If you cannot view this email please click here

BYOD

Passwords

Hacking Cloud Compliance Reviews


COMPUTING SECURITY AWARDS 2014:

WHAT A NIGHT OF WINNERS!


The 2014 Computing Security Awards were undoubtedly our biggest and best so far, with people from right across the industry gathered at the Hotel Russell in London's Russell Square to hear who would be stepping forward onto the stage to collect the much coveted winners’ accolades.

For those who took those honours, it was a night of triumph and celebration. For those who had made it all the way through to the finals and didn't quite get there, no doubt they will planning to go that one step better next year when the awards will once more allow our industry to show what exceptional solutions and services are now available to those intent on keeping their organisations safe in a world where threats are growing all the time in numbers and sophistication.

Once again, our thanks to all of the readers whose thousands upon thousands of votes made this yet another exhilarating and tightly contested event. And to our sponsors - Check Point, Celestix, ZeroDayLab, Titania and Brookcourt - whose generous support is greatly appreciated.

You will find all the results in the latest issue of Computing Security magazine (Nov-Dec issue), along with background information supplied by the winning companies. You can also access the results at www.computingsecurityawards.co.uk, with video clips of the presentations. We look forward to seeing you all at the 2015 awards. Finally, to our readers, thank you once again for the wholehearted way in which you always embrace the voting process, helping to decide our winners.

Features



Anti-Virus, the Cloudmark way

How do you defend against malware that is undetectable once it reaches your computer? Andrew Conway, lead software engineer at Cloudmark, offers some answers

main headline

Are you being properly served?

Managed security services are designed to help improve information security. but how well do they perform this function?

main headline

The proactive approach

Hackers are exploiting more entry points to inflict damage than ever. What's to be done?

main headline

Feel the fear – and take to the clouds anyway!

With the cost of cybercrime to the UK put at a staggering £27bn per annum, what is being done to protect UK businesses? And is it enough?

main headline

Beyond Antivirus

We look at one company's unique approach to sandboxing and the powerful protection this delivers

main headline

Masterclass

In pursuit of radical change

Tim Ager of Celestix has been working closely with local and regional government organisations to support their transformational objectives

main headline

News

Cyber-security collaboration group announced

A strategic collaboration group has been formed to explore cyber-security for connected vehicles, amongst other key issues


Innovative IT Asset Management Services

Sims Recycling Solutions' 5-year strategic plan outlines comprehensive reuse and recycling services

Rise of the Cybervors

Hold Security has identified a Russian cyber gang now in possession of what it says is the largest cache of stolen data ever

European Central Bank hack - lessons to be learned

Cybercriminals often act within communities and this is a likely scenario with the recent attack on the European Central Bank

main headline

Enterprises at risk

New research reveal a knowledge and resource gap that could mean increased vulnerability and risk of data security breaches

New App for safer interaction

A new app enables users to safely interact with mission-critical applications on malware-infected devices

main headline

175 million plus customer records compromised

Highlights have been released from the SafeNet Breach Level Index (BLI) for the second quarter of 2014

main headline

Partnership to Deliver Critical Incident Response

A new partnership aims to deliver a full range of endpoint security and incident response products and services

main headline

Review

Cyberoam CR35iNG

Cyberoam's latest NG Series of security appliances set themselves apart from the competition, as they deliver the best price/performance ratio

main headline

Awards

Anti Spam Solution of the Year

WINNER: Libra Esva - Libra Esva
Libra Esva triumphed in the Anti Spam category, with Paolo Frizzi accepting the award

main headline

Anti Malware Solution of the Year

WINNER: Comodo - ESM
Comodo won the Anti Malware Solution of the Year award. James Tomlinson collected the trophy

main headline

Content Security Solution of the Year

WINNER: Check Point - Application Control Software Blade
The Content Security Solution of Year award was won by Check Point. Michael Wakefield and Keith Bird stepped up to the stage to accept

main headline

White papers

2014: THE DANGER DEEPENS

Neustar has released its 'Annual United Kingdom DDoS Attacks & Impact Report'. What were the experiences of those surveyed in 2013? The results suggest a more unstable and complex landscape

Password Protected: A Survey On Two-Factor Authentication

The background to eliminating insecure passwords

Cloud-Based Services: Easing The I.T Burden While Taking Control

The potential benefits of employing cloud-based services, either in place of existing IT resources or alongside them, are undoubtedly significant, as this white paper from GFI Cloud makes clear.

Inside the criminal mind

Infoblox has launched a whitepaper that takes a sideways look at DNS security from the perspective of a cybercriminal

Welcome to the November 2014 Newsletter.

It was interesting to see that Francis Maude, Minister for the Cabinet Office with responsibility for the UK Cyber Security Strategy, co-hosted a summit of CEOs from the UK’s insurance sector in conjunction with Marsh, the insurance broker and risk adviser, to discuss how the sector can help ensure that the UK is one of the safest places to do business in cyberspace.

The summit's aim is to engender closer collaboration between government and industry to help promote the growth of the cyber insurance market as a means of improving cyber security risk management.

The insurance sector is in a strong position to drive improvements in cyber security risk management, as it recognises the role it can play in improving good practice by asking the right questions of customers in relation to their cyber breach and operational risk policies.

Cyber threats pose a considerable risk to UK companies and industry is by far the biggest victim of cyber crime. Some 81% of large businesses and 60% of small businesses suffered a breach in the last year, with the average cost of breaches to business nearly doubling since last year, according to the '2014 Information Security Breaches Survey', commissioned by The Department for Business, Innovation and Skills (BIS) and conducted by PwC, in association with Infosecurity Europe.

"Protecting the cyber security of UK businesses is an important part of this government's long-term economic plan - we want the UK to be one of the most secure places in the world to do business," said Francis Maude.

The summit took place on Guy Fawke's Day, but I'll resist any puns about its explosive content. In fact, far from explosive, it marked something that hopefully will last much longer than some high-flying spectacular rocket that then burns out and plummets back to earth - and have far greater value in protecting businesses in the long term.

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

Follow us :

 

 

 

To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622