If you cannot view this email please click here

BYOD

Passwords

Hacking Cloud Compliance Reviews


News


Stepping inside the cyber criminal's mind

Cyber Security Challenge UK recently teamed up with Protection Group International (PGI) to create the ultimate insight into a cyber criminal's mind

main headline

University data breach prompts call to action

After the data breach of individual student records at the University of Greenwich, how can institutions protect their sensitive information?


main headline

Strategic cyber threat alliance

ForeScout Technologies and FireEye have formed a strategic partnership aimed at closing the gap between detecting and responding to a cyber threat

Single DDoS attack peaks at 60gps

The announcement that a DDoS attack was clocked at over 500Gbps recently has prompted a swift response

Intercede solution has the Intel

Intercede’s new security software will be deployed alongside Intel's identity protection technology Intel Authenticate

main headline

£572,000 grant boosts security research

Alert Logic has received a grant in support of its Security Research and Technology Development centre in Belfast

main headline


Features


Blood on HR's floor

Javvad Malik, security advocate, AlienVault, offers his thoughts on why retaining IT security skills is such a challenge

main headline

Land of opportunity - and potential catastrophe

The massive benefits of IoT in a hyper-connected society must be set against the risks posed each day by cyberattacks

main headline

Marriage made for the enterprise

A new report suggests business applications will be the real drivers for augmented reality and wearable technology

main headline

Gateway to safety

Can Identity and Access Management offer all the applications that enterprise IT really needs?



main headline

It's Showtime!

IP EXPO Manchester, taking place 18-19 May at Manchester Central, is part of Europe’s number one enterprise IT event series, including IP EXPO Europe in London and IP EXPO Nordic in Sweden

main headline

Case Study


Sports car company accelerates production

Briggs Automotive Company’s security investment is protecting its IP and improving productivity

main headline



Product Review


Malwarebytes Breach Remediation

Malwarebytes now has a powerful new hunter-killer class weapon that provides drastically improved response times and immediate remediation across thousands of endpoints

main headline


COMPUTING SECURITY AWARDS


COMPUTING SECURITY AWARDS 2015

More of our winners from the 2015 Computing Security Awards:

Network Access Control Solution of the Year

WINNER: macmon - macmon NAC
RUNNER UP: Protected Networks - 8MAN

main headline

Cloud Security Solution of the Year

WINNER: Egress - Egress Switch
RUNNER UP: Assuria - Assuria Log Manager

main headline

Messaging Security Solution of the Year

WINNER: GFI Software - GFI MailEssentials
RUNNER UP: FuseMail - SecureSMART

All of the 2015 Awards results can be seen by going to:

www.computingsecurityawards.co.uk

Please note: the winning products and services will not necessarily be the only solutions or the newest solutions available from the respective suppliers. You should contact these suppliers directly to learn more about what they can offer.

main headline


White papers


How to avoid a tangled Web

Web 2.0 aids enterprises in conducting business, but also introduces many damaging risks. Trend Micro offers its insights into Web application vulnerabilities and how to avoid these

Meeting European Data Protection and Security Requirements with CipherCloud Solutions

This white paper investigates how encryption and tokenisation of data can help companies that are subject both to EU data protection and general security laws to adopt cloud-based solutions and remain in legal compliance

Welcome to the April 2016 issue of the Computing Security Newsletter

You may well recall how, just a short while back, Google released patches that set out to tackle the latest collection of Android security blunders, ten of which have been classed as high priority. But even these last-ditch attempts to ensure the security of users’ devices fell short of the vulnerabilities they are faced with. So the response was to beat something of a retreat and make those patches only apply to Nexus devices in the short term.

All a bit messy and prompted some timely cautions around the industry. One such came from Tom Lysemose Hansen, founder and CTO at Norwegian app security firm Promon, who warned that developers should protect each app individually, rather than only relying on the unstable protection offered by Android. Hansen commented on the contradiction of attempting to establish perennial security, while leaning on the crutch of regular patching:

“App security shouldn’t be a game of one-upmanship with reams of customer data sacrificed at each turn,” he said. “As well as securing against the most recent flare-up of malware, developers must also account for future threats. Although hackers’ techniques have become increasingly sophisticated, their success comes down to their use of a variety of approaches: they need only succeed once.”

Patching can be effective, but in the wake of a successful attack on a device, it’s like shutting the gate after the horse has bolted,” Hansen added. “That the user is still made to rely on inconsistently released patches is absurd. Instead, app developers must pick up the slack left by the inadequate security offered by Android’s OS and ensure multiple layers of defence, so users are not made to bear the brunt of future malware.”

The general message coming across is that users can’t simply rely on patching and, until this issue is properly dealt with, developers must take urgent steps to introduce security at the level of the application. Commonsense? Yes. Widespread practice? If only!

How soon biometrics might become mainstream across all business sectors is now the big question, especially as cyber attacks continue to hit unprecedented levels.

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

Follow us :

 

 

 

To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622