatLocker/">ThreatLocker</a>
#MDR
#malwareattacks
#endpointsecurity
#threatdetection
#security
Computing Security (@csmagandawards) 's Twitter Profile Photo

Vulnerabilities on healthcare organisation networks exposed Almost one quarter of medical devices have Known Exploited Vulnerabilities, it is reported computingsecurity.co.uk/articles/?arti… Claroty #vulnerabilities #healthcare #cybercrime #remoteaccess #riskmanagement #security

Vulnerabilities on healthcare organisation networks exposed
Almost one quarter of medical devices have Known Exploited Vulnerabilities, it is reported
computingsecurity.co.uk/articles/?arti…
<a href="/Claroty/">Claroty</a>
#vulnerabilities
#healthcare
#cybercrime
#remoteaccess
#riskmanagement
#security
Computing Security (@csmagandawards) 's Twitter Profile Photo

Microsoft email breach labelled "a strategic blow" Microsoft source code and 'other secrets' compromised by Midnight Blizzard attack computingsecurity.co.uk/articles/?arti… Tenable #emailhacking #sourcecode #crime #bruteforcing #passwordprotection #security

Microsoft email breach labelled "a strategic blow"
Microsoft source code and 'other secrets' compromised by Midnight Blizzard attack
computingsecurity.co.uk/articles/?arti…
<a href="/TenableSecurity/">Tenable</a>
#emailhacking
#sourcecode
#crime
#bruteforcing
#passwordprotection
#security
Computing Security (@csmagandawards) 's Twitter Profile Photo

National cyber threat was ignored Former government approach slammed as an ‘ostrich strategy’ computingsecurity.co.uk/articles/?arti… @Illumio #cyberthreat #ransomware #zerotrust #cyberattacks #legislation #security

National cyber threat was ignored
Former government approach slammed as an ‘ostrich strategy’
computingsecurity.co.uk/articles/?arti…
@Illumio
#cyberthreat
#ransomware
#zerotrust
#cyberattacks
#legislation
#security
Computing Security (@csmagandawards) 's Twitter Profile Photo

Lack of technology investment restricting business growth Almost half of UK mid-sized enterprises without access to most advanced technology computingsecurity.co.uk/articles/?arti… ANS #innovation #technology #recruitment #recovery #security

Lack of technology investment restricting business growth
Almost half of UK mid-sized enterprises without access to most advanced technology
computingsecurity.co.uk/articles/?arti…
<a href="/ANSGroup/">ANS</a>
#innovation
#technology
#recruitment
#recovery
#security
Computing Security (@csmagandawards) 's Twitter Profile Photo

Worrying train of thought Why continuous security training should have a role to play in long-term development of all computingsecurity.co.uk/articles/?arti… Hornetsecurity #training #cybersecurity #research #threatactors #testandmeasurement #security

Worrying train of thought
Why continuous security training should have a role to play in long-term development of all
computingsecurity.co.uk/articles/?arti…
<a href="/Hornetsecurity/">Hornetsecurity</a>
#training
#cybersecurity
#research
#threatactors
#testandmeasurement
#security
Computing Security (@csmagandawards) 's Twitter Profile Photo

At the AI crossroads Are the criminals on the front foot in the battle to use AI for good or bad? Editor Brian Wall reports computingsecurity.co.uk/articles/?arti… Google #AI #crime #cybersecurity #regulations #vulnerabilities #security

At the AI crossroads
Are the criminals on the front foot in the battle to use AI for good or bad? Editor Brian Wall reports
computingsecurity.co.uk/articles/?arti…
<a href="/Google/">Google</a>
#AI
#crime
#cybersecurity
#regulations
#vulnerabilities
#security
Computing Security (@csmagandawards) 's Twitter Profile Photo

Battered and breached A survey paints a disturbing picture of the scale of cyber-attacks perpetrated against UK businesses computingsecurity.co.uk/articles/?arti… NCC Group plc #surveys #cyberattacks #phishing #maleware #cloud #security

Battered and breached
A survey paints a disturbing picture of the scale of cyber-attacks perpetrated against UK businesses
computingsecurity.co.uk/articles/?arti…
<a href="/NCCGroupplc/">NCC Group plc</a>
#surveys
#cyberattacks
#phishing
#maleware
#cloud
#security
Computing Security (@csmagandawards) 's Twitter Profile Photo

Six of the best With more than six years to its name and counting, how has GDPR fared so far? computingsecurity.co.uk/articles/?arti… Vanta #GDPR #regulations #datamanagement #AI #softwarevulnerability

Six of the best
With more than six years to its name and counting, how has GDPR fared so far?
computingsecurity.co.uk/articles/?arti…
<a href="/TrustVanta/">Vanta</a>
#GDPR
#regulations
#datamanagement
#AI
#softwarevulnerability