Erasing the data on Solid State Drives...
Thanks to Solid State Drives (SSD), the wider world has now become our office. But there are many thorny issues regarding the retirement of these assets |
 |

|
At your own risk...
Keeping business systems safe and protecting your data has never been more difficult to achieve. And it is only likely to BECOME harder. Getting the right risk management strategy in place is critical
|
 |
When the cracks start to show
A comprehensive compliance strategy can be onerous to achieve, but, if not enforced, leave businesses HIGHLY vulnerable. It's the challenges compliance brings that makes some organisations avoid enforcing it - often to their regret. Brian Wall reports
|
 |
Cloud's silver lining for the mobility age
Is a cloud-based security model the way forward - one that is not reliant on where users are or what devices they are using to access the web or cloud applications? Computing Security reports
|
 |
K3 launches new cloud division
K3 Business Technology Group (K3) has launched a new IT consultancy division to deploy and manage secure cloud services all over the world
|
|
DDoS trends show leap in attack size
Global distributed denial of service (DDoS) attack trends continue to be a global threat, with alarming increases in attack size. |
 |
Questions - answers
Companies seeking to improve information security without incurring significant expense are increasingly turning to the cloud
|
|
Why Windows 8 is so gr8!
Tim Ager says the demise of Windows xp is no cause for lamentation - Windows 8 has so much to offer
|
|
ManageEngine EventLog Analyzer
ManageEngine's EventLog Analyzer (MEA) offers an interesting alternative to the mainstream SIEM (security information and event management) solutions
|
|
Celestix Networks' HOTPin v3.7
The exponential growth of mobile workforces is making businesses rethink their security strategy for remote access, as simple usernames and passwords are not enough .
|
|
SolarWinds Log & Event Manager
Despite the wide choice of SIEM (security information and event management) solutions, their high prices put most of them beyond the reach of SMEs. |
|
GFI LanGuard 2014
Focusing on endpoint vulnerability assessment, patch management and auditing, LanGuard has been a stalwart member of GFI's security suite for many years. . |
|
Computing Security Awards
The 2013 Computing Security Awards at the Hotel Russell in London were a huge success, as people from right across the industry gathered to hear who had triumphed - and carried off the much coveted winners' accolades. Here we profile some of last year's winners
|
|
|
|
|
Now is the Winter of our discontent
Welcome to the February 2014 Newsletter - and I hope the year is progressing well for everyone.
Of course, security threats abound and persist everywhere - we all need to be on our guard constantly. And there is nothing like a major sporting event to get everyone up on their toes: nervous, but hopefully also fully alert to what might happen. The London Olympics was a case in point and the 2014 Winter Olympics in Sochi, Russia, from 7-23 of this month, have proved to be no different.
Not long after the Games began, the United States issued what was a fresh travel alert for Americans attending the Olympics, citing cyber security threats and warning them to have "no expectation of privacy" using Russian communications networks. The US State Department's alert came the same day that Turkish security forces in Istanbul seized a Ukrainian man accused of trying to hijack an airliner and redirect it to Sochi. The warning came in the middle of a controversy in which US officials blamed Russia for the Internet leak of recordings of a senior State Department official
All very worrying... but maybe to be expected. Heightened international tensions now invariably include cyber security accusations and counter-accusations. It's the on line world we live in and where most of our business, and lives, is now conducted.
It only serves to reinforce for all of us, whatever level of 'cyber' and 'security' we operate at, that vigilance is the key. As is having the right processes and policies in place (ie, not just the best software solutions!) to ensure we don't fall prey to those out there with an increasingly sophisticated array of tools at their disposal - from hacktivism, to remote administration tools (RATs), to Advanced Persistent Threats (APTs). When it comes to security, only a gold medal position is good enough.
To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.
Brian Wall, Editor
Computing Security
Follow us :
|
|