If you cannot view this email please click here

BYOD

Passwords

Hacking Cloud Compliance Reviews

Features


Powering Down

Many power companies are now being refused insurance cover for cyber-attacks, because their defences are perceived as too weak

main headline

Data Leaks - Where the buck stops

High-profile leaks of confidential data are constantly in the news - while many more are hushed up. But why are they happening? And who should be responsible for ensuring such breaches do not occur?

main headline

Human frailty

Most data breaches are the result of mistakes, negligence or unexpected system glitches. Human nature dictates they will always happen, so businesses must take pre-emptive action to stop them occurring

main headline
banner advert

Masterclass

Security? It's in Microsoft's DNA!

While many rue what they see as the disappearance of Microsoft from the security business, Tim Ager argues the software giant has never been more committed to the cause

main headline

Opinion

Plaudits for the PCI audits

Ian Whiting, CEO at Titania, offers his insights on PCI-DSS Compliance - and important changes that have now emerged for Pen Testers

main headline

Case Study

Guy's and St Thomas' NHS Foundation Trust

Guy's and St Thomas' NHS Foundation Trust adopts Egress Switch to protect confidential patient information and large files exchanged with third parties

main headline

Game on!

Games Workshop found that the value of its electronic communications was being severely eroded by a deluge of spam, phishing emails and other unwanted messages. Now its chosen solution means spam is all but eliminated and 'false positives' are near to zero. Here's how it was achieved

main headline

News

Celestix Networks seeks out an Edge

Celestix Networks has launched its new Cloud Edge Security Appliance series to enable secure and seamless connectivity across physical, virtual and cloud based servers

main headline

Espion to bolster Cyber Security Innovation

Espion has begun work on a dynamic research project to spearhead a state-of-the-art knowledge and decision-support framework for privacy and cyber security innovators

main headline

On the crest of a wave

Portcullis Computer Security has been accepted into the CREST Cyber Security Incident Response (CSIR) Scheme

Cybersecurity guidelines needed

The Institution of Engineering and Technology is calling for greater clarity from the government about which cyber security advice it wants UK businesses to follow

'Overconfidence' threatens security of UK enterprises

Steria has revealed that 96% of UK enterprises believe they are capable of dealing with a major security crisis - however, only 19% of enterprises surveyed said they operated 24/7 IT security

main headline

Powerful updates for CoSoSys Endpoint Protector 4...

CoSoSys, a leading provider of cross-platform data loss prevention (DLP), device control and mobile device management (MDM) solutions, has released a suite of powerful updates for the endpoint protector 4 platform

main headline

Review

GFI WirelessSentry

GFI's WirelessSentry (WiSe) takes the expense out of wireless network monitoring by uniquely offering it as a cloud service

main headline

Celestix Networks HOTPin v3.7

The exponential growth of mobile workforces is making businesses rethink their security strategy for remote access, as simple usernames and passwords are not enough

main headline

AWARDS

Computing Security Awards

The 2013 Computing Security Awards at the Hotel Russell in London were a huge success, as people from right across the industry gathered to hear who had triumphed - and carried off the much coveted winners' accolades. Here we profile some of last year's winners

Cloud Security Solution of the Year

WINNER: GFI Software - GFI Cloud

main headline

Messaging Security Solution of the Year

WINNER: Halon - Email Security

main headline

White papers

Password Protected: A Survey On Two-Factor Authentication

The background to eliminating insecure passwords

Cloud-Based Services: Easing The I.T Burden While Taking Control

The potential benefits of employing cloud-based services, either in place of existing IT resources or alongside them, are undoubtedly significant, as this white paper from GFI Cloud makes clear.

Inside the criminal mind

Infoblox has launched a whitepaper that takes a sideways look at DNS security from the perspective of a cybercriminal

Welcome to the May 2014 Newsletter.

It comes hard on the heels of the annual gathering of all things, and all people, that are security focused: namely the InfoSec 2014 show in London. I spent three days there and can honestly say that the buzz was akin to industrious bees on a mission to sniff out the sweetest solutions and then tuck them away for a rainy day.

Of course, any day can be a rainy one, and worse, in the world of security - where insecurity is endemic. Never have IT departments - and the businesses they support - been under such bombardment from targeted onslaughts, with attackers constantly seeking to extend their reach into the very fabric of their operations. As a result, many organisations are left vulnerable and exposed. For attendees, InfoSec was a chance to step outside the arena, gather their thoughts and consider what the best plan of action might be, going forward.

The show had a multi-national feel to it as well, with many visitors making the trip from overseas. Indeed, the fact that 'we are all in it together' when it comes to trying to stave off the cyber assailants was reinforced by Infosecurity Europe research released at the event, titled 'Information Security: From Business Barrier to Business Enabler'.

The findings echoed what has long been a mantra within the industry: that government and industry must share intelligence more effectively to protect against threats. "Traditionally, information security has been viewed as a barrier to business," states the survey, "but now organisations are beginning to understand that it is not just a risk-averse IT function, but a discipline that can mitigate risk and contribute to business strategies, supporting decision-making and growth."

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

Follow us :

 

 

 

To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622