
|
Features
|
Inside the criminal mind
Infoblox has launched a whitepaper that takes a sideways look at DNS security from the perspective of a cybercriminal
|
COMPUTING SECURITY AWARDS 2014 |
|
COMPUTING SECURITY AWARDS 2014
As we start to look forward to the awards for 2015, an event that is already shaping up to be a very hard-fought contest, here are some more winners from 2014:
|
|
|
|
Welcome to the February 2015 Newsletter.
In the government's cyber security strategy, 'Protecting and promoting the UK in a digital world', there is a much emphasis on how increasing our reliance on cyberspace brings new opportunities, but also new threats. And it's true that, while cyberspace fosters open markets and open societies, this in itself can also make us more vulnerable to those who want to harm us by compromising or damaging our critical data and systems.
As the report points out: "The networks on which we now rely for our daily lives transcend organisational and national boundaries. Events in cyberspace can happen at immense speed, outstripping traditional responses (for example, the exploitation of cyberspace can mean crimes such as fraud can be committed remotely, and on an industrial scale).
"Although we have ways of managing risks in cyberspace, they do not match this complex and dynamic environment. So we need a new and transformative programme to improve our game domestically, as well as continuing to work with other countries on an international response."
No one could argue with any of these sentiments. However, we all need to do more to secure our safety of ourselves. It is not enough to rely on government to protect us, no matter how sound the strategy or convincing the arguments. All enterprises need to measure their own vulnerability as the threats continue to escalate, making available the budget required to put the right level of protection in place. Cyber damage should not be looked at retroactively. By then, it may well be too late to regret the lack of upfront investment that might have protected you.
To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.
Brian Wall, Editor
Computing Security
Follow us :
|
|