If you cannot view this email please click here

BYOD

Passwords

Hacking Cloud Compliance Reviews



Editoral Focus


The search for the security champions of 2018

It’s time to make your nominations - we ask you now to tell us who and what has impressed you the most. Now in their 9th year, the Computing Security Awards were set up

main headline


Editoral Focus


Cryptojacking – the spiralling cyber threat

Criminal gangs are literally coining it in by mining digital currencies through secretly infiltrating someone’s computing device

main headline


Masterclass


How machine learning can help you monitor insider threats

Charlotte Gurney, Marketing Manager, Brookcourt Solutions, looks at the role that machine learning-based solutions can play in preventing potentially devastating consequences

main headline


Inside View


Are we back to working from the office?

Despite a handful of prominent IT companies stating that intent, we have reached a point of no return, says Pavel Duddell, head of sales EMEA, Celestix

main headline

The case for investing in people

Cyber security affects us all. And while technology plays a big part in protecting the business, so does ensuring staff have the right levels of skills and training

main headline

Features


Targeting the vulnerable

Yotam Gutman, VP, marketing, SecuriThings, considers how our fast-changing world is leaving the young at risk from on-line predators

main headline

Sun or rain, bring it on!

Is the cloud right for everyone? That, says one leading observer, is the wrong question.

main headline


Product Reviews


Computer Disposals Ltd

With the GDPR (General Data Protection Regulation) now in full force since 25 May, businesses must show compliance or face potentially crippling fines for data breaches

main headline

Cardwave SafeToGo

The long-awaited EU GDPR (General Data Protection Regulation) finally took effect in May this year, so businesses that process personally identifiable information of EU citizens must demonstrate compliance or face punitive fines for security breaches

main headline

ForeScout CounterACT 8

Network infrastructures are now in a constant state of flux, forcing enterprises to re-evaluate their security postures



main headline

Algosec Security Management

As enterprise networks move deeper into the cloud, businesses can no longer rely on inefficient and error-prone manual processes to manage their security policies

main headline


Case Study


Libraesva keeps your businesses safe and secure

SecureFort is a new breed of security business

main headline

A Hefty Data Centre Security Challenge

VIRTUS Data Centres is the UK’s fastest growing data centre provider that owns, designs, builds and operates the country’s most efficient and flexible data centres

main headline

Welcome to the July 2018 issue of the Computing Security Newsletter

The level of engagement with the business at the top of our corporate trees can sometimes be breathtaking. In one recent survey, only 55% of those who responded said their organisation’s leadership team and board are “doing everything they can” to safeguard digital assets and data.

There is plenty of lip service, but not enough action, it would seem. As a part of overall governance, cyber security policies and defences were cited as the number one corporate governance technological challenge and opportunity faced by senior leadership teams globally. Yet only 21% of senior leadership and boards are briefed on risk topics at every senior leadership meeting, while just one-third of organisations assess risk related to technology use on a monthly or more frequent basis.

Despite recognising the link between governance and outcomes, a governance gap still exists, with 69% reporting that their leadership and board of director teams need to establish a clearer link between business and IT goals.

The findings come in ‘Better Tech Governance Is Better for Business’, research carried out by ISACA, which engages in the development, adoption and use of globally accepted, industry-leading knowledge and practices for information systems. “The boardroom must become hyper-vigilant in ensuring a tight linkage between business goals and IT goals, fully leveraging business technology to improve business outcomes, while diligently safeguarding the organisation’s digital assets,” says Matt Loeb, CEO of ISACA.

“The message from our research is clear: there is much work to do in information and technology governance. Committing to a boardroom with technology savvy and experience strongly represented provides the needed foundation for organisations to effectively and securely innovate through technology.”

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

Follow us :

 

 

 

To unsubscribe click here
Privacy Policy

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622