CSMagAndAwards Profile Banner
Computing Security Profile
Computing Security

@CSMagAndAwards

Followers
2K
Following
610
Media
663
Statuses
3K

Twitter, home of Computing Security Magazine and Awards. To see who won what at the 2024 Computing Security Awards, go to: https://t.co/3htpu1naVU

Joined October 2013
Don't wanna be here? Send us removal request.
@CSMagAndAwards
Computing Security
6 months
Six of the best.With more than six years to its name and counting, how has GDPR fared so far?.@TrustVanta.#GDPR.#regulations.#datamanagement.#AI.#softwarevulnerability
Tweet media one
0
0
0
@CSMagAndAwards
Computing Security
6 months
Battered and breached.A survey paints a disturbing picture of the scale of cyber-attacks perpetrated against UK businesses.@NCCGroupplc.#surveys.#cyberattacks.#phishing.#maleware.#cloud.#security
Tweet media one
0
0
0
@CSMagAndAwards
Computing Security
6 months
At the AI crossroads.Are the criminals on the front foot in the battle to use AI for good or bad? Editor Brian Wall reports.@Google.#AI.#crime.#cybersecurity.#regulations.#vulnerabilities.#security
Tweet media one
0
0
0
@CSMagAndAwards
Computing Security
7 months
Worrying train of thought.Why continuous security training should have a role to play in long-term development of all.@Hornetsecurity.#training.#cybersecurity.#research.#threatactors.#testandmeasurement.#security
Tweet media one
0
0
0
@CSMagAndAwards
Computing Security
7 months
Lack of technology investment restricting business growth.Almost half of UK mid-sized enterprises without access to most advanced technology.@ANSGroup.#innovation.#technology.#recruitment.#recovery.#security
Tweet media one
0
0
0
@CSMagAndAwards
Computing Security
7 months
National cyber threat was ignored.Former government approach slammed as an ‘ostrich strategy’.@Illumio.#cyberthreat.#ransomware.#zerotrust.#cyberattacks.#legislation.#security
Tweet media one
0
0
0
@CSMagAndAwards
Computing Security
7 months
Microsoft email breach labelled "a strategic blow".Microsoft source code and 'other secrets' compromised by Midnight Blizzard attack.@TenableSecurity.#emailhacking.#sourcecode.#crime.#bruteforcing.#passwordprotection.#security
Tweet media one
0
0
0
@CSMagAndAwards
Computing Security
7 months
Vulnerabilities on healthcare organisation networks exposed.Almost one quarter of medical devices have Known Exploited Vulnerabilities, it is reported.@Claroty.#vulnerabilities.#healthcare.#cybercrime.#remoteaccess.#riskmanagement.#security
Tweet media one
0
0
1
@CSMagAndAwards
Computing Security
8 months
ThreatLocker MDR service.Customers alerted to potential malicious activity.@ThreatLocker.#MDR.#malwareattacks.#endpointsecurity.#threatdetection.#security
Tweet media one
0
1
2
@CSMagAndAwards
Computing Security
8 months
Cybersecurity best practice advice released.Guidelines unveiled to aid security boost for cloud.@CadoSecurity.#cloud.#onpremise.#threatdetection.#security
Tweet media one
0
0
0
@CSMagAndAwards
Computing Security
8 months
Confidential data shared online.Personal information exposed in the wake of criminal investigation.@blackfogprivacy.#databreaches.#crime.#ransomware.#extortion.#exfiltrationtools.#security
Tweet media one
0
0
0
@CSMagAndAwards
Computing Security
8 months
Fraudulent websites spreading malware.Zscaler's ThreatLabz investigations pinpoint threat actor creating fraudulent Skype, Google Meet and Zoom websites.@zscaler.#Remoteaccesstrojans.#threatactors.#malware.#remoteaccess.#securityupdate.#dataprotection
Tweet media one
0
0
0
@CSMagAndAwards
Computing Security
8 months
The dark side of emerging AI technologies.A new book offers a penetrating look into the murky, darker recesses of artificial intelligence.@WileyBusiness.#AI.#cybersecurity.#machineintelligence.#socialengineering.#malwareattacks.#security
Tweet media one
0
0
0
@CSMagAndAwards
Computing Security
8 months
Inside out!.Insider threats hit more than 34% of companies worldwide every year. Without real action that figure will only get worse.@TitaniaLtd.#insiderthreats.#cyberattacks.#zerotrust.#detectionandresponse.#security.#phishing
Tweet media one
0
0
0
@CSMagAndAwards
Computing Security
8 months
A world in turmoil.The growing rift between those who are well protected against attacks and those most vulnerable suggests that no organisation is entirely safe.@wef.#vulnerabilities.#attackanalysis.#cybersecurity.#cyberresilience.#deepfake.#security
Tweet media one
0
0
0
@CSMagAndAwards
Computing Security
8 months
Face off!.When it comes to device-based and server-based facial authentication, which, if either, is the more secure?.@CelestixNetwork.#facialrecognition.#identitymanagement.#mobiledevices.#encryption.#security
Tweet media one
1
0
1
@CSMagAndAwards
Computing Security
9 months
Democracy under siege.Political misinformation and disinformation are forecast to create distorted and muddied political landscapes.@ProtectionGIntl.#threatactors.#AI.#doxxing.#digitalisation.#personallyidentifieableinformation.#security
Tweet media one
0
0
0
@CSMagAndAwards
Computing Security
9 months
Gone nuclear.Security issues at UK civil nuclear facilities have been on the up - while inspection levels fall away. @dorfman_p.#nuclearestablishments.#cybersecurity.#malware.#regulations.#cyberattacks.#security
Tweet media one
0
0
0
@CSMagAndAwards
Computing Security
9 months
Threat or treat?.How accurate might Elon Musk, owner of X and Tesla, be when he says AI is one of the "biggest threats" to humanity?.@BlackBerrySpark.#cyberattacks.#AI.#databreaches.#malware.#emailhacking.#security
Tweet media one
0
0
0
@CSMagAndAwards
Computing Security
9 months
EC steps in to drive support for AI innovation.European start-ups and SMEs need all the help they can get to develop AI models.@enveil_inc.#AI.#smallmediumenterprises.#regulations.#riskmanagement.#privacylaws.#security
Tweet media one
0
0
1