Concerned about GDPR compliance? VTL could be part of the solution
One area that could be easily forgotten is your backup solution. If your business holds any personal data of EU..
Concerned about GDPR compliance? VTL could be part of the solutionOne area that could be easily forgotten is your backup solution. If your business holds any personal data of EU.. CheckmateApplication development has surged forward by leaps and bounds since the punch card era of the 1970s. Yet those.. Mighty storm unleashedCheck Point researchers have discovered a new botnet, dubbed 'IoTroop', evolving and recruiting IoT devices at a far greater pace.. China CrackdownChina has become a great enticement for UK organisations, including the security industry, with lucrative business contracts to be.. Back to BasicsIf we look back over the high-profile cybercrimes of the past few years, there is a clear trend, suggests Brian.. Uniting forces to tackle cyber riskThey say it all happens in Silicon Valley, hailed by many as the 'new Hollywood'. Now Allianz Global Corporate.. Leading the fightback through the power of I0TOrganisations face some critical decisions as they seek to push ahead with their IoT projects, according to the recently released.. Unclouded thinkingIt's a given that a well-established cloud computing vendor will ensure they have the latest sophisticated security systems in place.. The clock is ticking…Any business that stores data on EU citizens will become subject to the new European General Data Protection Regulations (GDPR),.. Threat detection - and responseA cloud-based service has been launched to give small and midsize businesses, distributed enterprises and managed security service providers (MSSPs).. When will we ever learn?Many would have been forgiven if they reacted to the massive breach at Yahoo last year as beyond comprehension. After.. Battle of witsRegulation will always lag behind both technological innovation and the strategies used by the malicious attacker. It's a response, and.. Prevention: better than any cureCybercriminals use exploits (a special type of malicious program that utilises vulnerabilities in legitimate software) to secretly download malware -.. Beyond the nightmareGovernance, risk and compliance (GRC) has never been more in the news - and people's minds - as the new.. Outgunning the criminal mindA 2013 review titled 'Triage in Live Digital Forensic Analysis' by Bashir and Khan* observed that "professionals responsible for.. Mirror, mirror, on the wallThe message that managed security services providers put out there is that not only do they have the superior.. Titania Paws Studio 3.2.2Very keenly priced, it's capable of auditing all Windows, macOS and Linux systems, and offers an impressive range of highly.. Titania Nipper Studio 2.5Configurations, access rules and security policies need to be audited regularly to identify weaknesses; however, many organisations don't have the.. Malwarebytes Endpoint ProtectionTraditional signature-based scanners aren't enough, as cyberattacks are rapidly evolving to circumvent them, so businesses must adopt a more.. Red Sift OnDMARCThe DMARC (Domain-based Message Authentication, Reporting and Conformance) protocol is now an essential defence mechanism against domain name spoofing.. Acunetix 11Their very survival may depend on it when the EU GDPR (General Data Protection Regulations) come into force in.. The Aegis Secure Key 3z from ApricornThis legislation is very specific concerning loss of personal data and any business falling foul will be punished. All.. CYjAX Intelligence PlatformIn many cases, threat updates and signatures provided by security partners aren't enough and now require a blended approach. .. Ixia ThreatARMORMalware, ransomware, botnets, zero-day attacks - they're all on the up, and overworked support staff trying to cope with.. Phishing mitigation from SpearSecThe variants are unimportant; it is social engineering, the art of psychological manipulation to entice people to render their.. Varonis DatAdvantageThere many more benefits, as it can also help them realise the business value of their data and become.. GhangorCloud Information Security EnforcerData leak prevention is an essential part of the governance, risk and compliance (GRC) equation, but many DLP solutions.. SecurEnvoy SecurAccess 8As a long-term player in this market, SecurEnvoy has pioneered tokenless 2FA authentication, as its SecurAccess solution uses personal.. Malwarebytes Breach RemediationBut, when their defences have been breached, all too many end up in a frantic fire-fight. Another problem is.. Malwarebytes Anti-Exploit for BusinessZero-day attacks are extremely dangerous, but very rare, and the main problem is that companies and users simply don't.. The CryptoFlow App from Certes NetworksIts enterprise products are deployed in over 80 countries and they have not once been hacked in an impressive 15.. Lepide Auditor Suite 15.2There are plenty of solutions to choose from, but Lepide's Auditor Suite stands out, as it combines a superb.. Thycotic Secret ServerThey are the top of the list for compliance and security audits, so businesses must control access to these critical.. Titania PAWS Studio 2.4.4Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and all.. Embrace a digital future!Offering invaluable security insight for both IT managers and security specialists, Cyber Security Europe features seminars and solutions on.. Integral Memory Crypto SSDEven the MoD had to own up recently to having a laptop containing confidential employee and banking information stolen.. macmon NACNAC from German company macmon neatly avoids these pitfalls, as its minimal system requirements and agentless architecture means it.. Titania TECWe've always been impressed with Titania's Nipper Studio and PAWS Studio products, and TEC now brings them both under.. Acunetix Online Vulnerability ScannerAcunetix comes to their rescue, as it now makes its well-respected vulnerability scanner available as an affordable cloud service. .. Libra ESVA 3.5 ReviewAll the main virtualisation platforms are supported, as ESVA is available for VMware, Hyper-V, plus Citrix XenServer,.. Gemalto SafeNet ProtectV 2.0SafeNet ProtectV by Gemalto is an elegant solution to these issues, as it applies complete end-to-end encryption to.. Mission? Detection!According to the NTT Security 2017 Risk Value report, 57% of organisations believe they will definitely suffer an information security.. GDPR: The Silver LiningThe majority of conversations surrounding the imminent arrival of GDPR - General Data Protection Regulation - strike a tone.. Life on the cutting edgeOver the next five years, the top three technologies that are set to move from the fringes to the.. Pragmatism and computing securityMore than 100 ransomware families have been released in 2016, each one giving rise to a large number of variants... Fear and loathing in cyberspace: the summer of ransomwareThe summer of 2017 could well become known as the summer of ransomware. It saw the WannaCry attack take.. The Rise and Rise of RansomwareGrowing up as a kid in the 1980s, 'ransom' used to be a simple thing. In the movies, a bad.. Q&A What challenges do IT professionals face when managing retired assets? The fraud bonanzaThe annual cost of fraud in the UK could be as high as £193bn a year, far higher than.. It's showtime!Infosecurity Europe, from 7-9 June 2016 at Olympia London, is the region's number one information security event, featuring Europe's.. No more password buck-passing!Last September - as most will be aware - a group of hobbyist hackers announced they had cracked 11.2.. Gateway to safetyThe potential benefits offered by the switch to cloud-based applications and services are undoubtedly compelling for many organisations. However,.. Race against timeUnder the current EU privacy laws, controllers are the addressee of the security requirements and any enforcement takes place.. Tackling data centre challengesThe exponential growth in data centres looks set to continue in 2016 and beyond. With the changing dynamics of.. Macro Malware: An Unexpected ReturnIf a specific malware distribution technique sticks around for any length of time, it's usually an indicator that the cyber.. The Changing Compliance Landscape: Going CircularToday's IT professional is tasked with multiple and sometimes competing interests regarding IT Asset Management, amongst which Governance, Risk &.. Tipping the balance!In 2015, the world's mobile worker population will reach 1.3 billion, representing 37.2% of the global workforce, an increase.. Top 3 data security threatsSometimes we feel like we keep repeating ourselves and then we realise that's our job as vendors: to speak.. Evidence Talks steps up fight against insider fraudWhile the evidence suggests that the numbers of exploitative users have not substantially increased over the years, today the opportunity.. Brookcourt Solutions one of ‘1,000 Companies to Inspire Britain’The report is a celebration of the UK’s fastest-growing and most dynamic small and medium sized businesses across the UK... Pressure mounts on ISPSDDoS attacks are a greater security threat to businesses in 2017 than ever before and Internet service providers (ISPs).. Witchcraft slur sparks backlashDr Ian Levy, technical director of the UK's National Cyber Security Centre, made the accusation in a speech. He said.. Free cyber security course targets people safetyRecent figures released by the Crime Survey for England and Wales highlighted more than two million computer misuse offences, with.. Cybercriminals wage war on Whitehall systemsCiaran Martin, head of the new National Cyber Security Centre (NCSC), told the Sunday Times there had been a "step.. Businesses begin to fight backThat's the finding of Hiscox's latest Cyber Readiness Report, compiled from a survey of more than 3,000 executives, departmental heads,.. Top phishing targets: Google, Yahoo and AppleThis increase may indicate that it is easier to phish a technology account and that, due to password.. Palo Alto Networks sees the LightPalo Alto Networks will continue to offer the LightCyber products and also support existing customer implementations while it.. Barometer's highs and lowsThe barometer has been directly compared to Altodigital’s security barometer from 2013 to discover how much UK businesses have developed,.. 'Deep dive' to pinpoint how SMEs bear brunt of cyber-attacksCyber security threats affect every business and organisation, regardless of size or industry, and impact every department: finance, marketing, compliance,.. Online extortion hits new heightsCyber threats reached an all-time high, with ransomware and business email compromise (BEC) scams gaining increased popularity among cybercriminals looking.. Malware havoc unleashes an avalancheThis is a cross-jurisdiction, cross-industry clean-up effort aimed at targeting malware families that have wrought havoc in recent years,.. Depleted Cyber Skills pool must be replenished"The online threat landscape is in a constant state of flux and the additional £1.9 billion investment.. New postgraduate I.T. degreesWith billions of pounds being lost to the economy through cybercrime, Arden University has been working with industry specialists.. Outlook bleak as passwords crackedThat's according to new research from SecureData. This suggests close to 0.5% of all organisations in its study could.. 'Breakthrough' data governance and protectionThis, it is said, will enable organisations to ensure their most valuable data is monitored and protected against the.. Centre of excellence for DublinThe centre will be committed to conducting research into the latest cyberattacks and trends, while developing tools for the.. 10-STEP Cyber self-assessment tool launchedThe stark warning, from the deputy director of the Scottish Business Resilience Centre (SBRC), chief inspector Ronald Megaughin, comes.. IT professionals fight back against their assailantsYet a new in-depth independent study commissioned for Palo Alto Networks into current attitudes reveals a profession.. Hacked off by the hackersThe Centrify study, which surveyed 2,400 people in the US, UK and Germany, also found that consumers.. Finger on the detection pulseShe is one of just 10 young researchers in the UK to be granted the three-year funding package of.. Employees putting organisations at serious riskDespite the increased use of social media applications, both inside and outside of the office, this survey.. Partnership promises cloud silver liningThe partnership will see Niu Solutions extend its managed IT security suite with services that detect and protect clients'.. More attacks unleashed"While attack sizes are decreasing, we continue to see an uptick in the number of attacks as.. Ransomware? Never heard of itOnly a third (33%) of UK IT decision makers rightly believe that most ransomware infections originate from.. Computing Security Awards 2016 - the winners!
Anti Spam Solution of the Year Massive increase in loss of key dataThe report was conducted by the Ponemon Institute and sponsored by Varonis Systems. "Right now, we're in.. Female techie boosts cyber security teamAccording to the company, cyber security requires the brightest minds to come together to defeat cyber criminals, which is.. UK organisations reject multi-factor authenticationThe news comes off the back of criticism of multi-factor authentication by the National Institute of Standards.. |
SWIFT Customer Security Controls Compliance: An Application-Centric Approach to CybersecurityIn April 2017, SWIFT, the global member-owned cooperative and the world's leading provider of secure financial messaging services, published.. Application-Layer DDoS Attacks: Bad Things Come in Small PackagesOne of the more popular Distributed Denial of Service (DDoS) attacks these days is the application-layer attack, sometimes called a.. CheckmateApplication development has surged forward by leaps and bounds since the punch card era of the 1970s. Yet those.. Cyber Security Lessons from NurseryWe learn at nursery age that sharing is good. However, kids are not naturally programmed to share fun toys with.. Back to BasicsIf we look back over the high-profile cybercrimes of the past few years, there is a clear trend, suggests Brian.. First small steps… .. but a long way to goNational Health Service (NHS) staff provide a world-class service to patients across the UK each and every day. So, the.. Mission? Detection!According to the NTT Security 2017 Risk Value report, 57% of organisations believe they will definitely suffer an information security.. It's war - and it's nowGovernment and corporate cyber resources are under attack around the globe. It is a grim picture to acknowledge, but it.. Mighty storm unleashedCheck Point researchers have discovered a new botnet, dubbed 'IoTroop', evolving and recruiting IoT devices at a far greater pace.. Real solutions, not band-aids!The need to ensure security compliance in an increasingly agile world where BYOD is becoming the new mobility norm, with.. Things To Consider When Choosing A Cyber Security Vendor2017 has been a tough year in cyber security. We’ve seen businesses, big and small, get hit by data.. Through the glass, darklyWhether it's in the run-up to a new year, or as we dance, hug and kiss while the clocks strike.. Evidence Talks steps up fight against insider fraudWhile the evidence suggests that the numbers of exploitative users have not substantially increased over the years, today the opportunity.. How to underpin security transformation with complete visibility of your attack surfaceThere are many reasons why you may be considering or engaged in a security transformation programme tasked with reducing the.. Leading the fightback through the power of I0TOrganisations face some critical decisions as they seek to push ahead with their IoT projects, according to the recently released.. It's time to be very ready!When Cisco launched its first Privacy Maturity Benchmark Study in February this year, it found that 74% of privacy-immature organisations.. China CrackdownChina has become a great enticement for UK organisations, including the security industry, with lucrative business contracts to be.. Computing Security Awards 2017 - The Winners!
Anti Spam Solution of the Year
Anti Malware Solution of the Year
Threat Intelligence Award GDPR: The Silver LiningThe majority of conversations surrounding the imminent arrival of GDPR - General Data Protection Regulation - strike a tone.. Content Security Solution of the Year – Computing Security Awards 2017RUNNER UP: Titania - Nipper Studio Trend Micro has been securing global 100 businesses, governments, SMBs and home users.. Evolving your security for the cloudGlobal management consulting firm McKinsey recently released a report titled 'Making a secure transition to the public cloud', the result.. Concerned about GDPR compliance? VTL could be part of the solutionOne area that could be easily forgotten is your backup solution. If your business holds any personal data of EU.. Advanced Persistent Threat (APT) Solution of the Year – Computing Security Awards 2017RUNNER UP: Trend Micro - Deep Discovery Performanta, a leading global cyber security firm, and TrapX, a leader in.. Life on the cutting edgeOver the next five years, the top three technologies that are set to move from the fringes to the.. Uniting forces to tackle cyber riskThey say it all happens in Silicon Valley, hailed by many as the 'new Hollywood'. Now Allianz Global Corporate.. Hacking on the cheapA Daily Mail investigation into the strength of various technologically-driven alternatives to the basic password has revealed the ease with.. The Vital LinkPredictive analytics is an emerging discipline that will become, according to Jeff Costlow, director of security, ExtraHop, a vital practice.. Anti Malware Solution of the Year – Computing Security Awards 2017RUNNER UP: F5 Networks - WebSafe As companies decentralise and data is accessible via more devices from multiple locations,.. The Contribution to Cyber Security Award – Computing Security Awards 2017RUNNER UP: Kevin McMahon (Cyjax) Phil Richards, Chief Security Officer at Ivanti, has both breadth and depth of security.. Titania Nipper Studio 2.5Configurations, access rules and security policies need to be audited regularly to identify weaknesses; however, many organisations don't have the.. Anti Spam Solution of the Year – Computing Security Awards 2017RUNNER UP: Fusemail - Secure Smart We can't thank our customers, partners and peers enough for voting for us.. I.T. disposal: selecting the bestThankfully, with a little guidance, you can make an informed decision and choose a reputable IT disposal company from amongst.. Threat Intelligence Award – Computing Security Awards 2017RUNNER UP: Varonis – DatAdvantage CYJAX, Kevin McMahon, CEO - Threat Intelligence Award and Security Project of the Year.. Anti Phishing Solution of the Year – Computing Security Awards 2017RUNNER UP: LibraEsva - Libra ESVA At OnDMARC, we want to give people back control of their identity online... Identity and Access Management Solution of the Year – Computing Security Awards 2017RUNNER UP: Centrify - Centrify Identity Platform My1Login is a UK leader in protecting against enterprise cyber security threats.. Threat Intelligence gets to truth of Dortmund bombingOn 11 April this year, the tour bus of German football team Borussia Dortmund was attacked with roadside bombs.. AI versus a human hacker"Please type the words you see in the image." Familiar? Yes, at some point we have all completed a 'captcha'.. Editor’s Choice – Computing Security Awards 2017As editor of Computing Security magazine, I would like to extend my warmest congratulations to Malwarebytes for winning the.. Mobile Security Solution of the Year – Computing Security Awards 2017RUNNER UP: Bitglass - Mobile Security Solution Mobile is indisputably the new frontier for cyber threats. As the adoption.. Secure Data Erasure Company of the Year – Computing Security Awards 2017RUNNER UP: Sims Recycling Solutions In what is turning out to be an amazing year for CDL, we scooped.. Armed to fight backBy providing permanent Cyber Range capabilities for its customers in Europe, the Middle East and Africa, the Americas and the.. Enterprise Security Solution of the Year – Computing Security Awards 2017RUNNER UP: Sky High Networks - Cloud Access Security Broker Modern DDoS attacks target bandwidth, applications and infrastructure, often.. Taking the fight to the enemyEveryone will be waiting for 25 May Cloud Security Solution of the Year – Computing Security Awards 2017RUNNER UP: WinMagic - SecureDoc Cloud VM At Egress, we work to give our customers maximum flexibility over the.. Education and Training Provider of the Year – Computing Security Awards 2017RUNNER UP: AssureDara One of Europe's leading IT consultancies, ZeroDayLab's unique 360° approach to Total Security Management helps secure.. Computing Security Awards 2017The 2017 Computing Security Awards took place during a gala night at the Radisson Blu in central London, celebrating.. Security Distributor of the Year – Computing Security Awards 2017RUNNER UP: Distology Nuvias Cyber Security is the security practice for Nuvias, the pan-EMEA, high value distribution business, which.. Network Access Control Solution of the Year – Computing Security Awards 2017RUNNER UP: Cisco - Cisco ISE Ofer Amitai, CEO, Portnox - Network Access Control Category Being selected as the ‘Network.. Security Service Provider of the Year – Computing Security Awards 2017RUNNER UP: NuData Security Brookcourt CEO Phil Higgins: New Product of the Year – Computing Security Awards 2017RUNNER UP: Rohde & Schwarz Cybersecurity - TrustedGate Cloud Encryption Digital Pathways have yet again proved the fable of.. DLP Solution of the Year – Computing Security Awards 2017RUNNER UP: CoSoSys - Endpoint Protector 5 GhangorCloud is honoured to receive the DLP Solution of the Year award.. SME Security Solution of the Year – Computing Security Awards 2017RUNNER UP: Digital Pathways – nCrypt We are very excited to win the 'SME Security Solution of the Year'.. A taste of things to comeLast year saw wave after wave of tech news hitting the headlines. Whether it was documenting a huge technological advancement,.. Security Recruitment Company of the Year – Computing Security Awards 2017RUNNER UP: Adeptis Group Evolution Recruitment Solutions specialises in permanent, contract and interim IT recruitment, with current offices based.. Pen Testing Solution of the Year – Computing Security Awards 2017RUNNER UP: Rapid7 - Metasploit Pro "Winning awards is always nice, but particularly satisfying when the results are decided.. Security Project of the Year - Private Sector – Computing Security Awards 2017RUNNER UP: Healthcare Corporation of America / Portnox CYJAX, Kevin McMahon, CEO: "Threat Intelligence Award and Security Project of.. The ‘One to Watch’ Security Company – Computing Security Awards 2017RUNNER UP: My1Login Capita Cyber Security delivers technologies, processes and practices designed to protect networks, computers, programs and data.. Network Security Solution of the Year – Computing Security Awards 2017RUNNER UP: Redscan – ThreatDetect Security company Titania has won one of the most coveted awards at the wonderful.. The Compliance Award – Computing Security Awards 2017RUNNER UP: ZeroDayLab Ann Keefe, Regional Director, Kingston: "We are delighted to have won the Computing Security voted-for award.. Anti Ransomware/ Anti DDos Solution of the Year – Computing Security Awards 2017RUNNER UP: Mimecast - Mimecast Targeted Threat Protection Browsing the Internet has become an absolutely necessity in today's work.. Web Application Firewall of the Year – Computing Security Awards 2017RUNNER UP: Barracuda – WAF Application Security Manager (ASM) is F5 Network's comprehensive web application firewall (WAF) that protects.. An urgent call to armsWhatever we may have thought of the many breaches, hacks and ransomware attacks that hit the headlines in 2017, do.. Security Project of the Year - Public / Not for Profit Sector – Computing Security Awards 2017RUNNER UP: Close the Gap / Arrow Value Recovery "At Egress, we work to give our customers maximum flexibility.. Security Company of the Year – Computing Security Awards 2017RUNNER UP: Brookcourt Solutions It's a big, ever-evolving challenge. But we're dedicated to helping to solve it, as we're.. Encryption Solution of the Year – Computing Security Awards 2017RUNNER UP: Kingston Technology - D300 This is the 2nd year in a row we have picked up the.. Security Reseller of the Year – Computing Security Awards 2017RUNNER UP: Capita Cyber Security Brookcourt CEO Phil Higgins: Deadly game of Hide 'n' SeekA new bot, dubbed HNS, has been intercepted by Bitdefender's IoT honeypot system, following a credentials dictionary attack on the.. APCON expands product portfolioAPCON, a leading provider of intelligent network visibility and security solutions, has launched a new series of Copper Bypass.. TEISS cracking cyber securityThe Head of Ethical Phishing at the Royal Bank of Scotland warned last month that mobile malware is the next.. Laptops Blitzed in under 30 secondsIt was interesting and worrying, to see an alert on a security issue that allegedly has been affecting most corporate.. Everyone is at riskCybercrime targeted at small businesses is increasing at an alarming rate and it's a problem that's not about to go.. Protecting data to protect patientsHealthcare providers, support services and technology manufacturers have emerged as a favoured target of cyber criminals. Beyond the headlines of.. Cardwave launches SafeToGo Solo, a new GDPR compliant hardware encrypted USBSafeToGo® Solo provides a highly competitive hardware encrypted USB solution for individuals and SMEs wanting to transport data securely. .. Driving into the unknownConnected cars are a reality; most modern vehicles on the road nowadays have some form of connectivity to the open.. Titania Paws Studio 3.2.2Very keenly priced, it's capable of auditing all Windows, macOS and Linux systems, and offers an impressive range of highly.. Risk and reward in the big cityOf course, everything on the Disneyland ride Utopia, from its stoplight-less streets and smooth traffic control, was pre-programmed. It was.. The dark destroyersMore than a million leaked and hacked credentials from the UK's top law firms have been tracked down to the.. Cardwave launches SafeToGo Solo, a new GDPR compliant hardware encrypted USBSafeToGo® Solo provides a highly competitive hardware encrypted USB solution for individuals and SMEs wanting to transport data securely. .. AI versus a human hacker"Please type the words you see in the image." Familiar? Yes, at some point we have all completed a 'captcha'.. Deadly game of Hide 'n' SeekA new bot, dubbed HNS, has been intercepted by Bitdefender's IoT honeypot system, following a credentials dictionary attack on the.. How to underpin security transformation with complete visibility of your attack surfaceThere are many reasons why you may be considering or engaged in a security transformation programme tasked with reducing the.. I.T. disposal: selecting the bestThankfully, with a little guidance, you can make an informed decision and choose a reputable IT disposal company from amongst.. Driving into the unknownConnected cars are a reality; most modern vehicles on the road nowadays have some form of connectivity to the open.. The dark destroyersMore than a million leaked and hacked credentials from the UK's top law firms have been tracked down to the.. It's time to be very ready!When Cisco launched its first Privacy Maturity Benchmark Study in February this year, it found that 74% of privacy-immature organisations.. Evolving your security for the cloudGlobal management consulting firm McKinsey recently released a report titled 'Making a secure transition to the public cloud', the result.. Everyone is at riskCybercrime targeted at small businesses is increasing at an alarming rate and it's a problem that's not about to go.. Protecting data to protect patientsHealthcare providers, support services and technology manufacturers have emerged as a favoured target of cyber criminals. Beyond the headlines of.. An urgent call to armsWhatever we may have thought of the many breaches, hacks and ransomware attacks that hit the headlines in 2017, do.. A taste of things to comeLast year saw wave after wave of tech news hitting the headlines. Whether it was documenting a huge technological advancement,.. Risk and reward in the big cityOf course, everything on the Disneyland ride Utopia, from its stoplight-less streets and smooth traffic control, was pre-programmed. It was.. Titania Paws Studio 3.2.2Very keenly priced, it's capable of auditing all Windows, macOS and Linux systems, and offers an impressive range of highly.. TEISS cracking cyber securityThe Head of Ethical Phishing at the Royal Bank of Scotland warned last month that mobile malware is the next.. Application-Layer DDoS Attacks: Bad Things Come in Small PackagesOne of the more popular Distributed Denial of Service (DDoS) attacks these days is the application-layer attack, sometimes called a.. It's war - and it's nowGovernment and corporate cyber resources are under attack around the globe. It is a grim picture to acknowledge, but it.. Laptops Blitzed in under 30 secondsIt was interesting and worrying, to see an alert on a security issue that allegedly has been affecting most corporate.. Hacking on the cheapA Daily Mail investigation into the strength of various technologically-driven alternatives to the basic password has revealed the ease with.. Taking the fight to the enemyEveryone will be waiting for 25 May Real solutions, not band-aids!The need to ensure security compliance in an increasingly agile world where BYOD is becoming the new mobility norm, with.. First small steps… .. but a long way to goNational Health Service (NHS) staff provide a world-class service to patients across the UK each and every day. So, the.. Armed to fight backBy providing permanent Cyber Range capabilities for its customers in Europe, the Middle East and Africa, the Americas and the.. Through the glass, darklyWhether it's in the run-up to a new year, or as we dance, hug and kiss while the clocks strike.. The Vital LinkPredictive analytics is an emerging discipline that will become, according to Jeff Costlow, director of security, ExtraHop, a vital practice.. Titania Nipper Studio 2.5Configurations, access rules and security policies need to be audited regularly to identify weaknesses; however, many organisations don't have the.. Concerned about GDPR compliance? VTL could be part of the solutionOne area that could be easily forgotten is your backup solution. If your business holds any personal data of EU.. Cyber Security Lessons from NurseryWe learn at nursery age that sharing is good. However, kids are not naturally programmed to share fun toys with.. Evidence Talks steps up fight against insider fraudWhile the evidence suggests that the numbers of exploitative users have not substantially increased over the years, today the opportunity.. Things To Consider When Choosing A Cyber Security Vendor2017 has been a tough year in cyber security. We’ve seen businesses, big and small, get hit by data.. Mission? Detection!According to the NTT Security 2017 Risk Value report, 57% of organisations believe they will definitely suffer an information security.. CheckmateApplication development has surged forward by leaps and bounds since the punch card era of the 1970s. Yet those.. Mighty storm unleashedCheck Point researchers have discovered a new botnet, dubbed 'IoTroop', evolving and recruiting IoT devices at a far greater pace.. SWIFT Customer Security Controls Compliance: An Application-Centric Approach to CybersecurityIn April 2017, SWIFT, the global member-owned cooperative and the world's leading provider of secure financial messaging services, published.. China CrackdownChina has become a great enticement for UK organisations, including the security industry, with lucrative business contracts to be.. Back to BasicsIf we look back over the high-profile cybercrimes of the past few years, there is a clear trend, suggests Brian.. GDPR: The Silver LiningThe majority of conversations surrounding the imminent arrival of GDPR - General Data Protection Regulation - strike a tone.. Life on the cutting edgeOver the next five years, the top three technologies that are set to move from the fringes to the.. Uniting forces to tackle cyber riskThey say it all happens in Silicon Valley, hailed by many as the 'new Hollywood'. Now Allianz Global Corporate.. Leading the fightback through the power of I0TOrganisations face some critical decisions as they seek to push ahead with their IoT projects, according to the recently released.. Computing Security Awards 2017The 2017 Computing Security Awards took place during a gala night at the Radisson Blu in central London, celebrating.. Anti Spam Solution of the Year – Computing Security Awards 2017RUNNER UP: Fusemail - Secure Smart We can't thank our customers, partners and peers enough for voting for us.. Anti Malware Solution of the Year – Computing Security Awards 2017RUNNER UP: F5 Networks - WebSafe As companies decentralise and data is accessible via more devices from multiple locations,.. Threat Intelligence Award – Computing Security Awards 2017RUNNER UP: Varonis – DatAdvantage CYJAX, Kevin McMahon, CEO - Threat Intelligence Award and Security Project of the Year.. Content Security Solution of the Year – Computing Security Awards 2017RUNNER UP: Titania - Nipper Studio Trend Micro has been securing global 100 businesses, governments, SMBs and home users.. Network Security Solution of the Year – Computing Security Awards 2017RUNNER UP: Redscan – ThreatDetect Security company Titania has won one of the most coveted awards at the wonderful.. Encryption Solution of the Year – Computing Security Awards 2017RUNNER UP: Kingston Technology - D300 This is the 2nd year in a row we have picked up the.. DLP Solution of the Year – Computing Security Awards 2017RUNNER UP: CoSoSys - Endpoint Protector 5 GhangorCloud is honoured to receive the DLP Solution of the Year award.. Mobile Security Solution of the Year – Computing Security Awards 2017RUNNER UP: Bitglass - Mobile Security Solution Mobile is indisputably the new frontier for cyber threats. As the adoption.. Identity and Access Management Solution of the Year – Computing Security Awards 2017RUNNER UP: Centrify - Centrify Identity Platform My1Login is a UK leader in protecting against enterprise cyber security threats.. Anti Phishing Solution of the Year – Computing Security Awards 2017RUNNER UP: LibraEsva - Libra ESVA At OnDMARC, we want to give people back control of their identity online... Network Access Control Solution of the Year – Computing Security Awards 2017RUNNER UP: Cisco - Cisco ISE Ofer Amitai, CEO, Portnox - Network Access Control Category Being selected as the ‘Network.. Cloud Security Solution of the Year – Computing Security Awards 2017RUNNER UP: WinMagic - SecureDoc Cloud VM At Egress, we work to give our customers maximum flexibility over the.. Anti Ransomware/ Anti DDos Solution of the Year – Computing Security Awards 2017RUNNER UP: Mimecast - Mimecast Targeted Threat Protection Browsing the Internet has become an absolutely necessity in today's work.. Advanced Persistent Threat (APT) Solution of the Year – Computing Security Awards 2017RUNNER UP: Trend Micro - Deep Discovery Performanta, a leading global cyber security firm, and TrapX, a leader in.. Secure Data Erasure Company of the Year – Computing Security Awards 2017RUNNER UP: Sims Recycling Solutions In what is turning out to be an amazing year for CDL, we scooped.. Security Recruitment Company of the Year – Computing Security Awards 2017RUNNER UP: Adeptis Group Evolution Recruitment Solutions specialises in permanent, contract and interim IT recruitment, with current offices based.. Education and Training Provider of the Year – Computing Security Awards 2017RUNNER UP: AssureDara One of Europe's leading IT consultancies, ZeroDayLab's unique 360° approach to Total Security Management helps secure.. Pen Testing Solution of the Year – Computing Security Awards 2017RUNNER UP: Rapid7 - Metasploit Pro "Winning awards is always nice, but particularly satisfying when the results are decided.. Web Application Firewall of the Year – Computing Security Awards 2017RUNNER UP: Barracuda – WAF Application Security Manager (ASM) is F5 Network's comprehensive web application firewall (WAF) that protects.. Security Service Provider of the Year – Computing Security Awards 2017RUNNER UP: NuData Security Brookcourt CEO Phil Higgins: Security Distributor of the Year – Computing Security Awards 2017RUNNER UP: Distology Nuvias Cyber Security is the security practice for Nuvias, the pan-EMEA, high value distribution business, which.. Security Reseller of the Year – Computing Security Awards 2017RUNNER UP: Capita Cyber Security Brookcourt CEO Phil Higgins: SME Security Solution of the Year – Computing Security Awards 2017RUNNER UP: Digital Pathways – nCrypt We are very excited to win the 'SME Security Solution of the Year'.. Enterprise Security Solution of the Year – Computing Security Awards 2017RUNNER UP: Sky High Networks - Cloud Access Security Broker Modern DDoS attacks target bandwidth, applications and infrastructure, often.. The Compliance Award – Computing Security Awards 2017RUNNER UP: ZeroDayLab Ann Keefe, Regional Director, Kingston: "We are delighted to have won the Computing Security voted-for award.. Security Project of the Year - Private Sector – Computing Security Awards 2017RUNNER UP: Healthcare Corporation of America / Portnox CYJAX, Kevin McMahon, CEO: "Threat Intelligence Award and Security Project of.. Security Project of the Year - Public / Not for Profit Sector – Computing Security Awards 2017RUNNER UP: Close the Gap / Arrow Value Recovery "At Egress, we work to give our customers maximum flexibility.. New Product of the Year – Computing Security Awards 2017RUNNER UP: Rohde & Schwarz Cybersecurity - TrustedGate Cloud Encryption Digital Pathways have yet again proved the fable of.. Editor’s Choice – Computing Security Awards 2017As editor of Computing Security magazine, I would like to extend my warmest congratulations to Malwarebytes for winning the.. The Contribution to Cyber Security Award – Computing Security Awards 2017RUNNER UP: Kevin McMahon (Cyjax) Phil Richards, Chief Security Officer at Ivanti, has both breadth and depth of security.. The ‘One to Watch’ Security Company – Computing Security Awards 2017RUNNER UP: My1Login Capita Cyber Security delivers technologies, processes and practices designed to protect networks, computers, programs and data.. Security Company of the Year – Computing Security Awards 2017RUNNER UP: Brookcourt Solutions It's a big, ever-evolving challenge. But we're dedicated to helping to solve it, as we're.. APCON expands product portfolioAPCON, a leading provider of intelligent network visibility and security solutions, has launched a new series of Copper Bypass.. Computing Security Awards 2017 - The Winners!
Anti Spam Solution of the Year
Anti Malware Solution of the Year
Threat Intelligence Award Threat Intelligence gets to truth of Dortmund bombingOn 11 April this year, the tour bus of German football team Borussia Dortmund was attacked with roadside bombs.. |