www.computing.co.uk Open in urlscan Pro
2606:4700::6810:914a  Public Scan

Submitted URL: http://www.computing.co.uk/
Effective URL: https://www.computing.co.uk/
Submission: On December 15 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

GET /search

<form id="search_form" action="/search" accept-charset="UTF-8" method="get">
  <input id="search_header" type="search" name="query" value="" required="" class="dropdown-searchbox" placeholder="Search here...">
  <input type="hidden" name="per_page" id="per_page" value="24" class="hidden_style">
  <input type="hidden" name="sort" id="sort" value="relevance1" class="hidden_style">
  <input type="hidden" name="date" id="date" value="this_year" class="hidden_style">
  <button type="submit" class="search-image-dropdown">Search <span class="dropdown-search-icon">
      <img alt="search_logo" src="//assets.kreatio.net/computing_redesign/png/search.png">
    </span>
  </button>
</form>

GET /search

<form id="search_form_bottom" action="/search" accept-charset="UTF-8" method="get">
  <input id="search_header" type="search" name="query" value="" required="" class="dropdown-searchbox" placeholder="Search here...">
  <input type="hidden" name="per_page" id="per_page" value="24" class="hidden_style">
  <input type="hidden" name="sort" id="sort" value="relevance1" class="hidden_style">
  <input type="hidden" name="date" id="date" value="this_year" class="hidden_style">
  <button type="submit" class="search-image-dropdown">Search<span class="dropdown-search-icon"><img alt="search_logo" src="https://assets.kreatio.net/computing_redesign/png/union.png"></span></button>
</form>

Text Content

Sign in Join
 * * My account
   * Sign out

 * You are currently accessing Computing via your Enterprise account.
   
   If you already have an account please use the link below to sign in.
   
   If you have any problems with your access or would like to request an
   individual access account please contact our customer service team.
   
   Phone: +44 (0) 1858 438800
   
   Email: customerservices@incisivemedia.com
   
   * Sign in

 * Search Computing
   
   Search
   
    
   
    

 * Latest
 * Topics
   
   CHOOSE A TOPIC FROM THE LIST BELOW
   
    * Big Data & Analytics
    * DevOps
    * Security
    * GDPR
    * AI & ML
    * Women in Tech
    * Cloud & Infrastructure
    * CIO
    * Deskflix

 * Tech Impact
 * Delta
 * Deskflix
 * Events
 * Whitepapers
 * More
   
   MOST POPULAR CONTENT
   
    * Delta
    * Big Data & Analytics
    * Cloud
    * Leadership & Strategy
   
    * Open Source
    * Storage
    * Telecoms
    * Top 100 IT Leaders
   
   FEATURED CONTENT
   
    * On-demand webinars
    * Identity Access Management Hub
    * IT leaders 250
    * Research
    * Aecom
    * Leeds Building Society
    * Delta
    * Tech Marketing Hub
   
   AUTHORS
   
    * Stuart Sumner
    * John Leonard
    * Graeme Burton
    * Tom Allen
    * Computing Contributors
   
   COMPUTING RESOURCES
   
    * English
    * Français
    * Deutsch
    * Espagnol
    * Italien

 * Search
   
   Search Computing
   
   Search
 * 

Join Sign in
 

 * * My account
   * Sign out

 * You are currently accessing Computing via your Enterprise account.
   
   If you already have an account please use the link below to sign in.
   
   If you have any problems with your access or would like to request an
   individual access account please contact our customer service team.
   
   Phone: +44 (0) 1858 438800
   
   Email: customerservices@incisivemedia.com
   
   * Sign in
   * Sign in

 * 

Hot topics

 * CMA approves
 * Lo-code
 * Apple's software
 * Google to shift
 * Remanufactured laptops
 * Microsoft




COMPUTING

Top stories


SECURING NHS TRUSTS: WHAT CYBER SOLUTIONS SHOULD BE PRIORITISED?

Security Technology
John Leonard
15 December 2021 • 5 min read

Law

APPLE AND GOOGLE HOLD 'VICE-LIKE GRIP' ON MOBILE MARKET, CMA SAYS

Their duopoly is limiting competition and choice for customers, says competition
watchdog

Dev Kundaliya
15 December 2021 • 3 min read

Legislation and Regulation

US CALLS FOR SANCTIONS AGAINST NSO GROUP AND OTHER SPYWARE FIRMS

Senate Finance Committee chair Ron Wyden said, "The Biden administration has the
chance to turn off the spigot of American dollars and help put them out of
business for good"

Tom Allen
15 December 2021 • 2 min read

Threats and Risks

MICROSOFT FIXES SIX ZERO-DAYS IN DECEMBER PATCH TUESDAY UPDATE

One zero-day addressed has been observed in active attacks

Dev Kundaliya
15 December 2021 • 3 min read

Legislation and Regulation

JOINT COMMITTEE RECOMMENDS 'MAJOR CHANGES' IN ONLINE SAFETY BILL

14 December 2021 • 3 min read

Cloud and Infrastructure

PREDICTING DISRUPTION: WHAT AMADEUS' MOVE TO AZURE COULD MEAN FOR TRAVELLERS

13 December 2021 • 4 min read

Green

INDUSTRY INITIATIVE AIMS TO FOSTER GREEN SOFTWARE DEVELOPMENT

14 December 2021 • 3 min read

Hacking

KRONOS RANSOMWARE RESTORATION MAY TAKE 'WEEKS'

14 December 2021 • 2 min read

Hacking

INDIAN PM NARENDRA MODI'S TWITTER ACCOUNT HACKED TO DECLARE BITCOIN LEGAL TENDER

13 December 2021 • 3 min read

Strategy

PARTNER INSIGHT: SIX D&I LEARNINGS FROM SCOTT LOGIC'S CHIEF TALENT OFFICER

15 December 2021 • 4 min read

Government

GERMANY'S NEW GOVERNMENT VOWS TO SUPPORT END-TO-END ENCRYPTION WHILE UK LOOKS TO
UNDERMINE IT

13 December 2021 • 3 min read

Cloud and Infrastructure

AMAZON BLAMES AUTOMATED CAPACITY SCALING PROGRAM FOR MAJOR OUTAGE LAST WEEK

13 December 2021 • 3 min read

DevOps

DEVOPS: START LARGE OR START SMALL, BUT NEVER FORGET ABOUT COMMUNICATION

13 December 2021 • 5 min read

Threats and Risks

'ESPECIALLY DANGEROUS' JAVA ZERO DAY DISCOVERED, SAME TYPE AS USED IN EQUIFAX
BREACH

10 December 2021 • 2 min read



Delta

view all

MICROSOFT VERSUS ZOOM VERSUS CISCO - SHOULD YOU OPT FOR TRADITIONAL UCC VENDOR
OR UPSTART?

THE PANDEMIC HAS BOOSTED UCC, BUT IT'S ONLY PART OF THE STORY

MICROSOFT AZURE SENTINEL VS DARKTRACE ENTERPRISE IMMUNE SYSTEM: WHO'S ON TOP IN
AI SECURITY?

IT LEADERS ARE RELUCTANT TO TRUST AI IN SECURITY - HERE'S WHY THEY'RE WRONG

AI-ENHANCED SECURITY TOOLS: LIVING UP TO THEIR PROMISE?



Upcoming events
20 Jan
United Kingdom
Website


MAKING YOUR SECURITY STACK SOAR WITH AUTOMATED RESPONSE

More information
26 Jan
United Kingdom
Website


THE DATABASE RACE: HOW TO PICK A WINNER TODAY THAT WILL STILL DELIVER FOR YEARS
TO COME

More information
27 Jan
United States
Website


IS AI THE LAST LINE OF DEFENCE, OR THE FIRST?

More information

Whitepapers
view all


NEW APPS FOR OLD

This Computing whitepaper examines the pain points associated with application
deployment and management in an increasingly hybrid and rapidly changing IT
environment. In particular, it looks at how companies striving for digital
transformation are adopting new technologies to achieve those aims, from
prioritising mobile support to data-driven process automation and AI, and at the
impact these are having on development schedules.

Download


TOP 10 WAYS TO PROTECT YOUR ORGANISATION FROM RANSOMWARE

No organisation is exempt from ransomware attacks as it continues to be one of
the most prominent malware threats used by cybercriminals. To survive a
ransomware attack, you must be prepared.These 10 ten ways will help you protect
your organisation from ransomware through protective and response methods.

Download


GDPR IS A STATE OF MIND, NOT JUST A TECHNOLOGY SOLUTION

GDPR is coming and there is no black and white compliance solution. Most
businesses seem to worry but, with the right approach and the right combination
of tools, building a sustaining framework to support GDPR and other regulations
is possible. Download now to find out more.

Download

Trendlines

CORONAVIRUS

   

 * COVID RESULTS EMAILS MAY BREACH GDPR

   

 * THE PITFALLS AND OPPORTUNITIES OF A DIGITAL HEALTH PASSPORT

   

 * GOOGLE REVEALS THE MOST SEARCHED TERMS OF 2020, AND THE WINNER IS…

   

 * FRAUDSTERS ARE TARGETING CHRISTMAS SHOPPERS

SECURITY

   

 * THE RISE OF THE TOKEN CISO

   

 * TOP FOUR TECHNOLOGY TRENDS FOR 2021

   

 * DO WE NEED TOUGHER BREACH NOTIFICATION RULES?

   

 * RUSSIAN AUTHORITIES ARREST 25 FOR RUNNING STOLEN CREDIT CARD MARKETPLACE

CLOUD

   

 * MI6 CHIEF SEEKS HELP FROM TECH FIRMS TO COUNTER HOSTILE STATE THREATS

   

 * AWS EXPANDS FREE TIER FOR DATA TRANSFER

   

 * TWO GOOGLE EMPLOYEES OPPOSING A JOINT PROJECT WITH ISRAELI GOVERNMENT REVEAL
   THEIR IDENTITIES

   

 * EUROPEAN TECH RULES MUST ALSO APPLY TO CLOUD PROVIDERS, SAY CAMPAIGNERS


CyberSecurity Festival Chapter 2

Helping make the next era of cybersecurity one of resilience, collaboration, and
awareness

Find out more


Congratulations to all our 2021 Finalists

Celebrating IT Excellence and Impact

View 2021 Finalists


Celebrating DevOps Success

Entries Now Open for 2022

Find out More


Season 7: DevSecOps

Building better cross-functional teams and implementing secure code into
products

Find out More


Tech Impact 2022

Announcing Tech Impact 2022; Find out how you can make your organisation
sustainable.

Find out more



Opinion
view all

WHAT THE GOVERNMENT'S AI STRATEGY MEANS FOR THE PRIVATE SECTOR

Chintan Patel
11 November 2021 • 4 min read

PETER COCHRANE: WE CAN CHANGE FAST IF THE THREAT IS BIG ENOUGH

Professor Peter Cochrane
23 November 2021 • 3 min read

CLOUD SECURITY - HOW TO PUT A SOC IN IT

Colin Fernandes
04 November 2021 • 4 min read

HOW INTELLIGENT AUTOMATION IS MAKING INSURANCE PAY

Callum Rimmer
06 December 2021 • 4 min read

REMOTE WORKING WON'T IMPACT WORKFORCE PRODUCTIVITY AND COLLABORATION - UNLESS
YOU LET IT

Andrew Filev
15 July 2021 • 4 min read

THE REAL REASON CHILDREN AREN'T TAKING COMPUTER SCIENCE AT SCHOOL

Otto Sumner
03 December 2021 • 3 min read


SPONSORED CONTENT

Industry Voice

view all

PARTNER INSIGHT: SIX D&I LEARNINGS FROM SCOTT LOGIC'S CHIEF TALENT OFFICER

SPEED AND SECURITY: AN INTERVIEW WITH IBOSS, TECHNOLOGY PRODUCT AWARDS FINALIST

ASHA KUMAR, HSBC CIO: DIVERSITY AND INCLUSION ARE NOT ONE-AND-THE-SAME

WHAT SHOULD CI/CD LOOK LIKE IN A MODERN BUSINESS?

HOW INTELLIGENT AUTOMATION IS MAKING INSURANCE PAY


Most read

01

KRONOS RANSOMWARE RESTORATION MAY TAKE 'WEEKS'

14 December 2021 • 2 min read
02

HACKERS ARE TARGETING OVER A MILLION WORDPRESS SITES IN ONGOING ATTACKS

10 December 2021 • 3 min read
03

'ESPECIALLY DANGEROUS' JAVA ZERO DAY DISCOVERED, SAME TYPE AS USED IN EQUIFAX
BREACH

10 December 2021 • 2 min read
04

MICROSOFT SEIZES CONTROL OF 42 DOMAINS USED BY CHINA-BASED NICKEL HACKING GROUP

09 December 2021 • 3 min read
05

ALIBABA DEVELOPS CHIP THAT 'MERGES PROCESSOR AND MEMORY'

08 December 2021 • 2 min read
06

GERMANY'S NEW GOVERNMENT VOWS TO SUPPORT END-TO-END ENCRYPTION WHILE UK LOOKS TO
UNDERMINE IT

13 December 2021 • 3 min read



JOIN COMPUTING

Unlimited access to real-time news, analysis and opinion.

Join


JOIN COMPUTING

Unlimited access to real-time news, analysis and opinion.

Join now

 * Contact Us
 * Marketing Solutions
 * About Incisive Media
 * Privacy Settings

 * Terms & Conditions
 * Policies
 * Careers

FOLLOW US
 * 
 * 
 * 
 * 
 * 
 * 

© Incisive Business Media (IP) Limited, Published by Incisive Business Media
Limited,New London House, 172 Drury Lane, London WC2B 5QR.Registered in England
and Wales with company registration numbers 09177174 & 09178013

DIGITAL PUBLISHER OF THE YEAR