CS Mar-Apr 2024
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Secure systems, secure data, secure people, secure business<br />
Computing Security <strong>Mar</strong>ch/<strong>Apr</strong>il <strong>2024</strong><br />
inside this issue<br />
CONTENTS<br />
Computing<br />
Security<br />
NEWS<br />
OPINION<br />
INDUSTRY<br />
COMMENT<br />
CASE STUDIES<br />
PRODUCT REVIEWS<br />
CUTTING EDGE<br />
SHAPING UP<br />
More insights on what may<br />
Can AI overcome all<br />
lie in wait for security during<br />
the doomsayers and<br />
the rest of <strong>2024</strong><br />
be a force for good?<br />
EMBRACE YOUR ‘FOE’<br />
AI and humanity can<br />
partner up, but there<br />
will be a price to pay<br />
GETTING TO THE (END) POINT<br />
COMMENT 3<br />
Gearing up to the task<br />
How to identify the<br />
system that’s right<br />
for your organisation<br />
NEWS 6 & 8<br />
Legacy IT systems at critical risk level<br />
Data protection falling way short<br />
Action call to solve skills shortages<br />
ARTICLES<br />
GETTING YOUR ACT TOGETHER 11<br />
Core obligations of the upcoming Digital<br />
Operational Resilience Act explained<br />
AI: PARTNER, NOT PREDATOR? 12<br />
AI and humanity are partners, not<br />
adversaries, argues one observer, signalling<br />
a future where the technology empowers,<br />
rather than endangers, our species. This<br />
isn't to say that AI won't pose threats and<br />
safeguards will need to be put in place.<br />
REMOTE ACCESS SCAM PANDEMIC 22<br />
Cursor Insight's Tamas Zelczer discusses<br />
how biometric cybersecurity can help<br />
UNCERTAINTY THE ONLY CERTAINTY 18<br />
prevent fraud<br />
Part 2 of Computing Security's delve into how<br />
the 'darker forces' of cyber security might<br />
INFOSEC EUROPE <strong>2024</strong> BECKONS 24<br />
impact the industry in the months ahead:<br />
Showtime is approaching, with three days<br />
at minimum, the volume and sophistication<br />
of learning, discovery and insights lined up<br />
of attacks will continue to rise, it is predicted,<br />
as GenAI gets smarter and bad actors learn<br />
DATA STATS ARE 'WAKE-UP CALL' 25<br />
how to wield its power.<br />
Emails soar from just over 2 million sent<br />
per minute in 2013 to hit 241 million<br />
a minute 10 years later<br />
RANSOMWARE ATTACKS ROCKET 29<br />
GONE NUCLEAR 26<br />
Sophisticated attack methods surface,<br />
The number of formal reports that serve<br />
with healthcare a prominent target<br />
to document security issues at the UK's<br />
civil nuclear facilities has hit its highest level<br />
TIME TO SAY 'PASS' TO PASSWORDS? 32<br />
in at least 12 years, amidst a decline in<br />
With Google moving towards a<br />
inspections, according to The Guardian<br />
passwordless future, others may follow<br />
newspaper.<br />
GETTING RIGHT TO THE (END)POINT 33<br />
Why endpoint protection Is seen by many<br />
as a 'must have'<br />
PUT TO THE TEST 30<br />
With penetration testing used to identify<br />
the level of technical risk emanating from<br />
BOOK REVIEW<br />
software and hardware vulnerabilities, might<br />
this be something that every organisation<br />
AI - WEAPON OF WAR? 10<br />
should be implementing?<br />
A new book tackles the implications for<br />
this controversial technology head on<br />
computing security <strong>Mar</strong>ch/<strong>Apr</strong>il <strong>2024</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk<br />
4