28.02.2024 Views

CS Mar-Apr 2024

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Secure systems, secure data, secure people, secure business<br />

Computing Security <strong>Mar</strong>ch/<strong>Apr</strong>il <strong>2024</strong><br />

inside this issue<br />

CONTENTS<br />

Computing<br />

Security<br />

NEWS<br />

OPINION<br />

INDUSTRY<br />

COMMENT<br />

CASE STUDIES<br />

PRODUCT REVIEWS<br />

CUTTING EDGE<br />

SHAPING UP<br />

More insights on what may<br />

Can AI overcome all<br />

lie in wait for security during<br />

the doomsayers and<br />

the rest of <strong>2024</strong><br />

be a force for good?<br />

EMBRACE YOUR ‘FOE’<br />

AI and humanity can<br />

partner up, but there<br />

will be a price to pay<br />

GETTING TO THE (END) POINT<br />

COMMENT 3<br />

Gearing up to the task<br />

How to identify the<br />

system that’s right<br />

for your organisation<br />

NEWS 6 & 8<br />

Legacy IT systems at critical risk level<br />

Data protection falling way short<br />

Action call to solve skills shortages<br />

ARTICLES<br />

GETTING YOUR ACT TOGETHER 11<br />

Core obligations of the upcoming Digital<br />

Operational Resilience Act explained<br />

AI: PARTNER, NOT PREDATOR? 12<br />

AI and humanity are partners, not<br />

adversaries, argues one observer, signalling<br />

a future where the technology empowers,<br />

rather than endangers, our species. This<br />

isn't to say that AI won't pose threats and<br />

safeguards will need to be put in place.<br />

REMOTE ACCESS SCAM PANDEMIC 22<br />

Cursor Insight's Tamas Zelczer discusses<br />

how biometric cybersecurity can help<br />

UNCERTAINTY THE ONLY CERTAINTY 18<br />

prevent fraud<br />

Part 2 of Computing Security's delve into how<br />

the 'darker forces' of cyber security might<br />

INFOSEC EUROPE <strong>2024</strong> BECKONS 24<br />

impact the industry in the months ahead:<br />

Showtime is approaching, with three days<br />

at minimum, the volume and sophistication<br />

of learning, discovery and insights lined up<br />

of attacks will continue to rise, it is predicted,<br />

as GenAI gets smarter and bad actors learn<br />

DATA STATS ARE 'WAKE-UP CALL' 25<br />

how to wield its power.<br />

Emails soar from just over 2 million sent<br />

per minute in 2013 to hit 241 million<br />

a minute 10 years later<br />

RANSOMWARE ATTACKS ROCKET 29<br />

GONE NUCLEAR 26<br />

Sophisticated attack methods surface,<br />

The number of formal reports that serve<br />

with healthcare a prominent target<br />

to document security issues at the UK's<br />

civil nuclear facilities has hit its highest level<br />

TIME TO SAY 'PASS' TO PASSWORDS? 32<br />

in at least 12 years, amidst a decline in<br />

With Google moving towards a<br />

inspections, according to The Guardian<br />

passwordless future, others may follow<br />

newspaper.<br />

GETTING RIGHT TO THE (END)POINT 33<br />

Why endpoint protection Is seen by many<br />

as a 'must have'<br />

PUT TO THE TEST 30<br />

With penetration testing used to identify<br />

the level of technical risk emanating from<br />

BOOK REVIEW<br />

software and hardware vulnerabilities, might<br />

this be something that every organisation<br />

AI - WEAPON OF WAR? 10<br />

should be implementing?<br />

A new book tackles the implications for<br />

this controversial technology head on<br />

computing security <strong>Mar</strong>ch/<strong>Apr</strong>il <strong>2024</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk<br />

4

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!