How to avoid a tangled Web
Web 2.0 aids enterprises in conducting business, but also introduces many damaging risks. Trend Micro offers its insights into Web application vulnerabilities and how to avoid these
|
|

COMPUTING SECURITY AWARDS
|
|
COMPUTING SECURITY AWARDS
Nominations are now open for the 2015 Computing Security Awards. Some new categories have been introduced to reflect areas of security that are growing in importance. So this is your chance to name the companies, the products and the individual that you have been most impressed with over the past 12 months.
Nominations close on 5 August, so please ensure you submit your choices as soon as possible. www.computingsecurityawards.co.uk
|

|
Features
|
Human exploitation
Recent high-profile hacks indicate a key factor behind such attacks – human frailty |
 |
Hand-to-hand combat
How concerned should businesses in the UK be about cyber assaults – are the attackers outrunning them? |
 |
Success at InfoSec
Computing Security was at the Olympia show in London, watching all the action as it unfolded |
 |

Opinions
|
Tipping the balance!
How do you best manage the upwardly mobile workforce? Patrick Warley, Integral Memory, offers his 7 TOP tips
|
 |

Product Reviews
|
|
macmon NAC
macmon NAC’s agentless architecture means it can be installed and protecting your network within 24 hours
|
 |
Titania TEC
Titania has a sharp focus on data security compliance and its latest TEC aims to make regulatory auditing on all network devices a breeze
|
 |
Integral Memory Crypto SSD
During testing, we found Integral Memory’s Crypto SSD extremely easy to use and capable of providing a completely transparent encryption/decryption process
|
 |
Libraesva secures major client
The Institute of Marine Engineering, Science & Technology was looking for a new anti-spam solution that reduced resource overhead committed to their existing solution. The trail led to Libraesva
|
|
|
|
|
Welcome to the July 2015 Newsletter.
When do you think your organisation is at its most vulnerable to malware attacks? The chances are it’s a Monday mornings when users reconnect their devices to the corporate network. That’s the point at which there is a massive increase in malware detections, according to new research contained in the NTT 2015 Global Threat Intelligence Report.
This trend supports the contention that the security perimeter in organisations is dissolving, the report contends: "This is because end users increasingly use their devices both inside and outside the corporate security perimeter. In fact, the user is today's new organisation perimeter. What's more, IT and security management can no longer count on well-defined network security perimeters to protect their organisations."
The Global Threat Intelligence Report contains analysis of over six billion security events worldwide gathered during 2014 by NTT Group companies including Dimension Data, Solutionary, NTT Com Security, NTT R&D, and NTT Innovation Institute (NTTi3). Matthew Gyde, Dimension Data’s group executive – security, says threats targeting end users are higher than ever, while security vulnerabilities are mostly related to end-user systems and not servers.
“It appears that successful exploits occurs over the weekend when end users – and their devices – are outside the security controls of the corporate network. This indicates that traditional security controls are effective at protecting the corporate network. However, assets that transition between corporate and external access points are at greater risk,” Gyde says.
He points out that seven of the top 10 vulnerabilities identified were on end-user systems. “End users become a liability and that’s because their devices often have many unpatched vulnerabilities.” Controls that address this trend must focus on the user and their devices, regardless of location.
To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.
Brian Wall, Editor
Computing Security
Follow us :
|
|