If you cannot view this email please click here

BYOD

Passwords

Hacking Cloud Compliance Reviews

White papers


How to avoid a tangled Web

Web 2.0 aids enterprises in conducting business, but also introduces many damaging risks. Trend Micro offers its insights into Web application vulnerabilities and how to avoid these

Meeting European Data Protection and Security Requirements with CipherCloud Solutions

This white paper investigates how encryption and tokenisation of data can help companies that are subject both to EU data protection and general security laws to adopt cloud-based solutions and remain in legal compliance

banner advert

COMPUTING SECURITY AWARDS


COMPUTING SECURITY AWARDS

Nominations are now open for the 2015 Computing Security Awards. Some new categories have been introduced to reflect areas of security that are growing in importance. So this is your chance to name the companies, the products and the individual that you have been most impressed with over the past 12 months.

Nominations close on 5 August, so please ensure you submit your choices as soon as possible.
www.computingsecurityawards.co.uk


banner advert

Features


Human exploitation

Recent high-profile hacks indicate a key factor behind such attacks – human frailty

main headline

Hand-to-hand combat

How concerned should businesses in the UK be about cyber assaults – are the attackers outrunning them?

main headline

Success at InfoSec

Computing Security was at the Olympia show in London, watching all the action as it unfolded

main headline
banner advert

Opinions


Tipping the balance!

How do you best manage the upwardly mobile workforce? Patrick Warley, Integral Memory, offers his 7 TOP tips

main headline

Promoting a culture of security awareness

Dr Anand Narasimhan, Sims Recycling Solutions, on why instilling attentiveness around security is so critical

main headline

News


Advanced integration with cloud storage apps

CoSoSys has taken its Endpoint Protector to a more advanced level

main headline

Ethical hacking under scrutiny

Call for increased standardisation of 'penetration testing' techniques


Data at the mercy of hackers

46% of organisations that suffered a data breach took months to detect a problem, a LogRhythm survey found

main headline

Symantec senior appointment

Symantec has reinforced its push for growth by appointing industry veteran Keith Bird

main headline
banner advert

Product Reviews


macmon NAC

macmon NAC’s agentless architecture means it can be installed and protecting your network within 24 hours

main headline

Titania TEC

Titania has a sharp focus on data security compliance and its latest TEC aims to make regulatory auditing on all network devices a breeze

main headline

Integral Memory Crypto SSD

During testing, we found Integral Memory’s Crypto SSD extremely easy to use and capable of providing a completely transparent encryption/decryption process

main headline

Case Study


Libraesva secures major client

The Institute of Marine Engineering, Science & Technology was looking for a new anti-spam solution that reduced resource overhead committed to their existing solution. The trail led to Libraesva

Welcome to the July 2015 Newsletter.
When do you think your organisation is at its most vulnerable to malware attacks? The chances are it’s a Monday mornings when users reconnect their devices to the corporate network. That’s the point at which there is a massive increase in malware detections, according to new research contained in the NTT 2015 Global Threat Intelligence Report.

This trend supports the contention that the security perimeter in organisations is dissolving, the report contends: "This is because end users increasingly use their devices both inside and outside the corporate security perimeter. In fact, the user is today's new organisation perimeter. What's more, IT and security management can no longer count on well-defined network security perimeters to protect their organisations."

The Global Threat Intelligence Report contains analysis of over six billion security events worldwide gathered during 2014 by NTT Group companies including Dimension Data, Solutionary, NTT Com Security, NTT R&D, and NTT Innovation Institute (NTTi3). Matthew Gyde, Dimension Data’s group executive – security, says threats targeting end users are higher than ever, while security vulnerabilities are mostly related to end-user systems and not servers.

“It appears that successful exploits occurs over the weekend when end users – and their devices – are outside the security controls of the corporate network. This indicates that traditional security controls are effective at protecting the corporate network. However, assets that transition between corporate and external access points are at greater risk,” Gyde says.

He points out that seven of the top 10 vulnerabilities identified were on end-user systems. “End users become a liability and that’s because their devices often have many unpatched vulnerabilities.” Controls that address this trend must focus on the user and their devices, regardless of location.

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

Follow us :

 

 

 

To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622