If you cannot view this email please click here

BYOD

Passwords

Hacking Cloud Compliance Reviews

COMPUTING SECURITY AWARDS




COMPUTING SECURITY AWARDS

The results from the 2015 Computing Security Awards were revealed at a ceremony in London in October. Former England Cricket Captain Chris Cowdrey was Master of Ceremonies for the evening. Comedian Josh Daniels and Event Manager Dave Bonner assisted Chris by presenting the trophies.
Here are the first of our winners.

Anti Spam Solution of the Year

WINNER: Libra ESVA wins for the second consecutive year
RUNNER-UP: Cloudmark - Cloudmark Server Edition

main headline

Anti Malware Solution of the Year

WINNER: ThreatTrack – VIPRE. VIPRE is the small-footprint anti-malware solution RUNNER-UP: Palo Alto Networks – Wildfire

main headline

Content Security Solution of the Year

WINNER: FuseMail provides a comprehensive suite of cloud-based email security solutions RUNNER-UP: GFI Software - GFI WebMonitor

All of the 2015 Awards results can be seen by going to:

www.computingsecurityawards.co.uk

Please note: the winning products and services will not necessarily be the only solutions or the newest solutions available from the respective suppliers. You should contact these suppliers directly to learn more about what they can offer.


main headline

Features


The Smoking Gun

Encryption is vital for protecting precious data. But, in the wrong hands, it can be a dangerous weapon

main headline

Sane strategies in risk-infested waters

What steps does any business have to take to get governance, risk and compliance right?

main headline

Northamber out to shake up security market

With a newly launched solutions division and two security vendors just signed up, distributor Northamber is aiming to drive growth to new heights

main headline

Opinions


Frictionless Security

'Adam Boone, chief marketing officer at Certes Networks, sets out three principles for protecting applications in the modern enterprise

main headline

Macro Malware: An Unexpected Return

The re-emergence of macro malware after a decade in the doldrums does not augur well, warns CYREN

main headline

The Changing Compliance Landscape: Going Circular

Anand Narasimhan, director UK, EU & NI, Sims Recycling Solutions, explains the ‘Circular Economy’ and what it mean for your organisation

main headline

Time to move IT security management in-house?

Should you take the outsourced support or in-house route for IT security solutions? Simon Jackson, commercial director, VCW Security, looks at the arguments

main headline

Masterclass


Understanding the differences between antivirus and anti-malware

Seeking the best way to reducing your attack surface? Internet security company Malwarebytes offers its expert insights

main headline

Protecting applications from Firewall failure

How to protect applications, in the context of changing network access and a porous perimeter - Certes Networks provides the strategy

main headline

Product Reviews


The CryptoFlow App from Certes Networks

Certes' enterprise products are deployed globally and, it states proudly, have not once been hacked in 15 years of service

main headline

Lepide Auditor Suite 15.2

Change auditing is essential for enterprises, helping them to comply with ever tougher data protection regulation

main headline

Thycotic Secret Server

Privileged account credentials are the number one target for today's cyber criminals

main headline

Titania PAWS Studio 2.4.4

SMBs that want to show compliance with data protection regulations will like Titania's PAWS Studio a lot

main headline

News


Maladjusted to Malvertising

Malvertising – infecting a PC through an advertisement on a website – is becoming a growing threat

GOVSEC event is a winner

Government IT Security & Risk Management conference is a winner


Cybercrime emerges as Enemy No.1

Cybercrime is now the single largest type of offence in the UK

Lancaster University seals strategic research partnership

Lancaster University has agreed a strategic research partnership with Nettitude

main headline

First UK cyber academy graduates head toward recruitment

Prospective employers meet first 30 students of UK Cyber Academy

main headline


White papers


How to avoid a tangled Web

Web 2.0 aids enterprises in conducting business, but also introduces many damaging risks. Trend Micro offers its insights into Web application vulnerabilities and how to avoid these

Meeting European Data Protection and Security Requirements with CipherCloud Solutions

This white paper investigates how encryption and tokenisation of data can help companies that are subject both to EU data protection and general security laws to adopt cloud-based solutions and remain in legal compliance

Welcome to the November 2015 Newsletter.
Readers will no doubt have seen how the European Court of Justice struck down the Safe Harbor agreement that many companies have been relying on to allow data transfers between the US and Europe. This decision could have serious repercussions for any country doing cross-Atlantic business.

It’s an action that has caused some anxiety in the industry and provoked this reaction from Rimon Law's John Isaza, an internationally recognised attorney in the emerging legal fields of information governance, and records and information management (RIM). “The Safe Harbor agreement was designed to allow companies to move personally identifiable digital information such as people’s web search histories and social media updates between the European Union and the United States,” he points out.

“Many companies had been relying on this international agreement to allow data transfer between the US and Europe. Quite candidly, very few had actually gone through the Safe Harbor certification process under the agreement. In any event, companies need to ensure that the data remains in servers within at least one of the 28 EU countries, to the extent possible. Companies that rely on the transfer of data to function, such as Google and Facebook, are in legal limbo.”

Adds David Evans, director of policy at BCS, The Chartered Institute for IT: “In order to support a sustainable digital society, putting individuals back into control of their data, so they have real choices and those choices are respected, is absolutely vital. So this ruling is one of many reasons we need to re-imagine how personal data is managed.”


To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

Follow us :

 

 

 

To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622