If you cannot view this email please click here



Hacking Cloud Compliance Reviews

Nominations are now open for the 2014 Computing Security Awards

Finalists have been determined for the 2014 Computing Security Awards and we now ask you to vote to decide the ultimate winners. Voting closes 30 September and the winners will be revealed at an evening awards and dinner ceremony on 9 October in London.
Click here to vote:www.computingsecurityawards.co.uk.

banner advert


Business Risk Fears Leap

Technical vulnerabilities in their businesses - eg, cyber security, data integrity and mobile devices – are causing SMES ever deeper concerns

main headline

Aiming high with IAM

Poorly controlled IAM processes can lead to an organisation being audited and company data found to be at risk of being misused

main headline

Under attack: Leading the Fightback

The UK'S Cyber Emergency Response Team has gone live, in a bid to strengthen the country's online defences, with particular focus on critical systems. But how much of a difference will it make?

main headline


Cyber-risk insurance: right for you?

The increasing popularity of cyber insurance policies indicates many companies feel they have lost the fight to protect their boundaries and are now looking for a new approach, says Tim Ager, Celestix.

main headline


Malware: Coming Soon to Your Company?

As the malware threat evolves, businesses need to rethink their methods of protection. They can no longer rely solely on techniques, such as signature-based technologies

Living with Privileged Users and Passwords

Passwords and Privileged Users: you can't get anything done without either. But they're also prime targets for insiders and external hackers, as Osirium CTO Kev Pearce explains

main headline


Attack Incidents Soar

Alert Logic has found a significant increase in activity across cloud and hosting environments compared to last year's findings

Code space closed by attack

Source code hosting provider Code Space has suffered a devastating breach in which attackers have deleted swathes of customer data

Fears over 'Internet of Things'

Respondents cited greater exposure to threats, particularly from mobile devices, among their most pressing concerns about the 'Internet of Things'

Scale of Malware not grasped

More sophisticated malware and lack of intelligence about new security threats are key reasons for the growing number of successful malware attacks

Insider threat spreads growing concern as impact widens

Some 88% of organisations are now concerned about the potential damage that could be caused by an insider threat

main headline

ISACA names Matthew S. Loeb as new CEO

Global IT association ISACA has named Matthew S. Loeb as its new CEO

main headline


CenterTools DriveLock File Protection

CenterTools DriveLock File Protection (DFP) provides an easily deployed solution that transparently encrypts sensitive data and scales easily across SMB and enterprise environments

main headline

GFI LanGuard 2014 R2

LanGuard provides essential endpoint vulnerability assessment, patch management and auditing, and a key feature of 2014 R2 is its greatly improved mobile device auditing

main headline


SME Security Solution of the Year

WINNER: GFI Software - GFI Cloud
GFI Cloud is the easy and affordable way for busy IT admins to stay on top of their company's IT, simplifying how they manage, monitor and secure their networks - even laptops on the move - from one unified platform.

main headline

Enterprise Security Solution of the Year

WINNER: Titania - Nipper Enterprise
This is the second year running that Titania's Nipper Studio enterprise product has won this award. Enterprise organisations across the world from the financial, telecommunications, technology and retail industries now benefit from using Nipper Studio software to help secure their systems

main headline

White papers

Password Protected: A Survey On Two-Factor Authentication

The background to eliminating insecure passwords

Cloud-Based Services: Easing The I.T Burden While Taking Control

The potential benefits of employing cloud-based services, either in place of existing IT resources or alongside them, are undoubtedly significant, as this white paper from GFI Cloud makes clear.

Inside the criminal mind

Infoblox has launched a whitepaper that takes a sideways look at DNS security from the perspective of a cybercriminal

Welcome to the August 2014 Newsletter.

Despite commitments to bolster the country’s critical infrastructure, continued public spending cuts have reduced the funds available for the government and CNI operators to improve current services and facilities. This has had an impact on all CNI (Critical National Infrastructure) sectors, especially those that rely entirely on government budgets, such as border control and first responders. Restricted funding will no doubt force end users to turn to technology to increase efficiency and ensure the standards of protection and service delivery remain high.

“End users with budget constraints will look for the most cost-effective security partnerships and endeavour to keep costs to a minimum by bargaining hard, thus spurring market competition,” comments analysts Frost & Sullivan. “Intensifying competition will affect potential margins for security providers as they have to look to reduce prices to win projects and retain customers in times of financial uncertainty. “

New research from Frost & Sullivan, titled ‘Analysis of the United Kingdom Critical National Infrastructure Security Market’, finds that the market earned revenues of £2.43 billion in 2013 and estimates this will reach £3.10 billion in 2019. The study covers security for the border and maritime, energy, mass transport, water, government, C4i (command, control, communications, computers, intelligence) first responder and cyber segments.

“Integrated security systems will become popular as they can drive down the price of security systems due to the fact that they are interoperable and come from the same supplier,” notes Frost & Sullivan’s aerospace and defence research analyst Katherine Evans. “Fully integrated intelligence and security solutions are preferred to increase situational awareness and end user ability to mitigate and respond to threats.”

So, all to play for, it would seem.

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

Follow us :




To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622