If you can not view this email please click here

BYOD

Passwords

Hacking CloudSecurity Compliance Reviews

Features


2013 - Where will it take us?

What are likely to be the major challenges that organisations are faced with in the year ahead? Computing Security quizzes those in the know

To Block Or Not To Block?

As hordes of devices invade the workspace and social media reaches the stratosphere, what should you usage policy be? Many businesses are struggling to come up with the answer.



main headline

Perfectly Secure - The Impossible Dream?

Total security compliance is the Utopia most businesses dream of, but how hard is it to achieve? Is it even possible and, if yes, at what cost?



main headline

In Safe Hands

"Look closer to home, if you want to take the greatest steps to safeguard your organisation in 2013".



main headline

The Invisible Enemy

It's an all too familiar story by now. Media such as USB drives, external hard disks, cards, and rewritable CDs and DVDs, containing gigabytes of sensitive information, fall into the wrong hands



main headline

Risk and Reward

Do you have a risk management strategy in place? If so, how solid it it? Will it withstand the rigours of any security threat? If not, the consequences could be catastrophic



main headline
banner advert

News

Protection On The Go

Imation's IronKey Workspace has been certified as a go-to-market USB 3.0-based mobile workspace for deployment of Windows To Go.



main headline

Police Data Breach Prompts Questions

In the wake of a £120,000 fine handed out to Greater Manchester Police for a data breach that compromised details of over 1,000 people linked to criminal investigations, Nick Banks, head of EMEA and APAC, Imation Mobile Security, offer his thoughts.

main headline

Out Beyond The Curve

Thales has just launched the nShield Connect 6000+ and nShield Solo 6000+ hardware security modules (HSMs), said to deliver the fastest available support for elliptic curve cryptography (ECC)

main headline

Making plans for BYOD?

Opinion is still divided when it comes to implementing Bring Your Own Device (BYOD) strategies with many businesses suggesting that such deployments create more problems than they solve

main headline

Hospital Trust In Move To Counter Data Breaches

One of the most proactive NHS trusts in England has stepped up its privacy breach detection by introducing a powerful new solution

main headline

Cloud Fears Create Huge Challenge, Say Controlcircle

UK CIOs see security and compliance as major hurdles to cloud implementation, according to a new survey..

main headline

Symantec Survey Finds Small Businesses Being Targeted

More than a third of all targeted attacks (58 per day) are directed at small businesses with 250 or fewer employees, according to a Symantec Intelligence Report

How To Cut Cyber Risks

Big data analytics has the potential to reduce the growing number of cyber security risks and increase business agility.

main headline

White Papers

'Surely Not' - The Surprising Weakness Of Strong Authentication Technologies

Dr Basil Philipsz outlines vulnerabilities in current Authentication Technologies and explains how his company Distributed Management Systems (DMS) has developed a new innovative solution that is, he says, immune from such flaws.


Password Protected: A Survey On Two-Factor Authentication

With so many strong two-factor authentication offerings available, organisations must carefully evaluate the available solutions before making a decision on which way to go.


Cloud-Based Services: Easing The I.T Burden While Taking Control

This white paper examines some of the benefits for IT administrators when their applications or services are moved to or managed via the cloud.

Hello… and Welcome to the March edition of the Computing Security Newsletter

Here, you will find all the latest news,views and happenings relating to security - and the major issues that businesses are having to engage with, as they seek out the best solutions and strategies to keep their organisations safe, productive and always ahead of the game.

Whether you are concerned about malware, phishing, password protection, compliance, new legislation, or the multitude of other critical issues around security, we will be bringing you expert advice and insights on all of this.

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

 

 

 

To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622