Powering Down
Many power companies are now being refused insurance cover for cyber-attacks, because their defences are perceived as too weak |
 |
Data Leaks - Where the buck stops High-profile leaks of confidential data are constantly in the news - while many more are hushed up. But why are they happening? And who should be responsible for ensuring such breaches do not occur?
|
 |
Human frailty
Most data breaches are the result of mistakes, negligence or unexpected system glitches. Human nature dictates they will always happen, so businesses must take pre-emptive action to stop them occurring
|
 |

|
Security? It's in Microsoft's DNA!
While many rue what they see as the disappearance of Microsoft from the security business, Tim Ager argues the software giant has never been more committed to the cause
|
 |
Plaudits for the PCI audits
Ian Whiting, CEO at Titania, offers his insights on PCI-DSS Compliance - and important changes that have now emerged for Pen Testers
|
 |
Game on!
Games Workshop found that the value of its electronic communications was being severely eroded by a deluge of spam, phishing emails and other unwanted messages. Now its chosen solution means spam is all but eliminated and 'false positives' are near to zero. Here's how it was achieved
|
 |
Celestix Networks seeks out an Edge
Celestix Networks has launched its new Cloud Edge Security Appliance series to enable secure and seamless connectivity across physical, virtual and cloud based servers
|
 |
Espion to bolster Cyber Security Innovation
Espion has begun work on a dynamic research project to spearhead a state-of-the-art knowledge and decision-support framework for privacy and cyber security innovators
|
 |
On the crest of a wave
Portcullis Computer Security has been accepted into the CREST Cyber Security Incident Response (CSIR) Scheme
|
|
Cybersecurity guidelines needed
The Institution of Engineering and Technology is calling for greater clarity from the government about which cyber security advice it wants UK businesses to follow
| |
Powerful updates for CoSoSys Endpoint Protector 4...
CoSoSys, a leading provider of cross-platform data loss prevention (DLP), device control and mobile device management (MDM) solutions, has released a suite of powerful updates for the endpoint protector 4 platform
|
 |
GFI WirelessSentry
GFI's WirelessSentry (WiSe) takes the expense out of wireless network monitoring by uniquely offering it as a cloud service
|
|
Celestix Networks HOTPin v3.7
The exponential growth of mobile workforces is making businesses rethink their security strategy for remote access, as simple usernames and passwords are not enough
|
|
Computing Security Awards
The 2013 Computing Security Awards at the Hotel Russell in London were a huge success, as people from right across the industry gathered to hear who had triumphed - and carried off the much coveted winners' accolades. Here we profile some of last year's winners
|
|
Inside the criminal mind
Infoblox has launched a whitepaper that takes a sideways look at DNS security from the perspective of a cybercriminal
|
|
|
|
Welcome to the May 2014 Newsletter.
It comes hard on the heels of the annual gathering of all things, and all people, that are security focused: namely the InfoSec 2014 show in London. I spent three days there and can honestly say that the buzz was akin to industrious bees on a mission to sniff out the sweetest solutions and then tuck them away for a rainy day.
Of course, any day can be a rainy one, and worse, in the world of security - where insecurity is endemic. Never have IT departments - and the businesses they support - been under such bombardment from targeted onslaughts, with attackers constantly seeking to extend their reach into the very fabric of their operations. As a result, many organisations are left vulnerable and exposed. For attendees, InfoSec was a chance to step outside the arena, gather their thoughts and consider what the best plan of action might be, going forward.
The show had a multi-national feel to it as well, with many visitors making the trip from overseas. Indeed, the fact that 'we are all in it together' when it comes to trying to stave off the cyber assailants was reinforced by Infosecurity Europe research released at the event, titled 'Information Security: From Business Barrier to Business Enabler'.
The findings echoed what has long been a mantra within the industry: that government and industry must share intelligence more effectively to protect against threats. "Traditionally, information security has been viewed as a barrier to business," states the survey, "but now organisations are beginning to understand that it is not just a risk-averse IT function, but a discipline that can mitigate risk and contribute to business strategies, supporting decision-making and growth."
To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.
Brian Wall, Editor
Computing Security
Follow us :
|
|