If you cannot view this email please click here

BYOD

Passwords

Hacking CloudSecurity Compliance Reviews

Features


Erasing the data on Solid State Drives...

Thanks to Solid State Drives (SSD), the wider world has now become our office. But there are many thorny issues regarding the retirement of these assets

main headline
banner advert

At your own risk...

Keeping business systems safe and protecting your data has never been more difficult to achieve. And it is only likely to BECOME harder. Getting the right risk management strategy in place is critical

main headline

When the cracks start to show

A comprehensive compliance strategy can be onerous to achieve, but, if not enforced, leave businesses HIGHLY vulnerable. It's the challenges compliance brings that makes some organisations avoid enforcing it - often to their regret. Brian Wall reports

main headline

315,000 new malicious files detected every day

The overall global Internet threat level has grown by 6.9 percentage points – during 2013, 41.6% of user computers were attacked at least once.

main headline

Cloud's silver lining for the mobility age

Is a cloud-based security model the way forward - one that is not reliant on where users are or what devices they are using to access the web or cloud applications? Computing Security reports

main headline
banner advert

News

K3 launches new cloud division

K3 Business Technology Group (K3) has launched a new IT consultancy division to deploy and manage secure cloud services all over the world

DDoS trends show leap in attack size

Global distributed denial of service (DDoS) attack trends continue to be a global threat, with alarming increases in attack size.

main headline

Powerful new alliance offers advanced threat protection

FireEye has acquired privately-held Mandiant, provider of advanced endpoint security products and security incident response management solutions.

main headline

100% of top android apps hacked

The Top 100 paid Android apps have all been hacked, it is claimed

Questions - answers

Companies seeking to improve information security without incurring significant expense are increasingly turning to the cloud

Masterclass

Why Windows 8 is so gr8!

Tim Ager says the demise of Windows xp is no cause for lamentation - Windows 8 has so much to offer

main headline

Review

ManageEngine EventLog Analyzer

ManageEngine's EventLog Analyzer (MEA) offers an interesting alternative to the mainstream SIEM (security information and event management) solutions

main headline

Celestix Networks' HOTPin v3.7

The exponential growth of mobile workforces is making businesses rethink their security strategy for remote access, as simple usernames and passwords are not enough .

main headline

SolarWinds Log & Event Manager

Despite the wide choice of SIEM (security information and event management) solutions, their high prices put most of them beyond the reach of SMEs.

main headline

GFI LanGuard 2014

Focusing on endpoint vulnerability assessment, patch management and auditing, LanGuard has been a stalwart member of GFI's security suite for many years. .

main headline

AWARDS

Computing Security Awards

The 2013 Computing Security Awards at the Hotel Russell in London were a huge success, as people from right across the industry gathered to hear who had triumphed - and carried off the much coveted winners' accolades. Here we profile some of last year's winners

Identity and Access Management Solution of the Year 2013

WINNER: Celestix - HOTPin

main headline

SIEM (Security Incident and Event Management) Solution of the Year 2013

WINNER: AlienVault - Unified Security Management

main headline

White papers

Password Protected: A Survey On Two-Factor Authentication

The background to eliminating insecure passwords

Cloud-Based Services: Easing The I.T Burden While Taking Control

The potential benefits of employing cloud-based services, either in place of existing IT resources or alongside them, are undoubtedly significant, as this white paper from GFI Cloud makes clear.

Now is the Winter of our discontent

Welcome to the February 2014 Newsletter - and I hope the year is progressing well for everyone.

Of course, security threats abound and persist everywhere - we all need to be on our guard constantly. And there is nothing like a major sporting event to get everyone up on their toes: nervous, but hopefully also fully alert to what might happen. The London Olympics was a case in point and the 2014 Winter Olympics in Sochi, Russia, from 7-23 of this month, have proved to be no different.

Not long after the Games began, the United States issued what was a fresh travel alert for Americans attending the Olympics, citing cyber security threats and warning them to have "no expectation of privacy" using Russian communications networks. The US State Department's alert came the same day that Turkish security forces in Istanbul seized a Ukrainian man accused of trying to hijack an airliner and redirect it to Sochi. The warning came in the middle of a controversy in which US officials blamed Russia for the Internet leak of recordings of a senior State Department official

All very worrying... but maybe to be expected. Heightened international tensions now invariably include cyber security accusations and counter-accusations. It's the on line world we live in and where most of our business, and lives, is now conducted.

It only serves to reinforce for all of us, whatever level of 'cyber' and 'security' we operate at, that vigilance is the key. As is having the right processes and policies in place (ie, not just the best software solutions!) to ensure we don't fall prey to those out there with an increasingly sophisticated array of tools at their disposal - from hacktivism, to remote administration tools (RATs), to Advanced Persistent Threats (APTs). When it comes to security, only a gold medal position is good enough.

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

Follow us :

 

 

 

To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622