2015 eNewsletters |
October - Featuring |
Editor's Comment:I see that the Information Commissioners Office has received a record number of complaints from individuals concerned that their... |
COMPUTING SECURITY AWARDS
Thanks to everyone who voted and attended the Computing Security Awards on the 8th October.... |
Click here for the full contents.. |
September - Featuring |
Editor's Comment:It was extremely worrying to see PandaLabs – Panda Security’s malware research laboratory –confirm a record increase in the creation of new malware... |
COMPUTING SECURITY AWARDS
Just a reminder that you have until 30th September to cast your votes. The awards will be presented.... |
Click here for the full contents.. |
August - Featuring |
Editor's Comment:It’s good to see that a new careers hub has been set up to encourage people into the cyber security industry – and then keep them there. It’s a welcome... |
How to avoid a tangled Web
Web 2.0 aids enterprises in conducting business, but also introduces many damaging risks.... |
Click here for the full contents.. |
July - Featuring |
Editor's Comment:When do you think your organisation is at its most vulnerable to malware attacks? The chances are it’s a Monday mornings when users reconnect... |
How to avoid a tangled Web
Web 2.0 aids enterprises in conducting business, but also introduces many damaging risks.... |
Click here for the full contents.. |
June - Featuring |
Editor's Comment:Here's a sobering point to reflect on. Check Point has monitored and analysed hundreds of millions of security events from over 17,000 organisations... |
EOL - Getting it right!
Ensuring end-of-life sensitive data and IP are properly erased is crucial. But how? |
Click here for the full contents.. |
April - Featuring |
Editor's Comment:Recent high-profile hacking attacks and data breaches, such as those affecting Sony, Netflix, health insurer Anthem and parking ticket website PaymyPCN.net have served to... |
Risk - and Reward
Organisations must adopt a more agile risk-based approach to cyber security, if they are to address new challenges |
Click here for the full contents.. |
March - Featuring |
Editor's Comment:Recent high-profile hacking attacks and data breaches, such as those affecting Sony, Netflix, health insurer Anthem and parking ticket website PaymyPCN.net, have served to increase... |
Finger on the security pulse
In a bid to outwit the fraudsters, biometrics is beginning to exert an ever greater influence |
Click here for the full contents.. |
February - Featuring |
Editor's Comment:In the government's cyber security strategy, 'Protecting and promoting the UK in a digital world', there is a much emphasis on how increasing our reliance on cyberspace brings new... |
The year ahead – what lies in wait
2015 may be even more daunting than last year. Here’s what you can look forward to – or not! – according to the experts |
Click here for the full contents.. |
January - Featuring |
Editor's Comment:This is the time of year when all of the predictions for the 12 months ahead come pouring out of the cupboard. At Computing Security, I've seen a plethora of future-gazing commentary... |
Enough to make your pulse soar
Imagine this: employers monitoring programmers' pulses, eye movements and even... |
Click here for the full contents.. |
2014 eNewsletters |
December - Featuring |
Editor's Comment:Welcome to the December 2014 issue of the Computing Security Newsletter. One thing you can always be sure of when dealing with emerging technologies is that the stats quoted will almost invariably... |
Taking the next step up
The industry needs to move towards a more holistic view of information and systems, argues Dr Anand Narasimhan, director, Sims Lifecycle Services EU
|
Click here for the full contents.. |
November - Featuring |
Editor's Comment:It was interesting to see that Francis Maude, Minister for the Cabinet Office with responsibility for the UK Cyber Security Strategy, co-hosted a summit... |
Anti-Virus, the Cloudmark way
How do you defend against malware that is undetectable once it reaches your computer? Andrew Conway, lead software engineer at Cloudmark, offers some answers
|
Click here for the full contents.. |
October - Featuring |
Editor's Comment:Even if you had been living in the depths of some dense jungle (are there any left?) or on an Arctic icecap (ditto)... |
CS Awards 2014
All the winners of the 2014 Computing Security Awards were revealed at an awards ceremony on 9 October to cap another great evening of celebration...
|
Click here for the full contents.. |
September - Featuring |
Editor's Comment:The global business and IT landscape has changed greatly over the last year, with a growing number of cybersecurity incidents and large-scale data... |
Are you being properly served?
Technical vulnerabilities in their businesses - eg, cyber security, data integrity and mobile devices - are causing SMES ever deeper concerns
|
Click here for the full contents.. |
August - Featuring |
Editor's Comment:Despite commitments to bolster the country’s critical infrastructure, continued public spending cuts have reduced the funds available for the government... |
Business Risk Fears Leap
Technical vulnerabilities in their businesses - eg, cyber security, data integrity and mobile devices – are causing SMES ever deeper concerns
|
Click here for the full contents.. |
July - Featuring |
Editor's Comment:What is being hailed as the world’s first 100% secure method of sharing data (using quantum mechanics) has been successfully demonstrated for the first time. |
Grave New World
Following the Waking Shark II security scenario at the end of last year, which involved financial firms being hit with a series of cyber attacks in order to test their defences....
|
Click here for the full contents.. |
June - Featuring |
Editor's Comment:It was encouraging to see how the UK’s National Crime Agency has joined forces with other agencies such as the FBI in the US to deliver a nationwide alert, urging organisations and individuals to protect themselves against powerful malicious software... |
Taking Biometric security to the next level
The TABULA RASA consortium is working to develop countermeasures that will see a powerful new breed of safer biometric systems |
Click here for the full contents.. |
May - Featuring |
Editor's Comment:It comes hard on the heels of the annual gathering of all things, and all people, that are security focused: namely the InfoSec 2014 show in London..... |
Powering down
Many power companies are now being refused insurance cover for cyber-attacks, because their defences are perceived as too weak
|
Click here for the full contents.. |
April - Featuring |
Editor's Comment:A vulnerability in a popular implementation of the Secure Socket Layer (SSL) technology, used to secure internet transactions, has been revealed that has sent the media and industry experts into something of a frenzy, dubbing it 'Heartbleed'.... |
Security Directive Could Cost Organisations Billion
UK businesses could be hit hard in the pocket by a new EU Cyber Security Directive
|
Click here for the full contents.. |
March - Featuring |
Editor's Comment: Everywhere you turn, it seems that another malicious attack is taking place. A particularly intriguing one of late - though not if you've been hit by it, of course! - is Kaspersky Lab's discovery of 'The Mask' (aka Careto)... |
Why the Pen can be mightier than the sword
Penetration ('pen') testing is the practice of attacking your systems and network to seek out any vulnerabilities that others might try to exploit. It could save you and your customers from the hackers and attackers out there... |
Click here for the full contents.. |
February - Featuring |
Editor's Comment: Of course, security threats abound and persist everywhere - we all need to be on our guard constantly. And there is nothing like a major sporting event to get everyone up on their toes: nervous, but hopefully also fully alert to what might happen... |
Erasing the data on Solid State Drives...
Thanks to Solid State Drives (SSD), the wider world has now become our office. But there are many thorny issues regarding the retirement of these assets.. |
Click here for the full contents.. |
January - Featuring |
Editor's Comment: Welcome to the first Newsletter of 2014 - and a happy new year to everyone! I hope you have a successful - and safe - year to come.... |
At your own risk…
Keeping business systems safe and protecting your data has never been more difficult to achieve. And it is only likely to become harder. Getting the right risk management strategy in place is critical... |
Click here for the full contents.. |
|
2013 eNewsletters |
December - Featuring |
Editor's Comment: It was what many people working in London’s financial and banking sectors feared might happen one day: a brutal and sustained attack on their businesses that would leave them in tatters. But these would not be... |
The Internet's Light And Dark Sides
While the internet can be a positive force for good, it is also a haven for the very bad - and it doesn't get much worse than cybercrime. What is being done to protect UK businesses? Are the cybercriminals getting the upper-hand in a one-way battle? Brian Wall finds out... |
Click here for the full contents.. |
November - Featuring |
Editor's Comment: Welcome to the November edition of the Computing Security Newsletter. And let me say straight away what a great night of celebrations it was at the recent 2013 Computing Security Awards, as people from right across... |
BYOD - How to make it your friend
BYOD - bring your own device - is enjoying enormous growth and that is likely only to accelerate. However, opinion is still divided as to whether it is a force for good or bad. Brian Wall reports... |
Click here for the full contents.. |
October - Featuring |
Editor's Comment: Welcome to the October edition of the Computing Security Newsletter. No matter how high the defences we stack up against them, the more the cybercriminals come back to carry out another frenzied assault... |
Malware and Malpractices
Despite the potential threats, as many as 25% of all PCs remain unprotected. Why is there such a poor attitude to security in some quarters? Computing Security finds out... |
Click here for the full contents.. |
August - Featuring |
Editor's Comment: Welcome to the August edition of the Computing Security Newsletter. The threat the UK is facing from cyber attacks is disturbing in its scale and complexity. The Intelligence and Security Committee (ISC) of... |
Winners all the Way!
The Computing Security Awards are now a 'must attend' date in the calendars of more and more businesses. 2013 is certain to be as hotly contested as ever before... |
Click here for the full contents.. |
July - Featuring |
Editor's Comment: Welcome to the July edition of the Computing Security Newsletter. Here, you will find all the latest news, views and happenings relating to security - and the major issues that businesses are having to engage... |
Security with App-titude
Apps are everywhere, it would appear, and spreading like wildfire. What are the security implications? and just how do you keep pace?... |
Click here for the full contents.. |
March - Featuring |
Editor's Comment: Hello… and Welcome to the March edition of the Computing Security Newsletter. Here, you will find all the latest news,views and happenings relating to security - and the major issues that businesses are having to engage... |
2013 - Where will it take us?
What are likely to be the major challenges that organisations are faced with in the year ahead? Computing Security quizzes those in the know... |
Click here for the full contents.. |