If you cannot view this email please click here

BYOD

Passwords

Hacking Cloud Compliance Reviews

Features



banner advert

Enough to make your pulse soar

Imagine this: employers monitoring programmers' pulses, eye movements and even anxiety levels to detect when they could be in trouble. It may soon be a reality

main headline

Time to halt the torrent

Stopping data leakage requires a robust chain of custody, with a high level of security, auditability and transparency

main headline

Massive attacks - we're still in denial

The enterprise perimeter does not exist anymore - a much more proactive approach to security is needed, says iomart CTO Bill Strain

main headline
banner advert

Masterclass

PSN-compliant mobile working

A PSN-compliant mobile working solution offers tangible benefits, but it is critical to enter into the process with a robust strategy, cautions Tim Ager of Celestix

main headline

News

Plan to combat cybercrime

Roundtable seeks easy-to-understand action plan that will help small firms combat cybercrime

Poor security puts data at risk

Lack of security and impugned responsibility are putting business data at risk for those working remotely

Passwords: 2B or not 2B safer?

Experian's recommendation that people should change internet passwords regularly has provoked further thought

Every business needs top cyber protection

No longer is protecting businesses from cyber threats and terrorism the domain of large enterprise networks

main headline

New security courses from ISACA

ISACA and APMG International are offering new security-focused training courses

main headline

White papers

Password Protected: A Survey On Two-Factor Authentication

The background to eliminating insecure passwords

Cloud-Based Services: Easing The I.T Burden While Taking Control

The potential benefits of employing cloud-based services, either in place of existing IT resources or alongside them, are undoubtedly significant, as this white paper from GFI Cloud makes clear.

Inside the criminal mind

Infoblox has launched a whitepaper that takes a sideways look at DNS security from the perspective of a cybercriminal

MORE COMPUTING SECURITY AWARDS WINNERS

Network Access Control Solution of the Year

WINNER: Vasco - Digipass
Vasco became champions in this category, with Siobhan Morey accepting the award

main headline

Encryption Solution of the Year

WINNER: Egress Software Technologies - Egress Switch
Tony Pepper and Daniel Hoy accepted the trophy on behalf of Egress

main headline

DLP Solution of the Year

WINNER: CoSoSys - Endpoint Protector 4
Roman Foeckl and Carmen Oprita were presented with the trophy on behalf of CoSoSys

main headline

Welcome to the January 2015 Newsletter.

This is the time of year when all of the predictions for the 12 months ahead come pouring out of the cupboard. At Computing Security, I've seen a plethora of future-gazing commentary. Discarding the more 'out there' forecasts, here is a taster of what may (or may not) be heading your way in the months to come.

There will be more emphasis on serving the needs of the mobile user this year, which will be the year of the enterprise mobile applications. 2015 will also see the beginning of the downward spiral of the public cloud hype cycle, based on the security breaches that have occurred recently. And, of course, there is the latest biggie, 'Wearable Technology'. The word is that wearables will find their first footing in the enterprise, which will alter the way companies look at BYOD device policies and solutions.

For more comprehensive coverage of what may be heading your way, you will need to see the next issue of the magazine. If you haven't signed up yet, you can do so at the end of this column.

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

Follow us :

 

 

 

To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622