If you cannot view this email please click here

BYOD

Passwords

Hacking Cloud Compliance Reviews

banner advert

Features


The year ahead – what lies in wait

2015 may be even more daunting than last year. Here’s what you can look forward to – or not! – according to the experts

main headline

The firewall: what has changed over time?

Ashish Patel of McAfee, part of Intel Security, looks back at 25 years of firewall development

main headline

Time for friendly enforcement!

With more and more mobile applications flooding the market, mobile monitoring and device management have never been so vital

main headline

FTP issues and how to avoid them

Network analyst Patrick Clark offers his expert views on File Transfer Protocol

main headline

Destroying the ROI of Cybercrime

Advanced Web Security can help in the fight against cybercrime, states Chris Taylor, global marketing, Cyren

main headline

banner advert

Product Review

8MAN: from protected-networks.com

Active Directory auditing can be a huge challenge when it comes to compliancy. 8MAN simplifies the processes involved immensely

main headline

News

Combatting the insider threat

Insider abuse is a growing problem, where perpetrators with legitimate access to sensitive data are removing it

Don’t get left on the shelf!

New data has been released about the 'shelfware' problem that plagues businesses

'Selfies' that aim to catch out device thieves

A ‘selfie’ with a difference: to track down stolen devices

main headline

New malware unlocks corporate defences for hackers

New malware is allowing hackers to authenticate as any corporate user

Cyber crime soars up the risk barometer

Cyber and political hazards are the big movers in a risk barometer just released

main headline

BAE Systems' silver lining

BAE has acquired cyber service provider Perimeter Internetworking, trading as Silver Sky

What keeps digital leaders awake at night?

Security, loss of data and cloud security all keep digital leaders awake at night, says BCS

main headline

Book Review

Negotiating the more slippery slopes

With security breaches topping £1.15m for many larger organisations, the role of the security architect has become critical

main headline

White papers

Password Protected: A Survey On Two-Factor Authentication

The background to eliminating insecure passwords

Cloud-Based Services: Easing The I.T Burden While Taking Control

The potential benefits of employing cloud-based services, either in place of existing IT resources or alongside them, are undoubtedly significant, as this white paper from GFI Cloud makes clear.

Inside the criminal mind

Infoblox has launched a whitepaper that takes a sideways look at DNS security from the perspective of a cybercriminal

COMPUTING SECURITY AWARDS 2014

COMPUTING SECURITY AWARDS 2014

As we start to look forward to the awards for 2015, an event that is already shaping up to be a very hard-fought contest, here are some more winners from 2014:

Mobile Security Solution of the Year - Security 2014

WINNER: Palo Alto Networks - GP 100
Steve Gerrard and Alex Raistrick accepted the trophy

main headline

Cloud Security Solution of the Year - 2014

WINNER: Assuria - Assuria Log Manager MSP
Terry Pudwell and David Woodcock stepped up to receive the honours

main headline

Messaging Security Solution of the Year 2014

WINNER: WINNER: Voltage Security - SecureMail
Karen Sweetman accepted the award for Voltage Security

main headline

Welcome to the February 2015 Newsletter.

In the government's cyber security strategy, 'Protecting and promoting the UK in a digital world', there is a much emphasis on how increasing our reliance on cyberspace brings new opportunities, but also new threats. And it's true that, while cyberspace fosters open markets and open societies, this in itself can also make us more vulnerable to those who want to harm us by compromising or damaging our critical data and systems.

As the report points out: "The networks on which we now rely for our daily lives transcend organisational and national boundaries. Events in cyberspace can happen at immense speed, outstripping traditional responses (for example, the exploitation of cyberspace can mean crimes such as fraud can be committed remotely, and on an industrial scale).

"Although we have ways of managing risks in cyberspace, they do not match this complex and dynamic environment. So we need a new and transformative programme to improve our game domestically, as well as continuing to work with other countries on an international response."

No one could argue with any of these sentiments. However, we all need to do more to secure our safety of ourselves. It is not enough to rely on government to protect us, no matter how sound the strategy or convincing the arguments. All enterprises need to measure their own vulnerability as the threats continue to escalate, making available the budget required to put the right level of protection in place. Cyber damage should not be looked at retroactively. By then, it may well be too late to regret the lack of upfront investment that might have protected you.

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

Follow us :

 

 

 

To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622