29.07.2016 Views

CSLATEST

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Secure systems, secure data, secure people, secure business<br />

Computing Security May/June 2024<br />

inside this issue<br />

CONTENTS<br />

Computing<br />

Security<br />

NEWS<br />

OPINION<br />

INDUSTRY<br />

COMMENT<br />

CASE STUDIES<br />

PRODUCT REVIEWS<br />

Claws into ransomware<br />

A world in turmoil<br />

Growing rift between well<br />

What it's like to<br />

protected and vulnerable<br />

be held hostage<br />

leaves no one safe<br />

Threatening times<br />

New hazards looming<br />

over the industry<br />

Getting the evil eyes<br />

COMMENT 3<br />

EC support for AI innovation<br />

Cybercriminals' levels of access<br />

and control are now off the scale<br />

NEWS 6<br />

Fraudulent websites spreading malware<br />

New cybersecurity best practice advice<br />

Confidential data shared online<br />

Government taking 'ostrich strategy'<br />

ARTICLES<br />

THE EVIL EYE 14<br />

The vast amounts of personal details now<br />

freely available is giving cybercriminals<br />

untold levels of access and control<br />

A WORLD IN TURMOIL 10<br />

In an interconnected world, the growing<br />

rift between those who are well protected<br />

against attacks and those most vulnerable<br />

suggests that no organisation is entirely<br />

safe<br />

VIRTUOSO TO TAKE CENTRE STAGE 16<br />

Generative AI presenter and deepfake<br />

expert Henry Ajder will be a keynote<br />

THREAT OR TREAT? 18<br />

speaker at this year's Infosec<br />

Artificial intelligence is on course to increase<br />

the volume and heighten the impact of<br />

FACE OFF! 21<br />

cyberattacks over the next two years, warns<br />

When it comes to device-based and<br />

the National Cyber Security Centre, with AI<br />

server-based facial authentication, which,<br />

almost certainly making cyberattacks against<br />

if either, is the more secure?<br />

the UK more impactful<br />

THREATENING TIMES 26<br />

Computing Security zooms in on some<br />

of the latest hazards that the industry is<br />

coming up againsr<br />

INSIDE OUT 22<br />

THE IMPERATIVE FOR ZERO TRUST 29<br />

Embracing digital transformation to gain<br />

66% of organisations questioned believed<br />

access to the cloud's many benefits means<br />

that attacks from the inside were more<br />

computing environments must face<br />

likely than attacks from the outside,<br />

evolving into borderless IT ecosystems<br />

according to the latest research. What are<br />

the workable, effective solutions for<br />

DEMOCRACY UNDER SIEGE 34<br />

mitigating these threats?<br />

Electoral disinformation is expected to<br />

create muddied political landscapes<br />

throughout this year, which will be prime<br />

for exploitation<br />

BIRD'S EYE VIEW OF ATTACK 30<br />

What is it like to be held to ransom? We<br />

BOOK REVIEW<br />

asked several experts to talk us through<br />

TEN DAYS… SEVEN DEADLY SINS...<br />

what typically happens when an attack is<br />

ZERO RI$K 13<br />

carried out<br />

What's not to celebrate when your bank<br />

account gains an extra zero or two over<br />

the festive period?<br />

computing security May/June 2024 @CSMagAndAwards www.computingsecurity.co.uk<br />

4

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!