If you cannot view this email please click here



Hacking Cloud Compliance Reviews


The Computing Security Awards celebrate all that is best in our industry. At our latest gala event on 12 October, the top talent to capture the honours in their specific categories for 2017 were named and feted. Year after year, the awards show what a wealth of flair and expertise exists right across our industry – something that is serving to keep businesses safe from the relentless attacks being perpetrated at every turn.

The full list of our 2017 awards winners can be seen by going to: www.computingsecurityawards.co.uk


Fear and loathing in cyber-space: the summer of ransomware

Infecting computers and holding businesses to ransom has become very big business. Malwarebytes VP, Anthony O’Mara, considers how organisations can fight back

main headline

Machine Learning Applied to Cyber Security

Charlotte Gurney, group marketing manager, Brookcourt Solutions, discusses how cyber security has seen some of the widest-ranging and impacting implementations of machine learning, deep learning, natural language processing, and more

main headline

Behind the scenes at Capita Cyber Security

Significant change is now taking place at Capita Cyber Security. CEO Kevin Gordon explains for Computing Security the major influences that are driving this success

main headline

In the line of fire

A plethora of regulations are soon to hit UK businesses, imposing harsh penalties where there is overt failure to comply. Yet some organisations don’t think the new rules even apply to them. Brian Wall reports

main headline

How easy is it to steal a friend’s identity?

A new BBC TV drama shows how easy it is to steal the identity of someone close to you. Now individuals are being urged to think about where they share their personal information

main headline


Red Sift OnDMARC

Email is the weapon of choice for cyber criminals, with phishing and spoofing attacks increasing exponentially. Red Sift’s OnDMARC aims to streamline the entire process of implementation, reporting and ongoing management to counteract these assaults.

main headline

Malwarebytes Endpoint Protection

Malwarebytes’ next-generation Endpoint Protection (MEP) places seven layers of detection technology on your endpoints. Called ‘multi-vector protection’, it employs a signature-less, rules-based approach, to protect against known and unknown malware.

main headline

Welcome to the October 2017 issue of the Computing Security Newsletter.

The US government is warning that hackers are targeting nuclear, energy and industrial firms. And that doesn’t mean installations and organisations within its own boundaries. These are believed to be prime targets wherever they may be located.

Since May, hackers have been penetrating the computer networks of companies that operate nuclear power stations and other energy facilities, as well as manufacturing plants in the United States and other countries, according to a report in The New York Times.

Among the companies targeted was the Wolf Creek Nuclear Operating Corporation, which runs a nuclear power plant near Burlington, Kansas. The attack was revealed via security consultants and an urgent joint report issued by the Department of Homeland Security and the Federal Bureau of Investigation.

The origins of the hackers are not known. But the report indicated that an “advanced persistent threat” actor was responsible, which is the language security specialists often use to describe hackers backed by governments.

Those familiar with the investigation say that, while it is still in its early stages, the hackers’ techniques mimicked those of the organisation known to cybersecurity specialists as ‘Energetic Bear’, the Russian hacking group that researchers have tied to attacks on the energy sector since at least 2012.

These are worrying trends. The likelihood of a highly sensitive and vulnerable facility such as a nuclear installation being hacked and brought down is ever increasing, as the hackers become increasingly capable of such an infiltration. Governments are loath to discuss or acknowledge such an eventuality in public, but most of us in the industry, aware enough to recognise the portents, are holding our collective breathes against such a moment.

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

Follow us :




To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622