Home Articles News Issues eNewsletters Subscribe Media Info Contact More
Untitled Document
Beyond The Nightmare
Governance, risk and compliance are vitally important, especially as more and more legislation is introduced that could have grave consequences for any enterprise that flouts its rules...


Outgunning the criminal mind
The role and importance of digital forensics are being driven by changes in the technology available - and product development is a direct response to this market pressure, says one expert...

Mirror, mirror, on the wall
Many organisations turn to managed security services providers - MSSPs - to deliver the expertise, knowledge and infrastructure they need to secure them from Internet attacks. But how well do they live up to their image?...

The right train of thought
IT security training could not be more essential. But what should the practices and policies be that underscore this? Who should be responsible for making the decisions relating to that training and how exactly should employees be monitored?...

Under siege - in your own car
With today's connected vehicle technologies, the risk of potential cyber security threats is vast – and growing – with cars already forced off the road. What can be done to safeguard these systems and drivers?...

Sealing up the leaks
What does a successful data protection strategy look like in the face of eroding security perimeters, increasing targeted attacks, and evolving user habits and expectations?...

Life after the EU
Britain is to leave the EU - the votes were cast and the deed is done. But what is this likely to mean for our industry? Computing Security has been finding out ...

After the flood
With mobile devices now seemingly everywhere, and more and more applications pouring into the market, mobile monitoring and device management have never been so vital...

Managing email security
Businesses place heavy reliance on email - making it a prime target for hackers. But can any single system lock them out?...

Encryption to amaze
Truly effective encryption that actually protects data wherever it may reside is an absolute must for any business or organisation dealing with sensitive data...

At your disposal
Suffering from Regulation fatigue? Now is the time to take on board the benefits of the new GDPR regulations and the payback they can bring to your business....

Upping the ante with anti-malware
Combating malware means going way beyond locating suspicious programs on servers and workstations, and detecting and interfering with the use of malware on the network...

The Gold Rush is On!
Cyber attacks are costing businesses hundreds of billions annually. With the strongest defence being a skilled and experienced cybersecurity team, lucrative careers are beckoning...

The human factor
The barriers that keep any organisation safe from attack are often guarded by nothing more than a single factor of authentication. Just one weakness and the whole business can be breached....

Land of opportunity - and potential catastrophe
The massive benefits that IOT can deliver in what has now become a hyper-connected society must be set against the countless risks posed each day by Cyberattacks...

Be wary of wearables
Wearables are the latest big innovation for the mobile devices market. But they bring substantial security threats with them...

The Smoking Gun
Encryption is vital for protecting precious data. But, in the wrong hands, it can be a weapon that is turned upon its owner - with devastating consequences...

CODE RED! An essential guide to protecting your data
How should organisations minimise the likelihood that unauthorised code is able to manipulate applications, in order to access, steal, modify or delete sensitive data? Computing Security investigates...

The Smoking Gun
Encryption is vital for protecting precious data. But, in the wrong hands, it can be a weapon that is turned upon its owner - with devastating consequences...

The Exploitation Game
What steps can be taken to detect and block exploits as soon as they attempt to use software vulnerabilities? And how can businesses get a clear understanding of the behaviour of legitimate software components?...

Varonis DatAdvantage
Unstructured data is growing at such an alarming rate that organisations must implement a data access governance strategy to ensure its security and integrity...


GhangorCloud Information Security Enforcer
Security breaches relating to IT now have such serious consequences that enterprises must protect to survive...

SecurEnvoy SecurAccess 8
Two factor authentication (2FA) is the only way forward for security-savvy businesses, as standard username and password combinations are now dangerously insecure...

Malwarebytes Breach Remediation
Enterprises can never let their guard down in the fight against malware...

Malwarebytes Anti-Exploit for Business
According to many different statistics, most exploit attacks happen against known vulnerabilities...

The CryptoFlow App from Certes Networks
Certes Networks has an enviable reputation in the data security world...

Lepide Auditor Suite 15.2
Change auditing is an essential requirement for enterprises, helping them to comply with ever tougher data protection regulations...

Thycotic Secret Server
Privileged account credentials are the number one target for today's cyber criminals, as they provide easy access to the very heart of a business's IT infrastructure...

Titania PAWS Studio 2.4.4
SMBs that want to show compliance with data protection regulations will like Titania's PAWS Studio a lot...

Integral Memory Crypto SSD
It beggars belief that, even with all the publicity surrounding data protection, hardly a week goes by without us hearing about yet another government department or business losing sensitive or personal data...

macmon NAC
Network access control has traditionally had a mixed reception in enterprises, as all too many solutions are notoriously difficult to install, complex to manage and expensive...

Titania TEC
UK-based Titania has a sharp focus on data security compliance and its latest TEC aims to make regulatory auditing on all network devices a breeze...

Acunetix Online Vulnerability Scanner
In today's competitive global markets, SMBs need to protect their web sites from hackers just as much as enterprises do, but few have the financial resources to ensure they are totally secure...

Libra ESVA 3.5 Review
Based in Italy, Libra scores over the big names in the anti-spam market as its ESVA (email security virtual appliance) offers tough messaging security at a very affordable price. Ideally suited to enterprises and SMBs alike, ESVA employs a 13-step filtering process and claims a near-perfect spam detection rate...

Gemalto SafeNet ProtectV 2.0
The cost benefits alone make moving virtualised data centres into the cloud a no-brainer, but concerns about security are still a major stumbling block...

8MAN: from protected-networks.com
A fundamental requirement for meeting compliance regulations is Active Directory (AD) auditing, but many businesses still do not have the tools in place to achieve this effectively...

The CR35iNG security appliance from Cyberoam
Cyberoam's latest NG Series of security appliances set themselves apart from the competition, as they deliver the best price/performance ratio...

Celestix Networks HOTPin v3.7
The exponential growth of mobile workforces is making businesses rethink their security strategy for remote access, as simple usernames and passwords are not enough...

GFI WirelessSentry
GFI's WirelessSentry (WiSe) takes the expense out of wireless network monitoring by uniquely offering it as a cloud service...

CenterTools DriveLock File Protection
Businesses dealing with sensitive or confidential information must take steps to protect it...

The Data Breach Blindspot
How do you control data breaches that threat systems miss (or take too long to find)? Here, Adam Boone, chief marketing officer at Certes Networks, offers his insights...


Fighting back against malware
How do you best protect your systems from malware infiltration and infection? Malwarebytes offers some expert insights and advice to help ward off the attackers...

Understanding the differences between antivirus and anti-malware
Seeking the best way to reducing your attack surface? First, you need to understand the differences between antivirus security and anti-malware security, says internet security company Malwarebytes...

Protecting applications from Firewall failure
How to protect applications, in the context of changing network access and a porous perimeter - Certes Networks provides the strategy...

PSN-compliant mobile working
A PSN-compliant mobile working solution offers tangible benefits, but it is critical to enter into the process with a robust strategy, cautions Tim Ager of Celestix ...

In pursuit of radical change
Tim Ager of Celestix has been working closely with local and regional government organisations to support their transformational government objectives. Here, he offers a taster from behind the scenes...

Security? It's in Microsoft's DNA!
While many rue what they see as the disappearance of Microsoft from the security business, Tim Ager argues the software giant has never been more committed to the cause...

Cyber-risk insurance: right for you?
The increasing popularity of cyber insurance policies indicates many companies feel they have lost the fight to protect their boundaries and are now looking for a new approach, says Tim Ager, Celestix...

Can cyber-risk insurance really keep you safe?
Cyber-risk insurance policies are growing in popularity with the business community, but there’s a danger that they can encourage complacency. Tim Ager offers his thoughts...

Why Windows 8 is so gr8!
Tim Ager says the demise of Windows xp is no cause for lamentation - Windows 8 has so much to offer...

2014: Into The Unknown
We need to keep evolving ways in which to authenticate our trusted users, if we are to stay ahead of the game, says Tim Ager ...

Managing The Risks
Risk-based authentication is now making its presence felt. Tim Ager of Celestix explains why and what it is all about...

Key factors in a mobile world
As mobile device management becomes an ever greater challenge, its convergence with two-factor authentication is one significant outcome ...

Key factors in a mobile world
As mobile device management becomes an ever greater challenge, its convergence with two-factor authentication is one significant outcome ...

Clear Thinking In A Clouded World
In his latest masterclass, celestix CEO tim ager explains How to deploy two-factor authentication successfully in a cloud-centric architecture ...

Embracing The Two-Factor Factor
Can you really increase security and reduce cost with two-factor authentication?...

In Safe Hands
"Look closer to home, if you want to take the greatest steps to safeguard your organisation in 2013"...

Security Class
This Security Class series is in association with ActivIdentity. In this edition we examine the challenges to be met in securing mobility...

We are 'out' – where to now?
The voting is over, the die is cast. We are out of the EU and unlikely to return, despite all the protests from 'Remain' and calls for a second vote...


Turning the cyber tide
At a time when too many enterprises are succumbing to cyber attacks and breaches that often leave their businesses badly damaged, even devastated, the need for every organisation to take personal responsibility and put its house in order has never loomed so large...

Why the attackers are winning the war
As we wend our way through the early part of 2016, thoughts inevitably turn to the threat landscape and that niggling worry in the back of the mind: "Will my business stay safe this year?"...

‘Anonymity’ software leaks users’ details
It's alarming to hear that the services used by hundreds of thousands of people – legitimately to protect their identity on the web – have been found vulnerable to leaks...

GDPR - coming, ready or not!
According to a new survey by iStorage, almost a third of public and private sector professionals are not aware of what the forthcoming EU General Data Protection Regulation (GDPR) will mean to them or their organisations...

Fears and deaf ears
Would you consider stripping your employees of company smart phones and memory sticks to protect your business from cyber attacks?...

Anthem for cyber victims
Following the recent Anthem breach – where the USA's second largest health insurer was hacked, exposing personal details including the social security numbers of tens of millions of customers and employees – it seems cyber criminals have now been taking advantage of the public's concern and using phishing scams in an attempt to steal financial and personal information...

'Tails' of the unexpected?
No new year can ever come along without a wealth of security predictions already hanging on tenaciously to its young coat-tails...

KGB, Stasi... and now the UK government?
A research report published by F-Secure shows the growing concern of the British public with mass surveillance being undertaken by the British government on its own people, as well as foreign nationals...

Sigh... sigh...Cyber: Paying the price
Economic espionage and cybercrime can severely jeopardise Internet stability and global online commerce...

Urgent need to boost cyber skills
Businesses must do far more to tackle cybercrime, which is threatening to spiral out of control - and new government plans to boost cyber skills looks like a great opportunity to do so...

Battling A Global Threat
The global energy sector is amongst many commercial interests that are becoming increasingly vulnerable to cyber attacks and hacking...

Don't let it all end in floods of tears
Water has been constantly in the headlines of late, infiltrating communities on a massive scale and leaving a trail of destruction in its wake...

Inside 2014
Ask those in the know what will be the hot topics for security in 2014 and there is no shortage of response. ...

Massive strides forward
If there is one thing that the 2013 Computing Security Awards demonstrated above all else, it's the fact that the industry is moving in the right direction ...

Data Breaches - Time To Come Clean
The day that telecoms operators and internet service providers (ISPs) across Europe must have dreaded has finally arrived...

Anxious times signal need for action
The Intelligence and Security Committee (ISC) of Parliament has just published its Annual Report for 2012-2013 and it makes for intriguing - and often disturbing - reading...

Don't Let Cybercrime Pay!
Cybercrime is all the rage, it seems. No matter how high the defences we stack up against it, the more the cybercriminals come back to the barricades to carry out another frenzied assault. And the reason isn't hard to see: there are lots of easy victims out there to target, most of whom have a scant appreciation of what good security really is. Oh, and another thing - this type of crime really does pay!...

Auditory Senses
With the consumerisation of technology, including the surge in 'Bring Your Own Device' (BYOD), the mission of making it all hang together facing many businesses - and auditors, too - has taken on a nightmarish edge...

IT managers fight data breach onslaught
WinMagic, the intelligent key management and data security company, has released survey data in which IT managers say they thwart an attempted data breach at least once a month...


Cyber attacks on rail network
The UK rail network has been compromised by cyber criminals at least four times in the past 12 months...

Massive increase in loss of key data
Three out of every four organisations have been hit by the loss or theft of important data over the past two years, a sharp increase since 2014, according to a new survey of more than 3,000 employees and IT practitioners across the US and Europe...

Female techie boosts cyber security team
First -class honours security engineering graduate Preena Patel has joined Equilibrium Security - and becomes the latest of three graduates to join its security engineering team in the last 12 months...

A fifth of UK businesses do not understand data protection requirements, reveals Delphix
European survey reveals lack of understanding about data protection requirements despite access to secure data accelerating IT projects ...

New Cyber Star security initiative
A North East training manager has been spearheading a national campaign to get firms to protect their IT systems and be amongst the most security-conscious firms in the UK with the launch of a new training programme designed to protect businesses of all shapes and sizes from the real threat of cybercrime...

DataNow 4.0 'speeds Windows 10 migrations'
AppSense has released DataNow 4.0, the latest version of the company's secure file sync and migration solution...

GDPR - what's next, post-brexit?
Confusion reigns among UK businesses around data protection requirements, according to data virtualisation software company Delphix...

IT security preparedness is now on the up and up
A new survey from SolarWinds has highlighted significant improvements in IT security preparedness and effectiveness among UK organisations, including steps the most successful IT departments have taken to improve their security posture...

Instagram shows weaknesses
News that a young bounty hunter recently discovered a security vulnerability in Instagram that allowed him to delete account information has prompted swift reaction...

Linkedin secure after acquisition?
With the news that Microsoft has acquired LinkedIn in a deal worth US$26.2 billion, the software giant believes the acquisition will expand the market for both company's products...

The Time has come for bigger shared solutions
BCS, the Chartered Institute for IT, has welcomed the 'Cyber Security: Protection of Personal Data Online' report, published by the Culture, Media and Sport Committee...

Web apps highly vulnerable, according to whitehat report
The majority of web applications exhibit, on average, two or more serious vulnerabilities per application for every industry at any given point in time...

Security bosses boost IAM spend
Results of a new study show European CIOs, CISOs and IT security managers are looking at consumer identities, improving customer experience and operational efficiencies as part of their planning...

Stepping up Cybersecurity plans
Britain's manufacturers are being urged to step up their planning to counter the increasing number of cyber security threats as part of their efforts to be ready for the '4th industrial revolution'...

Forgotten vulnerabilities still pose a serious threat
The recent Microsoft Security Intelligence Report (SIR) that showed malware infection attempts are increasing has prompted this response from Gavin Millard, technical director EMEA of Tenable Network Security...

NATO adds cyberspace as a new frontier for war
NATO is now officially recognising cyberspace as a frontier for war, in addition to the traditional sites of battle, including land and sea...

FICO to offer “Enterprise Security Score” for organisations
Analytic software firm FICO is developing a FICO Enterprise Security Score, which will rank an organisation’s level of cybersecurity risk. To further this effort, FICO has acquired QuadMetrics, an innovative cyber risk security scoring company based in Michigan. ...

Are consumers getting the message when it comes to combating identity fraud?
New online research has revealed a lack of awareness among adults of where to go for advice on protecting themselves online, or where they should turn to if they become a victim of fraud. ...

Compromised credentials
What is still the biggest cause of all data breaches? Compromised credentials, claims a new report...

Q&A
Computing Security recently interviewed Dr Anand Narasimhan, managing director, Sims Recycling Solutions, EU & India, to garner his thoughts on asset management and disposal...


Cyber Security must be a C-Suite Priority
Adam Boone, Chief Marketing Officer, Certes Networks, insists it is time to make cyber security a priority for every C-suite....

The fraud bonanza
The annual cost of fraud in the UK could be as high as £193bn a year – way above the government's £50bn figure...

It's showtime!
It's all going to be there at Infosecurity Europe 2016-everything you need to know about information security ...

No more password buck-passing!
Do weak passwords keep you awake at night? David Hald of SMS PASSCODE and Dan Evans of VCW Security explain just why they should, in a follow-up to our feature last issue...

Gateway to safety
Rarely does a single cloud have the silver lining of offering all the applications that enterprise I.T. needs to deliver... enter Identity and Access Management...

Race against time
Leading privacy lawyer Lokke Moerel offers her thoughts on the challenges behind the EU's data protection laws...

Tackling data centre challenges
Multinational corporations are coming under increased pressure to develop consistent global asset management and disposal policies and procedures, as Dr Anand Narasimhan, managing director, Asset Recovery Services EU & India, Sims Recycling Solutions, explains...

Macro Malware: An Unexpected Return
The re-emergence of macro malware after more than 10 years, when it seemed to have died out, does not augur well, warns CYREN...

The Changing Compliance Landscape: Going Circular
By Anand Narasimhan, director UK, EU & NI, Sims Recycling Solutions...

Tipping the balance!
How do you best manage the upwardly mobile workforce? Patrick Warley, Global Head of Research & Development, Integral Memory, manufacturers of the Crypto range of hardware encrypted SSDs, offers his 7 TOP tips...

Top 3 data security threats
Roman Foeckl, CEO and founder of CoSoSys, offers his insights on how to mitigate threats through a sound data security plan...

Navigating the forest of security certifications
Patrick Warley, global head of research & development at Integral Memory, delivers his insights into the level of quality reassurance provided by the many security certification offerings now 'out there'...

So far, so good...
In our last issue, we highlighted the likely threats that will hit organisations across the UK in the 12 months of 2015. In this follow-up, more industry experts share their insights and concerns as the year unfolds...

Technologies to keep you safe
With attacks increasing in frequency and sophistication, which are the technologies that can best protect your organisation? Global analyst Gartner offers some insights....

Massive Attacks - We're Still in Denial
The enterprise perimeter does not exist anymore - and a much more proactive approach to security is needed, says Bill Strain, CTO of cloud company iomart....

Enough to make your pulse soar
Imagine this scenario: Monitoring programmers' pulses, their eye movements and even anxiety levels to detect when they could be in trouble. Even ‘Big Brother’ might have baulked at that! But it may soon be a reality....

Taking the next step up
The industry needs to move towards a more holistic view of information and systems, argues Dr Anand Narasimhan, director, Sims Lifecycle Services EU...

Security’s second chance
By Terry Greer-King, Director of Cyber Security, Cisco....

‘Advanced threat detection is more than a moment in time’
By Sean Newman, Security Strategist, Sourcefire, now part of Cisco....

Computing Security Awards 2015
Excellence Shines Through...


Anti Spam Solution of the Year – Computing Security 2015
WINNER: Libra ESVA - Libra ESVA ...

Anti Malware Solution of the Year – Computing Security 2015
WINNER: ThreatTrack - VIPRE ...

Content Security Solution of the Year – Computing Security 2015
WINNER: FuseMail - WebSMART...

Network Security Solution of the Year – Computing Security 2015
WINNER: Titania - Nipper Studio ...

Encryption Solution of the Year – Computing Security 2015
WINNER: Integral Memory - Crypto SSD ...

DLP Solution of the Year – Computing Security 2015
WINNER: CoSoSys - EndPoint Protector 4 ...

Mobile Security Solution of the Year – Computing Security 2015
WINNER: Good Technology - Good Work ...

Identity and Access Management Solution of the Year – Computing Security 2015
WINNER: ForgeRock - Open AM...

Auditing / Reporting Solution of the Year – Computing Security 2015
WINNER: Fortinet - FortiAnalyzer...

Network Access Control Solution of the Year – Computing Security 2015
WINNER: macmon - macmon NAC ...

Cloud Security Solution of the Year – Computing Security 2015
WINNER: Egress - Egress Switch...

Messaging Security Solution of the Year – Computing Security 2015
WINNER: GFI Software - GFI MailEssentials ...

Advanced Persistent Threat (APT) Solution of the Year – Computing Security 2015
WINNER: AlienVault - Unifed Security Management ...

Secure Data Erasure Company of the Year – Computing Security 2015
WINNER: Sims Recycling Solutions ...

Security Recruitment Company of the Year – Computing Security 2015
WINNER: Evolution Recruitment Solutions ...

Fraud Prevention Award – Computing Security 2015
WINNER: RSA...

Security Service Provider of the Year – Computing Security 2015
WINNER: ZeroDayLab...

SME Security Solution of the Year – Computing Security 2015
WINNER: WatchGuard - M300...

Enterprise Security Solution of the Year – Computing Security 2015
WINNER: Darktrace - Enterprise Immune System ...

Racing certainty
To combat the latest security threats and accelerate its security posture throughout the 2016 Formula One season, F1 giant Williams has teamed up with Symantec....


Sparkling outcome!
A solution from Libraesva is enabling private wine house Casa Vinicola Zonin to protect the 250 mailboxes of its internal users, while allowing it to recoup its investment cost...

Game on!
Games Workshop found that the value of its electronic communications was being severely eroded by a deluge of spam, phishing emails and other unwanted messages. Now its chosen solution means spam is all but eliminated and ‘false positives’ are near to zero. Here’s how it was achieved ...

Complying with current and potential future changes to EU Data Protection Law when disposing of ICT
This paper reviews one critical area of data protection, ICT disposal, looks at the likely impact of the new laws and offers some vital guidance...


Managing End of Life Risk For Solid State Devices (SSD)
Devices that use SSD face many challenges when they reach their end of life, especially around meeting data protection requirements. This white paper provides expert insights on how to get this right...

Forensic Analysis of Factory Reset Function as a permissible means of sanitising data on smartphone
This paper examines the assertion that the factory reset function as specified and supported by BlackBerry, Apple and Android (HTC/Samsung) erases data such that a threat actor function at risk level 1/2 is unable to recover any data...

Meeting European Data Protection and Security Requirements with CipherCloud Solutions
This white paper investigates how encryption and tokenisation of data can help companies that are subject both to EU data protection and general security laws to adopt cloud-based solutions and remain in legal compliance...

How to avoid a tangled Web
Web 2.0 aids enterprises in conducting business, but also introduces many damaging risks. Trend Micro offers its insights into Web application vulnerabilities and how to avoid these...

'2014: The Danger Deepens'
Neustar has released its 'Annual United Kingdom DDoS Attacks & Impact Report'. What were the experiences of those surveyed in 2013? The results suggest a more unstable and complex landscape...

Inside the criminal mind
Infoblox has launched a whitepaper that takes a sideways look at DNS security from the perspective of a cybercriminal...

AIIM survey into digital signatures
"Digital Signatures - making the business case" ...

Secure Mobile Workflows
The majority of employees now demand their choice of apps, collaboration spaces, and cloud storage. Each personalized, consumer-grade workspace enables productive collaboration: employees can efficiently navigate around their workdays and a host of smartphones and tablets. ...

'Surely Not' - The Surprising Weakness Of Strong Authentication Technologies
Dr Basil Philipsz outlines vulnerabilities in current Authentication Technologies and explains how his company, Distributed Management Systems Ltd (DMS), has developed a new innovative solution, CASQUE SNR (CASQUE) that is immune from such flaws. ...

Password Protected: A Survey on Two-Factor Authentication
...

Cloud-based services: Easing the IT burden while taking control
The potential benefits of employing cloud-based services, either in place of existing IT resources or alongside them, are undoubtedly significant. This white paper examines some of the benefits for IT administrators when their applications or services are moved to or managed via the cloud....