Grave New World
The Bank of England has announced that it is to employ ethical hackers to conduct penetration tests, in a bid to strengthen cyber security within the financial industry |
 |
Shared Intelligence is a Must! Renewed calls went out at Infosec 2014 in London for greater collaboration on how security intelligence is shared to protect against cyber attacks
|
 |
Heartbleed: the aftermath
While many reports around security bug Heartbleed have been doom and gloom, there are things you can do right away to protect yourself |
 |
Who Holds the Upper Hand?
With mobile devices now prolific, monitoring and device management have never been so vital |
 |
Cyber-risk insurance: right for you?
The increasing popularity of cyber insurance policies indicates many companies feel they have lost the fight to protect their boundaries and are now looking for a new approach, says Tim Ager, Celestix
|
 |
Living with Privileged Users and Passwords
Passwords and Privileged Users: you can't get anything done without either. But they're also prime targets for insiders and external hackers, as Osirium CTO Kev Pearce explains
|
 |
Parking Fine Scam Warning
A wave of parking fine spam continues to infect computers in the UK, Bitdefender has warned
|
|
Layer 7 attacks pinpointed
DOSarrest has released its latest generation of proprietary backend software that incorporates an all-new customer-facing portal
|
|
SMEs Fight Cybercrime and Cyber Terrorism
A new project, 'Comprehensive Approach to cyber roadMap coordINation and development' (CAMINO), aims to improve resilience against cybercrime and cyber terrorism
|
 |
Tiger Scheme Transfers Operations
The Tiger Scheme, a highly regarded national accreditation for cyber security professionals, is transferring its operations to the University of South Wales
|
|
CenterTools DriveLock File Protection
CenterTools DriveLock File Protection (DFP) provides an easily deployed solution that transparently encrypts sensitive data and scales easily across SMB and enterprise environments
|
|
GFI LanGuard 2014 R2
LanGuard provides essential endpoint vulnerability assessment, patch management and auditing, and a key feature of 2014 R2 is its greatly improved mobile device auditing
|
|
Inside the criminal mind
Infoblox has launched a whitepaper that takes a sideways look at DNS security from the perspective of a cybercriminal
|
|
|
|
Welcome to the July 2014 Newsletter.
What is being hailed as the world’s first 100% secure method of sharing data (using quantum mechanics) has been successfully demonstrated for the first time.
It’s called quantum key distribution and it works by coding data into single photons, which can transmit encryption keys (the main weak point in sending encrypted data). Because of the nature of photons, any attempt to interfere with them will change their state, so any hacking attempt will be immediately clear and the transaction can be aborted, it is claimed.
The successful trial would seem to pave the way for secure financial transaction, medical records and other private data.
Toshiba Research Europe, BT, ADVA Optical Networking and the National Physical Laboratory (NPL), the UK’s National Measurement Institute, are all involved in making this happen.
Definitely one to keep an eye on
To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.
Brian Wall, Editor
Computing Security
Follow us :
|
|