If you cannot view this email please click here

BYOD

Passwords

Hacking CloudSecurity Compliance Reviews

Features


Security with App-titude

Apps are everywhere, it would appear, and spreading like wildfire. What are the security implications? and just how do you keep pace?

main headline

Digital Evidence is Everywhere!

How secure is the information on your smartphone? Who has been looking at your electronic documents and web mail? Welcome to the world of forensics, where the experts know nigh on everything about you.

main headline

BYOD Goes Viral

A massive amount of today's Bring-Your-Own-Device activity goes unchecked, leaving businesses at enormous risk.

main headline

The Dark Side of Trust

'Who can you trust?' is one question that needs to be pondered when considering your corporate security. But even more so: 'Who should you trust?' Brian Wall reports

main headline

Shielding off the Phishers

Phishing, spear phishing, pharming - the threats from hackers are constantly multiplying and their means of breaching defences ever more cunning. How do you keep them at arm's reach?

main headline

Are you getting it right?

How far do you take company policy when trying to control computer usage? There's a fine line between what is acceptable, it seems, and overstepping the mark. Brian Wall investigates in this second part of our report

main headline
banner advert

News

Titania Proves It's The Gov'nor

Titania has scooped one of the prestigious US Government Security Awards - also known as the 'Govies' .

main headline

New Move to Bridge the Security Skills Gap

The Engineering and Physical Sciences Research Council (EPSRC) and the Department for Business, Innovation and Skills have granted Royal Holloway, University of London £3.8 million to host a new centre for doctoral training (CDT) in cyber security.

main headline

Small Firms Hit By £800 Million A Year Cyber-Crime Bill

Cybercrime costs small firms £800 million a year - that's according to a report conducted by the Federation of Small Businesses.

main headline

Daring, sophisticated $45 million ATM heist

The $45 million ATM theft involving a coordinated group of criminals in two dozen countries working together with great precision is now one of the most daring bank heists of all time. But how did the hackers manage to steal so much in such a short window of time?

main headline

Nottingham Building Society Secures Its Critical Data

The $45 million ATM theft involving a coordinated group of criminals in two dozen countries working together with great precision is now one of the most daring bank heists of all time. But how did the hackers manage to steal so much in such a short window of time?

Businesses at risk from BYOD?

Almost a third (31%) of senior managers use personal smartphones for work and close to a quarter (23%) of businesses have a 'bring your own device' (BYOD) policy in place, according to a report by YouGov SixthSense carried out among business owners, IT decision-makers and employees.

main headline

Data Security Confidence Drops For Off-Site Working

According to a new survey, IT decision makers are significantly less confident in the security of data accessed by employees on the road or at home, despite the fact that mobile device security policies are widely in place and enforced.

Losing Track Of Critical Data Means Trouble In Store

Commenting on a New York Times story about the governance issues that portable devices and their leaky apps create for companies, Varonis Systems says that mobile access to cloud-based data - and replication to the device itself - has become the new corporate norm.

White papers

'Surely Not' - The Surprising Weakness Of Strong Authentication Technologies

Dr Basil Philipsz outlines vulnerabilities in current Authentication Technologies and explains how his company Distributed Management Systems (DMS) has developed a new innovative solution that is, he says, immune from such flaws.

Password Protected: A Survey On Two-Factor Authentication

The background to eliminating insecure passwords

Cloud-Based Services: Easing The I.T Burden While Taking Control

This white paper examines some of the benefits for IT administrators when their applications or services are moved to or managed via the cloud.

Welcome to the July edition of the Computing Security Newsletter.

Here, you will find all the latest news, views and happenings relating to security - and the major issues that businesses are having to engage with, as they seek out the best solutions and strategies to keep their organisations safe, productive and always ahead of the game.

Whether you are concerned about malware, phishing, password protection, compliance, new legislation, or the multitude of other critical issues around security, we will be bringing you expert advice and insights on all of this.

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

 

 

 

To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622