If you cannot view this email please click here



Hacking Cloud Compliance Reviews


Free-flowing access control

Certes Networks' CryptoFlow product suite offers automatically enforced role-based access control for users on any Apple, Windows or Android device

From protecting luxury cars... to protecting the nation

38-year-old network engineer for a high-end car dealer beats thousands of entrants to claim top spot in UK's premier cyber skills competition

main headline

Why the best CIOs are preparing to fail

Despite large-scale breaches emphasising the likelihood of a cyber attack, many CIOs still allow response plans to slip

main headline

Identity + Alliance

BeyondTrust collaborates with SailPoint as inaugural member of Identity+ Alliance


Be wary of wearables

Wearables are the latest big innovation for the mobile devices market. But they bring substantial security threats with them

main headline

Friendly fire: the insider threat

Nullifying the malicious insider threat poses a different challenge to solving the intruder threat. What are your options?

main headline

Cyber attacks to be tackled by students

Innovative new cyber security software is being developed by researchers at two UK universities

main headline


Tackling data centre challenges

Multinational corporations are coming under increased pressure to develop consistent global asset management and disposal policies and procedures, as Dr Anand Narasimhan, managing director, Asset Recovery Services EU & India, Sims Recycling Solutions, explains

main headline


The Data Breach Blindspot

How do you control data breaches that threat systems miss (or take too long to find)? Here, Adam Boone, chief marketing officer at Certes Networks, offers his insights

main headline

Fighting back against malware

How do you best protect your systems from malware infiltration and infection? Malwarebytes offers some expert insights

main headline

Product Review

Malwarebytes Anti-Exploit for Business

According to many different statistics, most exploit attacks happen against known vulnerabilities

main headline



More of our winners from the 2015 Computing Security Awards:

Mobile Security Solution of the Year

WINNER: Good Technology - Good Work
RUNNER UP: Accellion – Kiteworks

main headline

Identity and Access Management Solution of the Year

WINNER: ForgeRock - Open AM
RUNNER UP: Wallix - AdminBastion

main headline

Auditing / Reporting Solution of the Year

WINNER: Fortinet - FortiAnalyzer
RUNNER UP: Assuria – CyberSense

All of the 2015 Awards results can be seen by going to:


Please note: the winning products and services will not necessarily be the only solutions or the newest solutions available from the respective suppliers. You should contact these suppliers directly to learn more about what they can offer.

main headline

White papers

How to avoid a tangled Web

Web 2.0 aids enterprises in conducting business, but also introduces many damaging risks. Trend Micro offers its insights into Web application vulnerabilities and how to avoid these

Meeting European Data Protection and Security Requirements with CipherCloud Solutions

This white paper investigates how encryption and tokenisation of data can help companies that are subject both to EU data protection and general security laws to adopt cloud-based solutions and remain in legal compliance

Welcome to the February 2016 issue of the Computing Security Newsletter

So, HSBC is launching voice recognition and touch ID services to protect customers. It signals what could be the beginning of the end for passwords across the banking sector – and, if it is a success, then others are bound to follow.

From this summer, around 15 million HSBC and First Direct customers now using telephone banking and the mobile app can choose to access their accounts with a voice and fingerprint verification system. HSBC claims its biometric home security system is safer than current log-ins where clients can forget passwords – and leave themselves open to cyber crooks using the same password across a variety of accounts.

“The launch of voice and touch ID makes it even quicker and easier for customers to access their bank account, using the most secure form of password technology – the body,” commented Francesca McDonagh, HSBC UK’s head of retail banking and wealth management.

According to Simon Moffatt, director Advanced Customer Engineering, ForgeRock: “The age of the username and password, whilst still incredibly popular, is dead from a security perspective. Biometrics are an incremental step in removing the risks associated with password-based authentication, but we also need to start leveraging things such as trusted device management and continuous security checking.

“For example, tying trusted previously registered devices to individuals and logins helps to reduce the risks associated with credential theft,” he adds. “Couple with that the use of continual security – by noticing differences in request location for example over a short of period – can all help to provide a more incremental and risk focused approach to identity management and sign in services.”

How soon biometrics might become mainstream across all business sectors is now the big question, especially as cyber attacks continue to hit unprecedented levels.

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

Follow us :




To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622