Home Articles News Issues eNewsletters Subscribe Media Info Contact More
Untitled Document
When will we ever learn?
Having suffered two of the largest hacks in history, Yahoo ended 2016 on a low note, with its approach to cyber security brought seriously into question. What went so wrong?...


Battle of wits
Organisations must assume responsibility for their security by undertaking due diligence and self-regulation - else they could be the next victims of a data breach...

Prevention: better than any cure
They are vicious and pernicious. So what steps can be taken to detect and block exploits as soon as they attempt to use software vulnerabilities? We ask the experts...

Beyond the nightmare
Governance, risk and compliance are vitally important, especially as more and more legislation is introduced that could have grave consequences for any enterprise that flouts its rules...

Outgunning the criminal mind
The role and importance of digital forensics are being driven by changes in the technology available - and product development is a direct response to this market pressure, says one expert...

Mirror, mirror, on the wall
Many organisations turn to managed security services providers - MSSPs - to deliver the expertise, knowledge and infrastructure they need to secure them from Internet attacks. But how well do they live up to their image?...

The right train of thought
IT security training could not be more essential. But what should the practices and policies be that underscore this? Who should be responsible for making the decisions relating to that training and how exactly should employees be monitored?...

Not all is what it SIEMs
how do you justify the cost of investing in Security Information and Event Management - SIEM - to those who control the purse strings within your organisation? Computing Security finds out by talking to those in the know....

The Cyber Imposters
An email arrives at work from someone you know well. But is it from that person? Has it been forged? Targeted attacks come in many guises. How do you combat such threats?...

Under siege - in your own car
With today's connected vehicle technologies, the risk of potential cyber security threats is vast – and growing – with cars already forced off the road. What can be done to safeguard these systems and drivers?...

Sealing up the leaks
What does a successful data protection strategy look like in the face of eroding security perimeters, increasing targeted attacks, and evolving user habits and expectations?...

Life after the EU
Britain is to leave the EU - the votes were cast and the deed is done. But what is this likely to mean for our industry? Computing Security has been finding out ...

After the flood
With mobile devices now seemingly everywhere, and more and more applications pouring into the market, mobile monitoring and device management have never been so vital...

Managing email security
Businesses place heavy reliance on email - making it a prime target for hackers. But can any single system lock them out?...

Encryption to amaze
Truly effective encryption that actually protects data wherever it may reside is an absolute must for any business or organisation dealing with sensitive data...

At your disposal
Suffering from Regulation fatigue? Now is the time to take on board the benefits of the new GDPR regulations and the payback they can bring to your business....

Upping the ante with anti-malware
Combating malware means going way beyond locating suspicious programs on servers and workstations, and detecting and interfering with the use of malware on the network...

The Gold Rush is On!
Cyber attacks are costing businesses hundreds of billions annually. With the strongest defence being a skilled and experienced cybersecurity team, lucrative careers are beckoning...

The human factor
The barriers that keep any organisation safe from attack are often guarded by nothing more than a single factor of authentication. Just one weakness and the whole business can be breached....

Land of opportunity - and potential catastrophe
The massive benefits that IOT can deliver in what has now become a hyper-connected society must be set against the countless risks posed each day by Cyberattacks...

CYjAX Intelligence Platform
The cyber threat landscape is evolving at such a pace that businesses need to be even more inventive in protecting confidential data...


Ixia ThreatARMOR
The amount and sophistication of cyber-attacks is increasing exponentially and many enterprises are finding their security systems are wilting under the pressure...

Phishing mitigation from SpearSec
Phishing comes in a variety of forms and, just like the best Saville Row suits, it is made to measure...

Varonis DatAdvantage
Unstructured data is growing at such an alarming rate that organisations must implement a data access governance strategy to ensure its security and integrity...

GhangorCloud Information Security Enforcer
Security breaches relating to IT now have such serious consequences that enterprises must protect to survive...

SecurEnvoy SecurAccess 8
Two factor authentication (2FA) is the only way forward for security-savvy businesses, as standard username and password combinations are now dangerously insecure...

Malwarebytes Breach Remediation
Enterprises can never let their guard down in the fight against malware...

Malwarebytes Anti-Exploit for Business
According to many different statistics, most exploit attacks happen against known vulnerabilities...

The CryptoFlow App from Certes Networks
Certes Networks has an enviable reputation in the data security world...

Lepide Auditor Suite 15.2
Change auditing is an essential requirement for enterprises, helping them to comply with ever tougher data protection regulations...

Thycotic Secret Server
Privileged account credentials are the number one target for today's cyber criminals, as they provide easy access to the very heart of a business's IT infrastructure...

Titania PAWS Studio 2.4.4
SMBs that want to show compliance with data protection regulations will like Titania's PAWS Studio a lot...

Embrace a digital future!
Cyber Security Europe is returning to the ExCel London for the second year running in October this year — and promises to be even bigger and better...

Integral Memory Crypto SSD
It beggars belief that, even with all the publicity surrounding data protection, hardly a week goes by without us hearing about yet another government department or business losing sensitive or personal data...

macmon NAC
Network access control has traditionally had a mixed reception in enterprises, as all too many solutions are notoriously difficult to install, complex to manage and expensive...

Titania TEC
UK-based Titania has a sharp focus on data security compliance and its latest TEC aims to make regulatory auditing on all network devices a breeze...

Acunetix Online Vulnerability Scanner
In today's competitive global markets, SMBs need to protect their web sites from hackers just as much as enterprises do, but few have the financial resources to ensure they are totally secure...

Libra ESVA 3.5 Review
Based in Italy, Libra scores over the big names in the anti-spam market as its ESVA (email security virtual appliance) offers tough messaging security at a very affordable price. Ideally suited to enterprises and SMBs alike, ESVA employs a 13-step filtering process and claims a near-perfect spam detection rate...

Gemalto SafeNet ProtectV 2.0
The cost benefits alone make moving virtualised data centres into the cloud a no-brainer, but concerns about security are still a major stumbling block...

8MAN: from protected-networks.com
A fundamental requirement for meeting compliance regulations is Active Directory (AD) auditing, but many businesses still do not have the tools in place to achieve this effectively...

The Data Breach Blindspot
How do you control data breaches that threat systems miss (or take too long to find)? Here, Adam Boone, chief marketing officer at Certes Networks, offers his insights...


Fighting back against malware
How do you best protect your systems from malware infiltration and infection? Malwarebytes offers some expert insights and advice to help ward off the attackers...

Understanding the differences between antivirus and anti-malware
Seeking the best way to reducing your attack surface? First, you need to understand the differences between antivirus security and anti-malware security, says internet security company Malwarebytes...

Protecting applications from Firewall failure
How to protect applications, in the context of changing network access and a porous perimeter - Certes Networks provides the strategy...

PSN-compliant mobile working
A PSN-compliant mobile working solution offers tangible benefits, but it is critical to enter into the process with a robust strategy, cautions Tim Ager of Celestix ...

In pursuit of radical change
Tim Ager of Celestix has been working closely with local and regional government organisations to support their transformational government objectives. Here, he offers a taster from behind the scenes...

Security? It's in Microsoft's DNA!
While many rue what they see as the disappearance of Microsoft from the security business, Tim Ager argues the software giant has never been more committed to the cause...

Cyber-risk insurance: right for you?
The increasing popularity of cyber insurance policies indicates many companies feel they have lost the fight to protect their boundaries and are now looking for a new approach, says Tim Ager, Celestix...

Can cyber-risk insurance really keep you safe?
Cyber-risk insurance policies are growing in popularity with the business community, but there’s a danger that they can encourage complacency. Tim Ager offers his thoughts...

Why Windows 8 is so gr8!
Tim Ager says the demise of Windows xp is no cause for lamentation - Windows 8 has so much to offer...

2014: Into The Unknown
We need to keep evolving ways in which to authenticate our trusted users, if we are to stay ahead of the game, says Tim Ager ...

Managing The Risks
Risk-based authentication is now making its presence felt. Tim Ager of Celestix explains why and what it is all about...

Key factors in a mobile world
As mobile device management becomes an ever greater challenge, its convergence with two-factor authentication is one significant outcome ...

Key factors in a mobile world
As mobile device management becomes an ever greater challenge, its convergence with two-factor authentication is one significant outcome ...

Clear Thinking In A Clouded World
In his latest masterclass, celestix CEO tim ager explains How to deploy two-factor authentication successfully in a cloud-centric architecture ...

Embracing The Two-Factor Factor
Can you really increase security and reduce cost with two-factor authentication?...

In Safe Hands
"Look closer to home, if you want to take the greatest steps to safeguard your organisation in 2013"...

Security Class
This Security Class series is in association with ActivIdentity. In this edition we examine the challenges to be met in securing mobility...

Postgrad degrees to fight cybercrime
It is a mark of the times we live in that a new line-up of cybersecurity degrees has been launched to help fight hackers and online criminals, as demand for skilled specialists grows...


The ‘dark web’ – and then there’s Brown
The dark web is regarded as a breeding ground for crime - a secretive and murky part of the world wide web that requires special software to gain entry...

The Big Hit
The loss or theft of important data over the past two years has been on a staggering scale...

We are 'out' – where to now?
The voting is over, the die is cast. We are out of the EU and unlikely to return, despite all the protests from 'Remain' and calls for a second vote...

Turning the cyber tide
At a time when too many enterprises are succumbing to cyber attacks and breaches that often leave their businesses badly damaged, even devastated, the need for every organisation to take personal responsibility and put its house in order has never loomed so large...

Why the attackers are winning the war
As we wend our way through the early part of 2016, thoughts inevitably turn to the threat landscape and that niggling worry in the back of the mind: "Will my business stay safe this year?"...

‘Anonymity’ software leaks users’ details
It's alarming to hear that the services used by hundreds of thousands of people – legitimately to protect their identity on the web – have been found vulnerable to leaks...

GDPR - coming, ready or not!
According to a new survey by iStorage, almost a third of public and private sector professionals are not aware of what the forthcoming EU General Data Protection Regulation (GDPR) will mean to them or their organisations...

Fears and deaf ears
Would you consider stripping your employees of company smart phones and memory sticks to protect your business from cyber attacks?...

Anthem for cyber victims
Following the recent Anthem breach – where the USA's second largest health insurer was hacked, exposing personal details including the social security numbers of tens of millions of customers and employees – it seems cyber criminals have now been taking advantage of the public's concern and using phishing scams in an attempt to steal financial and personal information...

'Tails' of the unexpected?
No new year can ever come along without a wealth of security predictions already hanging on tenaciously to its young coat-tails...

KGB, Stasi... and now the UK government?
A research report published by F-Secure shows the growing concern of the British public with mass surveillance being undertaken by the British government on its own people, as well as foreign nationals...

Sigh... sigh...Cyber: Paying the price
Economic espionage and cybercrime can severely jeopardise Internet stability and global online commerce...

Urgent need to boost cyber skills
Businesses must do far more to tackle cybercrime, which is threatening to spiral out of control - and new government plans to boost cyber skills looks like a great opportunity to do so...

Battling A Global Threat
The global energy sector is amongst many commercial interests that are becoming increasingly vulnerable to cyber attacks and hacking...

Don't let it all end in floods of tears
Water has been constantly in the headlines of late, infiltrating communities on a massive scale and leaving a trail of destruction in its wake...

Inside 2014
Ask those in the know what will be the hot topics for security in 2014 and there is no shortage of response. ...

Massive strides forward
If there is one thing that the 2013 Computing Security Awards demonstrated above all else, it's the fact that the industry is moving in the right direction ...

Data Breaches - Time To Come Clean
The day that telecoms operators and internet service providers (ISPs) across Europe must have dreaded has finally arrived...

Anxious times signal need for action
The Intelligence and Security Committee (ISC) of Parliament has just published its Annual Report for 2012-2013 and it makes for intriguing - and often disturbing - reading...

New Trustwave study shows that 57 percent of IT security professionals struggle to find talent
Study reveals corporate security demands outpace available talent at alarming rates....


Hackers and the fear of flying
Following claims that a flaw could allow hackers to take control of a plane, using the in-flight entertainment system...

The search is on for I.T. talent
A new study from Trustwave and Osterman Research...

Malware havoc unleashes an avalanche
Internet security vendor Bitdefender has joined forces with Europol and other partners to aid with 'Operation Avalanche'...

Depleted Cyber Skills pool must be replenished
The UK government's recently announced National Cyber Security Strategy 2016 to 2021 is to be welcomed by the cyber security industry - with reservations...

Akamai acquires Cyberfend
Akamai Technologies has acquired Cyberfend, an innovator in bot and automation detection solutions for web and mobile environments, in an all-cash transaction...

New postgraduate I.T. degrees
New cybersecurity degrees have been launched to help fight hackers and online criminals, as demand for skilled specialists grows...

Outlook bleak as passwords cracked
Thousands of UK businesses are immediately at risk from potential compromise of their Outlook Web Access platform...

'Breakthrough' data governance and protection
QinetiQ's data security company Boldon James and Varonis Systems, provider of software solutions that protect data from insider threats and cyberattacks, have announced the integration of Boldon James Classifier data classification solution suite with the Varonis Metadata Framework platform...

Centre of excellence for Dublin
DocuSign has opened a Cybersecurity Centre of Excellence in Dublin as part of its ongoing commitment to Europe and protecting its customers' data and privacy...

10-STEP Cyber self-assessment tool launched
Businesses in Scotland are facing an unprecedented level of threat to their operations, according to a senior police chief and security expert...

Hackers can 'read' bank card details 'in seconds'
In response to experts from Newcastle University revealing that criminals can work out the card number, expiry date and security code for a Visa debit or credit card in as little as six seconds ...

AI used to block 'Category 3'-style attacks
AdaptiveMobile says it has demonstrated protection against a range of sophisticated, stateful attacks on SS7 networks with one of the largest networks in APAC...

The IoT Security Foundation announces its Security Compliance Framework
The Internet of Things Security Foundation (IoTSF) has announced the publication of its IoT security compliance framework at its annual conference in London....

Braking bad and out of control
Researchers have managed to remotely slam on the brakes of a Tesla Model S from some 12 miles away, pop the trunk and fold in the side mirror, all while the car was moving...

New tranche of cyber funding for royal holloway university
The UK government has announced the renewal of funding for the Centre for Doctoral Training (CDT) in Cyber Security at Royal Holloway, University of London...

IT professionals fight back against their assailants
The received wisdom is that European IT security professionals are being subjected to overbearing pressure from adversaries when it comes to dealing with cybersecurity...

Hacked off by the hackers
An online study reveals that people are most worried about credit cards or bank statements being hacked, with 85% cent in the UK ranking it a top concern, well ahead of the US and Germany (78%)...

Finger on the detection pulse
Physics PhD student Susanna Challinger has recently been awarded an Industrial Fellowship by The Royal Commission of the Exhibition of 1851 to help bring novel fingerprint detection technology to life...

Has your mobile device been attacked lately? No idea!
Mobile users are massively unaware of cyberthreats, with an overwhelming 89% of respondents to a survey admitting they wouldn't know if their device has been infected through a cyber attack...

Q&A
Computing Security recently interviewed Dr Anand Narasimhan, managing director, Sims Recycling Solutions, EU & India, to garner his thoughts on asset management and disposal...


Cyber Security must be a C-Suite Priority
Adam Boone, Chief Marketing Officer, Certes Networks, insists it is time to make cyber security a priority for every C-suite....

The fraud bonanza
The annual cost of fraud in the UK could be as high as £193bn a year – way above the government's £50bn figure...

It's showtime!
It's all going to be there at Infosecurity Europe 2016-everything you need to know about information security ...

No more password buck-passing!
Do weak passwords keep you awake at night? David Hald of SMS PASSCODE and Dan Evans of VCW Security explain just why they should, in a follow-up to our feature last issue...

Gateway to safety
Rarely does a single cloud have the silver lining of offering all the applications that enterprise I.T. needs to deliver... enter Identity and Access Management...

Race against time
Leading privacy lawyer Lokke Moerel offers her thoughts on the challenges behind the EU's data protection laws...

Tackling data centre challenges
Multinational corporations are coming under increased pressure to develop consistent global asset management and disposal policies and procedures, as Dr Anand Narasimhan, managing director, Asset Recovery Services EU & India, Sims Recycling Solutions, explains...

Macro Malware: An Unexpected Return
The re-emergence of macro malware after more than 10 years, when it seemed to have died out, does not augur well, warns CYREN...

The Changing Compliance Landscape: Going Circular
By Anand Narasimhan, director UK, EU & NI, Sims Recycling Solutions...

Tipping the balance!
How do you best manage the upwardly mobile workforce? Patrick Warley, Global Head of Research & Development, Integral Memory, manufacturers of the Crypto range of hardware encrypted SSDs, offers his 7 TOP tips...

Top 3 data security threats
Roman Foeckl, CEO and founder of CoSoSys, offers his insights on how to mitigate threats through a sound data security plan...

Navigating the forest of security certifications
Patrick Warley, global head of research & development at Integral Memory, delivers his insights into the level of quality reassurance provided by the many security certification offerings now 'out there'...

So far, so good...
In our last issue, we highlighted the likely threats that will hit organisations across the UK in the 12 months of 2015. In this follow-up, more industry experts share their insights and concerns as the year unfolds...

Technologies to keep you safe
With attacks increasing in frequency and sophistication, which are the technologies that can best protect your organisation? Global analyst Gartner offers some insights....

Massive Attacks - We're Still in Denial
The enterprise perimeter does not exist anymore - and a much more proactive approach to security is needed, says Bill Strain, CTO of cloud company iomart....

Enough to make your pulse soar
Imagine this scenario: Monitoring programmers' pulses, their eye movements and even anxiety levels to detect when they could be in trouble. Even ‘Big Brother’ might have baulked at that! But it may soon be a reality....

Taking the next step up
The industry needs to move towards a more holistic view of information and systems, argues Dr Anand Narasimhan, director, Sims Lifecycle Services EU...

Security’s second chance
By Terry Greer-King, Director of Cyber Security, Cisco....

‘Advanced threat detection is more than a moment in time’
By Sean Newman, Security Strategist, Sourcefire, now part of Cisco....

Computing Security Awards 2016
Excellence shines through...


Anti Spam Solution of the Year - Computing Security Awards 2016
WINNER: LibraESVA - LibraESVA...

Anti Malware Solution of the Year - Computing Security Awards 2016
WINNER: Malwarebytes - Endpoint Security ...

Auditing / Reporting Solution of the Year - Computing Security Awards 2016
WINNER: Varonis - DatAdvantage ...

Content Security Solution of the Year - Computing Security Awards 2016
WINNER: Titania - Nipper Studio ...

Network Security Solution of the Year - Computing Security Awards 2016
WINNER: Redscan - ThreatDetect ...

Encryption Solution of the Year - Computing Security Awards 2016
WINNER: WinMagic - SecureDoc Cloud VM ...

DLP Solution of the Year - Computing Security Awards 2016
WINNER: GhangorCloud - Information Security Enforcer ...

Mobile Security Solution of the Year - Computing Security Awards 2016
WINNER: Wandera - Secure Mobile Gateway ...

Identity and Access Management Solution of the Year - Computing Security Awards 2016
WINNER: Wallix - AdminBastion ...

Anti Phishing Solution of the Year - Computing Security Awards 2016
WINNER: SpearSec - SpearSec ...

Network Access Control Solution of the Year - Computing Security Awards 2016
WINNER: F5 Networks - Access Policy Manager ...

Cloud Security Solution of the Year - Computing Security Awards 2016
WINNER: Egress Software Technologies - Egress Switch ...

Advanced Persistent Threat (APT) Solution of the Year - Computing Security Awards 2016
WINNER: WatchGuard - APT Blocker ...

Secure Data Erasure Company of the Year - Computing Security Awards 2016
WINNER: Sims Recycling Solutions...

Security Recruitment Company of the Year - Computing Security Awards 2016
WINNER: Evolution Recruitment Solutions ...

IoT Threat Mitigation Award - Computing Security Awards 2016
WINNER: ForeScout - CounterACT ...

Fraud Prevention Award - Which organisation has done the most to prevent fraud? - Computing Securit
WINNER: RSA...

The Human Factor Award - Computing Security Awards 2016
WINNER: iStorage - datAshur Pro...

Education and Training Provider of the Year - Computing Security Awards 2016
WINNER: ZeroDayLab...

Major National Security Agency Protects Sensitive Data with GhangorCloud
GhangorCloud’s customer, a modern sophisticated National Security Agency in a leading South East Asian country has recently commissioned a state of the art National Cyber Coordination & Command Center – herein referred to as “The Cyber Security Agency (CSA)”...


Racing certainty
To combat the latest security threats and accelerate its security posture throughout the 2016 Formula One season, F1 giant Williams has teamed up with Symantec....

Sparkling outcome!
A solution from Libraesva is enabling private wine house Casa Vinicola Zonin to protect the 250 mailboxes of its internal users, while allowing it to recoup its investment cost...

Game on!
Games Workshop found that the value of its electronic communications was being severely eroded by a deluge of spam, phishing emails and other unwanted messages. Now its chosen solution means spam is all but eliminated and ‘false positives’ are near to zero. Here’s how it was achieved ...

Complying with current and potential future changes to EU Data Protection Law when disposing of ICT
This paper reviews one critical area of data protection, ICT disposal, looks at the likely impact of the new laws and offers some vital guidance...


Managing End of Life Risk For Solid State Devices (SSD)
Devices that use SSD face many challenges when they reach their end of life, especially around meeting data protection requirements. This white paper provides expert insights on how to get this right...

Forensic Analysis of Factory Reset Function as a permissible means of sanitising data on smartphone
This paper examines the assertion that the factory reset function as specified and supported by BlackBerry, Apple and Android (HTC/Samsung) erases data such that a threat actor function at risk level 1/2 is unable to recover any data...

Meeting European Data Protection and Security Requirements with CipherCloud Solutions
This white paper investigates how encryption and tokenisation of data can help companies that are subject both to EU data protection and general security laws to adopt cloud-based solutions and remain in legal compliance...

How to avoid a tangled Web
Web 2.0 aids enterprises in conducting business, but also introduces many damaging risks. Trend Micro offers its insights into Web application vulnerabilities and how to avoid these...

'2014: The Danger Deepens'
Neustar has released its 'Annual United Kingdom DDoS Attacks & Impact Report'. What were the experiences of those surveyed in 2013? The results suggest a more unstable and complex landscape...

Inside the criminal mind
Infoblox has launched a whitepaper that takes a sideways look at DNS security from the perspective of a cybercriminal...

AIIM survey into digital signatures
"Digital Signatures - making the business case" ...

Secure Mobile Workflows
The majority of employees now demand their choice of apps, collaboration spaces, and cloud storage. Each personalized, consumer-grade workspace enables productive collaboration: employees can efficiently navigate around their workdays and a host of smartphones and tablets. ...

'Surely Not' - The Surprising Weakness Of Strong Authentication Technologies
Dr Basil Philipsz outlines vulnerabilities in current Authentication Technologies and explains how his company, Distributed Management Systems Ltd (DMS), has developed a new innovative solution, CASQUE SNR (CASQUE) that is immune from such flaws. ...

Password Protected: A Survey on Two-Factor Authentication
...

Cloud-based services: Easing the IT burden while taking control
The potential benefits of employing cloud-based services, either in place of existing IT resources or alongside them, are undoubtedly significant. This white paper examines some of the benefits for IT administrators when their applications or services are moved to or managed via the cloud....