If you cannot view this email please click here



Hacking Cloud Compliance Reviews

Computing Security Awards 2018 - meet the winners!

A gala night in London saw this year's Computing Security Awards winners duly honoured for their outstanding performances across the past 12 months. To see who won what, go to: http://computingsecurityawards.co.uk/

Editor's Focus

Good news, bad news

Identity fraud has fallen for the first time in four years - which is a real positive. At the same time, there is an acute shortage of cyber security skills in-house to deal with threats against the business

main headline


You can’t prevent what you can’t see

Charlotte Gurney, Marketing Manager, Brookcourt Solutions, and Marvin Josif, from CIX Software, look at the criticality of full visibility when facing advanced persistent threats

main headline


Building a solid foundation for security in the Cloud

Dealing with cloud environments all comes down to understanding, assessing and balancing risk, as Javvad Malik, security advocate, AlienVault, explains

main headline

Education - and phishing

A cyber-attack is calculated to cost an organisation around $395 per employee, per attack, according to new research. And yet, while the primary defence is technology, 95% of all such attacks are the result of human error

main headline

United and threatened

The Internet of Things (IoT) turns information into actions that create new capabilities, richer experiences and real economic opportunity. But you also need to be beware of the ‘dark side’. The risk of a potential breach is never that far away

main headline

Fine-tuning the cloud

Will Secure Access Orchestration solutions that holistically manage the overall multi-cloud environment overcome fears around security issues?

main headline

What is the (end)point?

Many organisations can’t even agree on what an endpoint is, suggesting there is a serious disconnect in what has now become the age of the Industrial Internet of Things (IIoT)

main headline

When hype and hope collide

Many organisations can’t even agree on what an endpoint is, suggesting there is a serious disconnect in what has now become the age of the Industrial Internet of Things (IIoT)

main headline

Product Review

AlienVault USM Anywhere

Organisations that want their threat detection, incident response, and compliance management centralised in one place need look no further than AlienVault

main headline

Vectra Cognito

Traditional intrusion detection and prevention systems (IDPS) are struggling to cope, as cyber-criminals become ever more imaginative

main headline

Case Study

Secure and smart choice for TMX Recruit

TXM Recruit has been a FuseMail customer for many years. We took a few minutes to catch up with TXM’s Global IT Strategic Manager Brian Cook

Welcome to the November 2018 issue of the Computing Security Newsletter.

Responsibility for information security is not falling to any one senior executive function, according to the 2018Risk:Value report from NTT Security, which surveyed 1,800 senior decision makers from non-IT functions in global organisations.

At a global level, 22% of respondents believe the CIO is ‘ultimately responsible’ for managing security, compared to one in five (20%) for the CEO and 19% for the CISO. In the UK, fewer respondents point to the CIO (19 %) and CISO (18%) while the CEO gets the biggest vote at 21%. The US (27%) and Norway (26%) buck the trend, with more than a quarter of respondents suggesting the CEO is responsible, while in Singapore one third say it is the role of the CISO – the highest figure across all 12 countries. Interestingly, around one in 10 people in Switzerland believe the CFO is responsible for security.

“Responsibility for day-to-day security doesn’t seem to fall on any one particular person’s shoulders among our response base,” says Azeem Aleem, VP Consulting & UK&I Lead, NTT Security. “This narrow gap between the roles of CIO, CEO and CISO shows that no one executive function is stepping up to the plate. It could be a sign of unclear separation between the CIO and CISO though, as often they are the same or collaborate closely.

"On the other hand, should we be concerned that the CEO is not more involved in security matters, given the potentially damaging affects to the business,” he adds, “or should we be relieved that they are not managing a specialist task like this, over and above other critical corporate responsibilities.”

As Aleem quite rightly wonders, however, the burning question is: Where do you draw the line?

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

Follow us :




To unsubscribe click here See our Privacy Policy here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622