If you cannot view this email please click here



Hacking Cloud Compliance Reviews

Nominations are now open for the 2014 Computing Security Awards

This is your chance to put forward the solutions, companies and individuals that have most impressed you. But hurry, as nominations close on 25 July! To submit your choices, click here: www.computingsecurityawards.co.uk Finalists will be announced shortly after nominations close.

banner advert


Grave New World

The Bank of England has announced that it is to employ ethical hackers to conduct penetration tests, in a bid to strengthen cyber security within the financial industry

main headline

Shared Intelligence is a Must!

Renewed calls went out at Infosec 2014 in London for greater collaboration on how security intelligence is shared to protect against cyber attacks

main headline

Heartbleed: the aftermath

While many reports around security bug Heartbleed have been doom and gloom, there are things you can do right away to protect yourself

main headline

Who Holds the Upper Hand?

With mobile devices now prolific, monitoring and device management have never been so vital

main headline


Cyber-risk insurance: right for you?

The increasing popularity of cyber insurance policies indicates many companies feel they have lost the fight to protect their boundaries and are now looking for a new approach, says Tim Ager, Celestix

main headline


Living with Privileged Users and Passwords

Passwords and Privileged Users: you can't get anything done without either. But they're also prime targets for insiders and external hackers, as Osirium CTO Kev Pearce explains

main headline


Parking Fine Scam Warning

A wave of parking fine spam continues to infect computers in the UK, Bitdefender has warned

Layer 7 attacks pinpointed

DOSarrest has released its latest generation of proprietary backend software that incorporates an all-new customer-facing portal

SMEs Fight Cybercrime and Cyber Terrorism

A new project, 'Comprehensive Approach to cyber roadMap coordINation and development' (CAMINO), aims to improve resilience against cybercrime and cyber terrorism

main headline

EfficientIP launches SOLIDserver DNS Blast

EfficientIP has launched SOLIDserver DNS Blast for mitigating DNS Distributed Denial of Service (DDoS) attacks

main headline

Tiger Scheme Transfers Operations

The Tiger Scheme, a highly regarded national accreditation for cyber security professionals, is transferring its operations to the University of South Wales

Powerful updates for CoSoSys Endpoint Protector 4 Platform

CoSoSys has released a suite of powerful updates for the endpoint protector 4 platform

main headline

Cluster Launch Takes On Cybercriminals

Firms have joined forces to highlight technical expertise and raise security standards

main headline


CenterTools DriveLock File Protection

CenterTools DriveLock File Protection (DFP) provides an easily deployed solution that transparently encrypts sensitive data and scales easily across SMB and enterprise environments

main headline

GFI LanGuard 2014 R2

LanGuard provides essential endpoint vulnerability assessment, patch management and auditing, and a key feature of 2014 R2 is its greatly improved mobile device auditing

main headline


SME Security Solution of the Year

WINNER: GFI Software - GFI Cloud

main headline

Enterprise Security Solution of the Year

WINNER: Titania - Nipper Enterprise

main headline

White papers

Password Protected: A Survey On Two-Factor Authentication

The background to eliminating insecure passwords

Cloud-Based Services: Easing The I.T Burden While Taking Control

The potential benefits of employing cloud-based services, either in place of existing IT resources or alongside them, are undoubtedly significant, as this white paper from GFI Cloud makes clear.

Inside the criminal mind

Infoblox has launched a whitepaper that takes a sideways look at DNS security from the perspective of a cybercriminal

Welcome to the July 2014 Newsletter.

What is being hailed as the world’s first 100% secure method of sharing data (using quantum mechanics) has been successfully demonstrated for the first time.

It’s called quantum key distribution and it works by coding data into single photons, which can transmit encryption keys (the main weak point in sending encrypted data). Because of the nature of photons, any attempt to interfere with them will change their state, so any hacking attempt will be immediately clear and the transaction can be aborted, it is claimed.

The successful trial would seem to pave the way for secure financial transaction, medical records and other private data.

Toshiba Research Europe, BT, ADVA Optical Networking and the National Physical Laboratory (NPL), the UK’s National Measurement Institute, are all involved in making this happen.

Definitely one to keep an eye on

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

Follow us :




To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622