Home Articles News Issues eNewsletters Subscribe Media Info Contact More
Untitled Document
Prevention: better than any cure
They are vicious and pernicious. So what steps can be taken to detect and block exploits as soon as they attempt to use software vulnerabilities? We ask the experts...


Beyond the nightmare
Governance, risk and compliance are vitally important, especially as more and more legislation is introduced that could have grave consequences for any enterprise that flouts its rules...

Outgunning the criminal mind
The role and importance of digital forensics are being driven by changes in the technology available - and product development is a direct response to this market pressure, says one expert...

Mirror, mirror, on the wall
Many organisations turn to managed security services providers - MSSPs - to deliver the expertise, knowledge and infrastructure they need to secure them from Internet attacks. But how well do they live up to their image?...

The right train of thought
IT security training could not be more essential. But what should the practices and policies be that underscore this? Who should be responsible for making the decisions relating to that training and how exactly should employees be monitored?...

Not all is what it SIEMs
how do you justify the cost of investing in Security Information and Event Management - SIEM - to those who control the purse strings within your organisation? Computing Security finds out by talking to those in the know....

The Cyber Imposters
An email arrives at work from someone you know well. But is it from that person? Has it been forged? Targeted attacks come in many guises. How do you combat such threats?...

Under siege - in your own car
With today's connected vehicle technologies, the risk of potential cyber security threats is vast – and growing – with cars already forced off the road. What can be done to safeguard these systems and drivers?...

Sealing up the leaks
What does a successful data protection strategy look like in the face of eroding security perimeters, increasing targeted attacks, and evolving user habits and expectations?...

Life after the EU
Britain is to leave the EU - the votes were cast and the deed is done. But what is this likely to mean for our industry? Computing Security has been finding out ...

After the flood
With mobile devices now seemingly everywhere, and more and more applications pouring into the market, mobile monitoring and device management have never been so vital...

Managing email security
Businesses place heavy reliance on email - making it a prime target for hackers. But can any single system lock them out?...

Encryption to amaze
Truly effective encryption that actually protects data wherever it may reside is an absolute must for any business or organisation dealing with sensitive data...

At your disposal
Suffering from Regulation fatigue? Now is the time to take on board the benefits of the new GDPR regulations and the payback they can bring to your business....

Upping the ante with anti-malware
Combating malware means going way beyond locating suspicious programs on servers and workstations, and detecting and interfering with the use of malware on the network...

The Gold Rush is On!
Cyber attacks are costing businesses hundreds of billions annually. With the strongest defence being a skilled and experienced cybersecurity team, lucrative careers are beckoning...

The human factor
The barriers that keep any organisation safe from attack are often guarded by nothing more than a single factor of authentication. Just one weakness and the whole business can be breached....

Land of opportunity - and potential catastrophe
The massive benefits that IOT can deliver in what has now become a hyper-connected society must be set against the countless risks posed each day by Cyberattacks...

Be wary of wearables
Wearables are the latest big innovation for the mobile devices market. But they bring substantial security threats with them...

The Smoking Gun
Encryption is vital for protecting precious data. But, in the wrong hands, it can be a weapon that is turned upon its owner - with devastating consequences...

Ixia ThreatARMOR
The amount and sophistication of cyber-attacks is increasing exponentially and many enterprises are finding their security systems are wilting under the pressure...


Phishing mitigation from SpearSec
Phishing comes in a variety of forms and, just like the best Saville Row suits, it is made to measure...

Varonis DatAdvantage
Unstructured data is growing at such an alarming rate that organisations must implement a data access governance strategy to ensure its security and integrity...

GhangorCloud Information Security Enforcer
Security breaches relating to IT now have such serious consequences that enterprises must protect to survive...

SecurEnvoy SecurAccess 8
Two factor authentication (2FA) is the only way forward for security-savvy businesses, as standard username and password combinations are now dangerously insecure...

Malwarebytes Breach Remediation
Enterprises can never let their guard down in the fight against malware...

Malwarebytes Anti-Exploit for Business
According to many different statistics, most exploit attacks happen against known vulnerabilities...

The CryptoFlow App from Certes Networks
Certes Networks has an enviable reputation in the data security world...

Lepide Auditor Suite 15.2
Change auditing is an essential requirement for enterprises, helping them to comply with ever tougher data protection regulations...

Thycotic Secret Server
Privileged account credentials are the number one target for today's cyber criminals, as they provide easy access to the very heart of a business's IT infrastructure...

Titania PAWS Studio 2.4.4
SMBs that want to show compliance with data protection regulations will like Titania's PAWS Studio a lot...

Embrace a digital future!
Cyber Security Europe is returning to the ExCel London for the second year running in October this year — and promises to be even bigger and better...

Integral Memory Crypto SSD
It beggars belief that, even with all the publicity surrounding data protection, hardly a week goes by without us hearing about yet another government department or business losing sensitive or personal data...

macmon NAC
Network access control has traditionally had a mixed reception in enterprises, as all too many solutions are notoriously difficult to install, complex to manage and expensive...

Titania TEC
UK-based Titania has a sharp focus on data security compliance and its latest TEC aims to make regulatory auditing on all network devices a breeze...

Acunetix Online Vulnerability Scanner
In today's competitive global markets, SMBs need to protect their web sites from hackers just as much as enterprises do, but few have the financial resources to ensure they are totally secure...

Libra ESVA 3.5 Review
Based in Italy, Libra scores over the big names in the anti-spam market as its ESVA (email security virtual appliance) offers tough messaging security at a very affordable price. Ideally suited to enterprises and SMBs alike, ESVA employs a 13-step filtering process and claims a near-perfect spam detection rate...

Gemalto SafeNet ProtectV 2.0
The cost benefits alone make moving virtualised data centres into the cloud a no-brainer, but concerns about security are still a major stumbling block...

8MAN: from protected-networks.com
A fundamental requirement for meeting compliance regulations is Active Directory (AD) auditing, but many businesses still do not have the tools in place to achieve this effectively...

The CR35iNG security appliance from Cyberoam
Cyberoam's latest NG Series of security appliances set themselves apart from the competition, as they deliver the best price/performance ratio...

The Data Breach Blindspot
How do you control data breaches that threat systems miss (or take too long to find)? Here, Adam Boone, chief marketing officer at Certes Networks, offers his insights...


Fighting back against malware
How do you best protect your systems from malware infiltration and infection? Malwarebytes offers some expert insights and advice to help ward off the attackers...

Understanding the differences between antivirus and anti-malware
Seeking the best way to reducing your attack surface? First, you need to understand the differences between antivirus security and anti-malware security, says internet security company Malwarebytes...

Protecting applications from Firewall failure
How to protect applications, in the context of changing network access and a porous perimeter - Certes Networks provides the strategy...

PSN-compliant mobile working
A PSN-compliant mobile working solution offers tangible benefits, but it is critical to enter into the process with a robust strategy, cautions Tim Ager of Celestix ...

In pursuit of radical change
Tim Ager of Celestix has been working closely with local and regional government organisations to support their transformational government objectives. Here, he offers a taster from behind the scenes...

Security? It's in Microsoft's DNA!
While many rue what they see as the disappearance of Microsoft from the security business, Tim Ager argues the software giant has never been more committed to the cause...

Cyber-risk insurance: right for you?
The increasing popularity of cyber insurance policies indicates many companies feel they have lost the fight to protect their boundaries and are now looking for a new approach, says Tim Ager, Celestix...

Can cyber-risk insurance really keep you safe?
Cyber-risk insurance policies are growing in popularity with the business community, but there’s a danger that they can encourage complacency. Tim Ager offers his thoughts...

Why Windows 8 is so gr8!
Tim Ager says the demise of Windows xp is no cause for lamentation - Windows 8 has so much to offer...

2014: Into The Unknown
We need to keep evolving ways in which to authenticate our trusted users, if we are to stay ahead of the game, says Tim Ager ...

Managing The Risks
Risk-based authentication is now making its presence felt. Tim Ager of Celestix explains why and what it is all about...

Key factors in a mobile world
As mobile device management becomes an ever greater challenge, its convergence with two-factor authentication is one significant outcome ...

Key factors in a mobile world
As mobile device management becomes an ever greater challenge, its convergence with two-factor authentication is one significant outcome ...

Clear Thinking In A Clouded World
In his latest masterclass, celestix CEO tim ager explains How to deploy two-factor authentication successfully in a cloud-centric architecture ...

Embracing The Two-Factor Factor
Can you really increase security and reduce cost with two-factor authentication?...

In Safe Hands
"Look closer to home, if you want to take the greatest steps to safeguard your organisation in 2013"...

Security Class
This Security Class series is in association with ActivIdentity. In this edition we examine the challenges to be met in securing mobility...

The ‘dark web’ – and then there’s Brown
The dark web is regarded as a breeding ground for crime - a secretive and murky part of the world wide web that requires special software to gain entry...


The Big Hit
The loss or theft of important data over the past two years has been on a staggering scale...

We are 'out' – where to now?
The voting is over, the die is cast. We are out of the EU and unlikely to return, despite all the protests from 'Remain' and calls for a second vote...

Turning the cyber tide
At a time when too many enterprises are succumbing to cyber attacks and breaches that often leave their businesses badly damaged, even devastated, the need for every organisation to take personal responsibility and put its house in order has never loomed so large...

Why the attackers are winning the war
As we wend our way through the early part of 2016, thoughts inevitably turn to the threat landscape and that niggling worry in the back of the mind: "Will my business stay safe this year?"...

‘Anonymity’ software leaks users’ details
It's alarming to hear that the services used by hundreds of thousands of people – legitimately to protect their identity on the web – have been found vulnerable to leaks...

GDPR - coming, ready or not!
According to a new survey by iStorage, almost a third of public and private sector professionals are not aware of what the forthcoming EU General Data Protection Regulation (GDPR) will mean to them or their organisations...

Fears and deaf ears
Would you consider stripping your employees of company smart phones and memory sticks to protect your business from cyber attacks?...

Anthem for cyber victims
Following the recent Anthem breach – where the USA's second largest health insurer was hacked, exposing personal details including the social security numbers of tens of millions of customers and employees – it seems cyber criminals have now been taking advantage of the public's concern and using phishing scams in an attempt to steal financial and personal information...

'Tails' of the unexpected?
No new year can ever come along without a wealth of security predictions already hanging on tenaciously to its young coat-tails...

KGB, Stasi... and now the UK government?
A research report published by F-Secure shows the growing concern of the British public with mass surveillance being undertaken by the British government on its own people, as well as foreign nationals...

Sigh... sigh...Cyber: Paying the price
Economic espionage and cybercrime can severely jeopardise Internet stability and global online commerce...

Urgent need to boost cyber skills
Businesses must do far more to tackle cybercrime, which is threatening to spiral out of control - and new government plans to boost cyber skills looks like a great opportunity to do so...

Battling A Global Threat
The global energy sector is amongst many commercial interests that are becoming increasingly vulnerable to cyber attacks and hacking...

Don't let it all end in floods of tears
Water has been constantly in the headlines of late, infiltrating communities on a massive scale and leaving a trail of destruction in its wake...

Inside 2014
Ask those in the know what will be the hot topics for security in 2014 and there is no shortage of response. ...

Massive strides forward
If there is one thing that the 2013 Computing Security Awards demonstrated above all else, it's the fact that the industry is moving in the right direction ...

Data Breaches - Time To Come Clean
The day that telecoms operators and internet service providers (ISPs) across Europe must have dreaded has finally arrived...

Anxious times signal need for action
The Intelligence and Security Committee (ISC) of Parliament has just published its Annual Report for 2012-2013 and it makes for intriguing - and often disturbing - reading...

Don't Let Cybercrime Pay!
Cybercrime is all the rage, it seems. No matter how high the defences we stack up against it, the more the cybercriminals come back to the barricades to carry out another frenzied assault. And the reason isn't hard to see: there are lots of easy victims out there to target, most of whom have a scant appreciation of what good security really is. Oh, and another thing - this type of crime really does pay!...

Braking bad and out of control
Researchers have managed to remotely slam on the brakes of a Tesla Model S from some 12 miles away, pop the trunk and fold in the side mirror, all while the car was moving...


New tranche of cyber funding for royal holloway university
The UK government has announced the renewal of funding for the Centre for Doctoral Training (CDT) in Cyber Security at Royal Holloway, University of London...

IT professionals fight back against their assailants
The received wisdom is that European IT security professionals are being subjected to overbearing pressure from adversaries when it comes to dealing with cybersecurity...

Hacked off by the hackers
An online study reveals that people are most worried about credit cards or bank statements being hacked, with 85% cent in the UK ranking it a top concern, well ahead of the US and Germany (78%)...

Finger on the detection pulse
Physics PhD student Susanna Challinger has recently been awarded an Industrial Fellowship by The Royal Commission of the Exhibition of 1851 to help bring novel fingerprint detection technology to life...

Has your mobile device been attacked lately? No idea!
Mobile users are massively unaware of cyberthreats, with an overwhelming 89% of respondents to a survey admitting they wouldn't know if their device has been infected through a cyber attack...

Employees putting organisations at serious risk
Blue Coat Systems, recently acquired by Symantec, has revealed the results of an online study that suggests organisations are still being exposed to increasingly sophisticated cyber threats posed by social engineering - where personal and work information is gathered, often via social media, and used to deliver advanced threats into networks...

Offerings that go beyond
BeyondTrust has expanded its cloud offerings...

Partnership promises cloud silver lining
Niu Solutions has entered into a strategic partnership with Alert Logic to further enhance its security offering in the cloud...

More attacks unleashed
Akamai Technologies' latest 'State of the Internet/Security Report' (Second Quarter 2016) has highlighted the latest cloud security landscape, specifically trends with DDoS and web application attacks, as well as malicious traffic from bots...

Ransomware? Never heard of it
Latest research from online security firm Trend Micro has revealed that, although a vast majority questioned (82%) of UK organisations consider ransomware a threat, a fifth (20%) of UK IT decision makers are unsure how the malware actually works. A further 11% have never heard of it....

Computing Security Awards 2016 - the winners!
Here are the winners of the 2016 Computing Security awards. We'll have more details available shortly on the awards website. Congratulations again to all of our winners and runners-up, and a big thank you to everyone who took the time to vote. ...

IT managers fight data breach onslaught
WinMagic, the intelligent key management and data security company, has released survey data in which IT managers say they thwart an attempted data breach at least once a month...

Cyber attacks on rail network
The UK rail network has been compromised by cyber criminals at least four times in the past 12 months...

Massive increase in loss of key data
Three out of every four organisations have been hit by the loss or theft of important data over the past two years, a sharp increase since 2014, according to a new survey of more than 3,000 employees and IT practitioners across the US and Europe...

Female techie boosts cyber security team
First -class honours security engineering graduate Preena Patel has joined Equilibrium Security - and becomes the latest of three graduates to join its security engineering team in the last 12 months...

Cybersecurity education finally paying dividends
Palo Alto Networks has released survey results that identify cybersecurity education as finally starting to yield positive results...

UK organisations reject multi-factor authentication
Less than a quarter of UK organisations use multi-factor authentication to protect against compromised credentials, a survey by global IT security vendor IS Decisions has found, with organisations citing "infrastructure complexity" (21%) and "time needed to manage and oversee" (20%) as the biggest barriers to adoption...

Getting the drop on stolen data
A staggering total of 68 million-plus usernames and passwords were seized in one hack. But is this something we no longer find so unusual in these security-challenged times?...

Businesses still one step behind the perpetrators
The world's biggest companies are facing an unprecedented number and variety of digital attacks by ruthless criminal entrepreneurs...

Q&A
Computing Security recently interviewed Dr Anand Narasimhan, managing director, Sims Recycling Solutions, EU & India, to garner his thoughts on asset management and disposal...


Cyber Security must be a C-Suite Priority
Adam Boone, Chief Marketing Officer, Certes Networks, insists it is time to make cyber security a priority for every C-suite....

The fraud bonanza
The annual cost of fraud in the UK could be as high as £193bn a year – way above the government's £50bn figure...

It's showtime!
It's all going to be there at Infosecurity Europe 2016-everything you need to know about information security ...

No more password buck-passing!
Do weak passwords keep you awake at night? David Hald of SMS PASSCODE and Dan Evans of VCW Security explain just why they should, in a follow-up to our feature last issue...

Gateway to safety
Rarely does a single cloud have the silver lining of offering all the applications that enterprise I.T. needs to deliver... enter Identity and Access Management...

Race against time
Leading privacy lawyer Lokke Moerel offers her thoughts on the challenges behind the EU's data protection laws...

Tackling data centre challenges
Multinational corporations are coming under increased pressure to develop consistent global asset management and disposal policies and procedures, as Dr Anand Narasimhan, managing director, Asset Recovery Services EU & India, Sims Recycling Solutions, explains...

Macro Malware: An Unexpected Return
The re-emergence of macro malware after more than 10 years, when it seemed to have died out, does not augur well, warns CYREN...

The Changing Compliance Landscape: Going Circular
By Anand Narasimhan, director UK, EU & NI, Sims Recycling Solutions...

Tipping the balance!
How do you best manage the upwardly mobile workforce? Patrick Warley, Global Head of Research & Development, Integral Memory, manufacturers of the Crypto range of hardware encrypted SSDs, offers his 7 TOP tips...

Top 3 data security threats
Roman Foeckl, CEO and founder of CoSoSys, offers his insights on how to mitigate threats through a sound data security plan...

Navigating the forest of security certifications
Patrick Warley, global head of research & development at Integral Memory, delivers his insights into the level of quality reassurance provided by the many security certification offerings now 'out there'...

So far, so good...
In our last issue, we highlighted the likely threats that will hit organisations across the UK in the 12 months of 2015. In this follow-up, more industry experts share their insights and concerns as the year unfolds...

Technologies to keep you safe
With attacks increasing in frequency and sophistication, which are the technologies that can best protect your organisation? Global analyst Gartner offers some insights....

Massive Attacks - We're Still in Denial
The enterprise perimeter does not exist anymore - and a much more proactive approach to security is needed, says Bill Strain, CTO of cloud company iomart....

Enough to make your pulse soar
Imagine this scenario: Monitoring programmers' pulses, their eye movements and even anxiety levels to detect when they could be in trouble. Even ‘Big Brother’ might have baulked at that! But it may soon be a reality....

Taking the next step up
The industry needs to move towards a more holistic view of information and systems, argues Dr Anand Narasimhan, director, Sims Lifecycle Services EU...

Security’s second chance
By Terry Greer-King, Director of Cyber Security, Cisco....

‘Advanced threat detection is more than a moment in time’
By Sean Newman, Security Strategist, Sourcefire, now part of Cisco....

Computing Security Awards 2016
Excellence shines through...


Anti Spam Solution of the Year - Computing Security Awards 2016
WINNER: LibraESVA - LibraESVA...

Anti Malware Solution of the Year - Computing Security Awards 2016
WINNER: Malwarebytes - Endpoint Security ...

Auditing / Reporting Solution of the Year - Computing Security Awards 2016
WINNER: Varonis - DatAdvantage ...

Content Security Solution of the Year - Computing Security Awards 2016
WINNER: Titania - Nipper Studio ...

Network Security Solution of the Year - Computing Security Awards 2016
WINNER: Redscan - ThreatDetect ...

Encryption Solution of the Year - Computing Security Awards 2016
WINNER: WinMagic - SecureDoc Cloud VM ...

DLP Solution of the Year - Computing Security Awards 2016
WINNER: GhangorCloud - Information Security Enforcer ...

Mobile Security Solution of the Year - Computing Security Awards 2016
WINNER: Wandera - Secure Mobile Gateway ...

Identity and Access Management Solution of the Year - Computing Security Awards 2016
WINNER: Wallix - AdminBastion ...

Anti Phishing Solution of the Year - Computing Security Awards 2016
WINNER: SpearSec - SpearSec ...

Network Access Control Solution of the Year - Computing Security Awards 2016
WINNER: F5 Networks - Access Policy Manager ...

Cloud Security Solution of the Year - Computing Security Awards 2016
WINNER: Egress Software Technologies - Egress Switch ...

Advanced Persistent Threat (APT) Solution of the Year - Computing Security Awards 2016
WINNER: WatchGuard - APT Blocker ...

Secure Data Erasure Company of the Year - Computing Security Awards 2016
WINNER: Sims Recycling Solutions...

Security Recruitment Company of the Year - Computing Security Awards 2016
WINNER: Evolution Recruitment Solutions ...

IoT Threat Mitigation Award - Computing Security Awards 2016
WINNER: ForeScout - CounterACT ...

Fraud Prevention Award - Which organisation has done the most to prevent fraud? - Computing Securit
WINNER: RSA...

The Human Factor Award - Computing Security Awards 2016
WINNER: iStorage - datAshur Pro...

Education and Training Provider of the Year - Computing Security Awards 2016
WINNER: ZeroDayLab...

Racing certainty
To combat the latest security threats and accelerate its security posture throughout the 2016 Formula One season, F1 giant Williams has teamed up with Symantec....


Sparkling outcome!
A solution from Libraesva is enabling private wine house Casa Vinicola Zonin to protect the 250 mailboxes of its internal users, while allowing it to recoup its investment cost...

Game on!
Games Workshop found that the value of its electronic communications was being severely eroded by a deluge of spam, phishing emails and other unwanted messages. Now its chosen solution means spam is all but eliminated and ‘false positives’ are near to zero. Here’s how it was achieved ...

Complying with current and potential future changes to EU Data Protection Law when disposing of ICT
This paper reviews one critical area of data protection, ICT disposal, looks at the likely impact of the new laws and offers some vital guidance...


Managing End of Life Risk For Solid State Devices (SSD)
Devices that use SSD face many challenges when they reach their end of life, especially around meeting data protection requirements. This white paper provides expert insights on how to get this right...

Forensic Analysis of Factory Reset Function as a permissible means of sanitising data on smartphone
This paper examines the assertion that the factory reset function as specified and supported by BlackBerry, Apple and Android (HTC/Samsung) erases data such that a threat actor function at risk level 1/2 is unable to recover any data...

Meeting European Data Protection and Security Requirements with CipherCloud Solutions
This white paper investigates how encryption and tokenisation of data can help companies that are subject both to EU data protection and general security laws to adopt cloud-based solutions and remain in legal compliance...

How to avoid a tangled Web
Web 2.0 aids enterprises in conducting business, but also introduces many damaging risks. Trend Micro offers its insights into Web application vulnerabilities and how to avoid these...

'2014: The Danger Deepens'
Neustar has released its 'Annual United Kingdom DDoS Attacks & Impact Report'. What were the experiences of those surveyed in 2013? The results suggest a more unstable and complex landscape...

Inside the criminal mind
Infoblox has launched a whitepaper that takes a sideways look at DNS security from the perspective of a cybercriminal...

AIIM survey into digital signatures
"Digital Signatures - making the business case" ...

Secure Mobile Workflows
The majority of employees now demand their choice of apps, collaboration spaces, and cloud storage. Each personalized, consumer-grade workspace enables productive collaboration: employees can efficiently navigate around their workdays and a host of smartphones and tablets. ...

'Surely Not' - The Surprising Weakness Of Strong Authentication Technologies
Dr Basil Philipsz outlines vulnerabilities in current Authentication Technologies and explains how his company, Distributed Management Systems Ltd (DMS), has developed a new innovative solution, CASQUE SNR (CASQUE) that is immune from such flaws. ...

Password Protected: A Survey on Two-Factor Authentication
...

Cloud-based services: Easing the IT burden while taking control
The potential benefits of employing cloud-based services, either in place of existing IT resources or alongside them, are undoubtedly significant. This white paper examines some of the benefits for IT administrators when their applications or services are moved to or managed via the cloud....