Security with App-titude
Apps are everywhere, it would appear, and spreading like wildfire. What are the security implications? and just how do you keep pace?
|
 |
Digital Evidence is Everywhere!
How secure is the information on your smartphone? Who has been looking at your electronic documents and web mail? Welcome to the world of forensics, where the experts know nigh on everything about you.
|
 |
BYOD Goes Viral
A massive amount of today's Bring-Your-Own-Device activity goes unchecked, leaving businesses at enormous risk.
|
 |
The Dark Side of Trust
'Who can you trust?' is one question that needs to be pondered when considering your corporate security. But even more so: 'Who should you trust?' Brian Wall reports
|
 |
Shielding off the Phishers
Phishing, spear phishing, pharming - the threats from hackers are constantly multiplying and their means of breaching defences ever more cunning. How do you keep them at arm's reach?
|
 |
Are you getting it right?
How far do you take company policy when trying to control computer usage? There's a fine line between what is acceptable, it seems, and overstepping the mark. Brian Wall investigates in this second part of our report
|
 |
New Move to Bridge the Security Skills Gap
The Engineering and Physical Sciences Research Council (EPSRC) and the Department for Business, Innovation and Skills have granted Royal Holloway, University of London £3.8 million to host a new centre for doctoral training (CDT) in cyber security.
|
|
Daring, sophisticated $45 million ATM heist
The $45 million ATM theft involving a coordinated group of criminals in two dozen countries working together with great precision is now one of the most daring bank heists of all time. But how did the hackers manage to steal so much in such a short window of time?
|
|
Nottingham Building Society Secures Its Critical Data
The $45 million ATM theft involving a coordinated group of criminals in two dozen countries working together with great precision is now one of the most daring bank heists of all time. But how did the hackers manage to steal so much in such a short window of time?
|
|
Businesses at risk from BYOD?
Almost a third (31%) of senior managers use personal smartphones for work and close to a quarter (23%) of businesses have a 'bring your own device' (BYOD) policy in place, according to a report by YouGov SixthSense carried out among business owners, IT decision-makers and employees.
|
|
Data Security Confidence Drops For Off-Site Working
According to a new survey, IT decision makers are significantly less confident in the security of data accessed by employees on the road or at home, despite the fact that mobile device security policies are widely in place and enforced.
|
|
Losing Track Of Critical Data Means Trouble In Store
Commenting on a New York Times story about the governance issues that portable devices and their leaky apps create for companies, Varonis Systems says that mobile access to cloud-based data - and replication to the device itself - has become the new corporate norm.
|
|
|
|
|
Welcome to the July edition of the Computing Security Newsletter.
Here, you will find all the latest news, views and happenings relating to security - and the major issues that businesses are having to engage with, as they seek out the best solutions and strategies to keep their organisations safe, productive and always ahead of the game.
Whether you are concerned about malware, phishing, password protection, compliance, new legislation, or the multitude of other critical issues around security, we will be bringing you expert advice and insights on all of this.
To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.
Brian Wall, Editor
Computing Security
|
|