In pursuit of radical change
Tim Ager of Celestix has been working closely with local and regional government organisations to support their transformational objectives
|
 |

|
Beyond Antivirus
Comodo's Melih Abdulhayoğlu explains his company's unique approach to sandboxing and the powerful protection this delivers
|
 |
Malware: Coming Soon to Your Company?
As the malware threat evolves, businesses need to rethink their methods of protection. Dr Andrew Armstrong, chief security consultant for Perspective Risk, explains
|
|
Becoming an APT Spycatcher
Cybercrime has become somewhat 'old school' in its approach today, writes Andy Travers, VP EMEA at Fortinet. It's not always about brute force anymore
|
 |
Sparkling outcome!
Casa Vinicola Zonin is one of the most important private wine houses in Italy and one of the foremost in the world, distributing and selling wines and sparkling wines |
|
The proactive approach
Hackers are now exploiting more entry points to inflict damage than ever before. What’s to be done? Cyber Security EXPO may offer some clues |
|
New app for safer interaction
Comodo has released a desktop application that enables users to safely interact with mission-critical applications on malware-infected devices
|
 |
Enterprises at risk
Websense has unveiled new findings from the global Ponemon Institute survey, 'Roadblocks, Refresh, & Raising the Human Security IQ'
|
|
Cyberoam CR35iNG
Cyberoam's latest NG Series of security appliances set themselves apart from the competition, as they deliver the best price/performance ratio
|
|
Security Project of the Year 2013 - Public Sector
WINNER: Lancashire Healthcare and NW NHS/Check Point/Imerja/Polycom
Imerja's Video as a Service (VaaS) is based on leading technology from Polycom and delivered from a secure environment underpinned by Check Point technology, allowing doctors and clinicians to assess and treat patients remotely through a secure, high-definition video link |
|
Security Project of the Year 2013 - Private Sector
WINNER: ICT4/ MXSweep
MXSweep UK channel manager Sheelagh Hawkins notes: "Our winning the award for Security Project of the Year (Private Sector) was great news and recognises just how well the entire MXSweep team works with partners to guarantee the successful delivery of services to their end-user customers.” |
|
2014: THE DANGER DEEPENS
Neustar has released its 'Annual United Kingdom DDoS Attacks & Impact Report'. What were the experiences of those surveyed in 2013? The results suggest a more unstable and complex landscape
|
Inside the criminal mind
Infoblox has launched a whitepaper that takes a sideways look at DNS security from the perspective of a cybercriminal
|
|
|
|
Welcome to the September 2014 Newsletter.
The global business and IT landscape has changed greatly over the last year, with a growing number of cybersecurity incidents and large-scale data breaches. According to nearly 80% of respondents to a new COBIT user survey, having effective IT governance in place has become more valuable than ever.
To simplify IT governance and help companies manage their valuable data, global IT association ISACA has now launched an online version of its COBIT 5 framework. COBIT online has been designed to make it easy to navigate to the specific portions of COBIT that an enterprise needs, and also offers new goals and RACI Planner tools that allow companies to readily customise COBIT for their needs.
According to COBIT users, the top five benefits their enterprise achieved by implementing COBIT 5 are:
• Integrated business and IT
• Improved risk management
• Identified gaps
• Improved visibility with board of directors
• Improved communication among siloed teams.
This is a timely release and, if it delivers against its promises, could help to keep data breaches at bay for those who embrace it.
To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.
Brian Wall, Editor
Computing Security
Follow us :
|
|