Home Articles News Issues eNewsletters Subscribe Media Info Contact More
Untitled Document

2017 eNewsletters
October - Featuring
Editor's Comment: The US government is warning that hackers are targeting nuclear, energy and industrial firms. And that doesn’t mean installations and organisations within its own boundaries....
Fear and loathing in cyber-space: the summer of ransomware
Infecting computers and holding businesses to ransom has become very big business. Malwarebytes VP, Anthony O’Mara, considers how organisations can fight back
Click here for the full contents..
September - Featuring
Editor's Comment: KNOWLEDGE IS POWER I note that the Institute of Information Security Professionals (IISP) has released the first IISP Knowledge Framework...
Magnetic influence
Artificial Intelligence (AI) is exerting an ever-greater influence on our security decisions and direction...
Click here for the full contents..
August - Featuring
Editor's Comment: We are now living in an age when data has never been so vulnerable. Every organisation fears the hacker who may soon come stalking them, because everyone is a possible target....
Space invaders
All too often victims of identity fraud do not even realise that they have been targeted. By then, it is way too late - the damage has been done....
Click here for the full contents..
June - Featuring
Editor's Comment: We are now living in an age when data has never been so vulnerable. Every organisation fears the hacker who may soon come stalking them, because everyone is a possible target....
SUBMIT YOUR NOMINATIONS FOR 2017 NOW!
The Computing Security Awards were set up to recognise the solutions and the solution providers that are helping to keep organisations secure. The process to determine the 2017 winners has now begun. Who and what has impressed you most? We invite you now to play your part in these awards by making your nominations....
Click here for the full contents..
February - Featuring
Editor's Comment: With GDPR now less than 18 months away, companies are running out of time to get their houses in order before the regulation is implemented next May...
Battle of wits
Organisations must assume responsibility for their security by undertaking due diligence and self-regulation - else they could be the next victims of a data breach...
Click here for the full contents..
2016 eNewsletters
December - Featuring
Editor's Comment: So, Camelot and Google have become two of the latest big name organisation to suffer a data breach. They are now like ducks at the fairground...
Heroes and villains
The role and importance of digital forensics are being driven by changes in the technology available...
Click here for the full contents..
November - Featuring
Editor's Comment: The prevailing news around security tends to be very negative and downbeat. Indeed, the received wisdom is that European IT security professionals...
Beyond the nightmare
Governance, risk and compliance are vitally important, especially as more and more legislation is introduced that could have grave consequences for any enterprise that flouts its rules...
Click here for the full contents..
October - Featuring
Editor's Comment: Fraud is taking off at a ferocious rate. The stats are horrific. It now costs the UK economy £193 billion a year and rarely a day goes by without news hitting the headlines of a company falling victim...
Startups in the firing line
According to security firm ThreatMetrix, cybercrime attacks went up by 50% in all segments in the 2nd quarter of 2016 - a worrisome trend. And startups are a top target...
Click here for the full contents..
September - Featuring
Editor's Comment: At a time when ransomware and other attack techniques that exploit insider negligence have become rampant, I was alarmed to hear recently that only 39% of end users believe they take all appropriate steps to protect company data...
Outgunning the criminal mind
The role and importance of digital forensics are being driven by changes in the technology available...
Click here for the full contents..
August - Featuring
Editor's Comment: The recent scandal over O2 cutomers' data appearing for sale on the dark web shook many, not least those directly affected. O2 says it was not a victim of a data breach - hackers actually stole the data from another source nearly three years ago - but that has left many unimpressed...
Mind Games
Increased innovation in IoT from a security standpoint is playing into the hands of hacktivists and cyber criminals. How can they be stopped?
Click here for the full contents..
July - Featuring
Editor's Comment: Some interesting figures have just come out from leading analyst Gartner, which reports that worldwide security software revenue totalled $22.1 billion in 2015, a 3.7% increase from 2014...
Under siege - in your own car
With today's connected vehicle technologies, the risk of potential cyber security threats is vast - and growing - with cars already forced off the road. What can be done to safeguard these systems and drivers?
Click here for the full contents..
June - Featuring
Editor's Comment:Small businesses are at risk from cybercrime by not putting adequate protection measures in place, according to new research from Barclaycard...
COMPUTING SECURITY AWARDS 2015
More of our winners from the 2015 Computing Security Awards:
Click here for the full contents..
May - Featuring
Editor's Comment:Recently, Metropolitan Police Commissioner Sir Bernard Hogan-Howe said victims of online fraud were "being rewarded for bad behaviour" by not updating their anti-virus software...
COMPUTING SECURITY AWARDS 2015
More of our winners from the 2015 Computing Security Awards:...
Click here for the full contents..
April - Featuring
Editor's Comment:You may well recall how, just a short while back, Google released patches that set out to tackle the latest collection of Android security blunders, ten of which...
Stepping inside the cyber criminal's mind
Cyber Security Challenge UK recently teamed up with Protection Group International...
Click here for the full contents..
March - Featuring
Editor's Comment:This year is shaping up to be the biggest yet for ransomware in the enterprise after the latest Trend Micro intelligence found infections among UK firms in February 2016 ...
Security camera hacked to 'watch the watchers'
A Motorola Focus 73 outdoor security camera has been hacked by researchers,...
Click here for the full contents..
February - Featuring
Editor's Comment:So, HSBC is launching voice recognition and touch ID services to protect customers. It signals what could be the beginning...
Free-flowing access control
Certes Networks' CryptoFlow product suite offers automatically enforced role-based...
Click here for the full contents..
January - Featuring
Editor's Comment: It is interesting to see how much academia is now involving itself in the world of cyber security. For many such institutions, it is a case of asserting that whatever industry...
Spear phishing sparks fears
Cloudmark has announced the results of a survey that, it states, provides new insight...
Click here for the full contents..
2015 eNewsletters
December - Featuring
Editor's Comment: In our Jan-Feb 2016 issue, we will be bringing you some of the top predictions from the experts about what will be uppermost in people’s minds, security wise, as we...
COMPUTING SECURITY AWARDS 2015
More of our winners from the 2015 Computing Security Awards:
Click here for the full contents..
November - Featuring
Editor's Comment: Readers will no doubt have seen how the European Court of Justice struck down the Safe Harbor agreement that many companies have been relying on to allow data transfers between the US...
COMPUTING SECURITY AWARDS
The results from the 2015 Computing Security Awards were revealed at a ceremony in London in October...
Click here for the full contents..
October - Featuring
Editor's Comment:I see that the Information Commissioners Office has received a record number of complaints from individuals concerned that their...
COMPUTING SECURITY AWARDS
Thanks to everyone who voted and attended the Computing Security Awards on the 8th October....
Click here for the full contents..
September - Featuring
Editor's Comment:It was extremely worrying to see PandaLabs – Panda Security’s malware research laboratory –confirm a record increase in the creation of new malware...
COMPUTING SECURITY AWARDS
Just a reminder that you have until 30th September to cast your votes. The awards will be presented....
Click here for the full contents..
August - Featuring
Editor's Comment:It’s good to see that a new careers hub has been set up to encourage people into the cyber security industry – and then keep them there. It’s a welcome...
How to avoid a tangled Web
Web 2.0 aids enterprises in conducting business, but also introduces many damaging risks....
Click here for the full contents..
July - Featuring
Editor's Comment:When do you think your organisation is at its most vulnerable to malware attacks? The chances are it's a Monday mornings when users reconnect...
How to avoid a tangled Web
Web 2.0 aids enterprises in conducting business, but also introduces many damaging risks...
Click here for the full contents..
June - Featuring
Editor's Comment:Here's a sobering point to reflect on. Check Point has monitored and analysed hundreds of millions of security events from over 17,000 organisations...
EOL - Getting it right!
Ensuring end-of-life sensitive data and IP are properly erased is crucial. But how?
Click here for the full contents..
April - Featuring
Editor's Comment:Recent high-profile hacking attacks and data breaches, such as those affecting Sony, Netflix, health insurer Anthem and parking ticket website PaymyPCN.net have served to...
Risk - and Reward
Organisations must adopt a more agile risk-based approach to cyber security, if they are to address new challenges
Click here for the full contents..
March - Featuring
Editor's Comment:Recent high-profile hacking attacks and data breaches, such as those affecting Sony, Netflix, health insurer Anthem and parking ticket website PaymyPCN.net, have served to increase...
Finger on the security pulse
In a bid to outwit the fraudsters, biometrics is beginning to exert an ever greater influence
Click here for the full contents..
February - Featuring
Editor's Comment:In the government's cyber security strategy, 'Protecting and promoting the UK in a digital world', there is a much emphasis on how increasing our reliance on cyberspace brings new...
The year ahead - what lies in wait
2015 may be even more daunting than last year. Here’s what you can look forward to – or not! - according to the experts
Click here for the full contents..
January - Featuring
Editor's Comment:This is the time of year when all of the predictions for the 12 months ahead come pouring out of the cupboard. At Computing Security, I've seen a plethora of future-gazing commentary...
Enough to make your pulse soar
Imagine this: employers monitoring programmers' pulses, eye movements and even...
Click here for the full contents..
2014 eNewsletters
December - Featuring
Editor's Comment:Welcome to the December 2014 issue of the Computing Security Newsletter. One thing you can always be sure of when dealing with emerging technologies is that the stats quoted will almost invariably...
Taking the next step up
The industry needs to move towards a more holistic view of information and systems, argues Dr Anand Narasimhan, director, Sims Lifecycle Services EU
Click here for the full contents..
November - Featuring
Editor's Comment:It was interesting to see that Francis Maude, Minister for the Cabinet Office with responsibility for the UK Cyber Security Strategy, co-hosted a summit...
Anti-Virus, the Cloudmark way
How do you defend against malware that is undetectable once it reaches your computer? Andrew Conway, lead software engineer at Cloudmark, offers some answers
Click here for the full contents..
October - Featuring
Editor's Comment:Even if you had been living in the depths of some dense jungle (are there any left?) or on an Arctic icecap (ditto)...
CS Awards 2014
All the winners of the 2014 Computing Security Awards were revealed at an awards ceremony on 9 October to cap another great evening of celebration...
Click here for the full contents..
September - Featuring
Editor's Comment:The global business and IT landscape has changed greatly over the last year, with a growing number of cybersecurity incidents and large-scale data...
Are you being properly served?
Technical vulnerabilities in their businesses - eg, cyber security, data integrity and mobile devices - are causing SMES ever deeper concerns
Click here for the full contents..
August - Featuring
Editor's Comment:Despite commitments to bolster the country’s critical infrastructure, continued public spending cuts have reduced the funds available for the government...
Business Risk Fears Leap
Technical vulnerabilities in their businesses - eg, cyber security, data integrity and mobile devices - are causing SMES ever deeper concerns
Click here for the full contents..
July - Featuring
Editor's Comment:What is being hailed as the world's first 100% secure method of sharing data (using quantum mechanics) has been successfully demonstrated for the first time.
Grave New World
Following the Waking Shark II security scenario at the end of last year, which involved financial firms being hit with a series of cyber attacks in order to test their defences....
Click here for the full contents..
June - Featuring
Editor's Comment:It was encouraging to see how the UK's National Crime Agency has joined forces with other agencies such as the FBI in the US to deliver a nationwide alert, urging organisations and individuals to protect themselves against powerful malicious software...
Taking Biometric security to the next level
The TABULA RASA consortium is working to develop countermeasures that will see a powerful new breed of safer biometric systems
Click here for the full contents..
May - Featuring
Editor's Comment:It comes hard on the heels of the annual gathering of all things, and all people, that are security focused: namely the InfoSec 2014 show in London.....
Powering down
Many power companies are now being refused insurance cover for cyber-attacks, because their defences are perceived as too weak
Click here for the full contents..
April - Featuring
Editor's Comment:A vulnerability in a popular implementation of the Secure Socket Layer (SSL) technology, used to secure internet transactions, has been revealed that has sent the media and industry experts into something of a frenzy, dubbing it 'Heartbleed'...
Security Directive Could Cost Organisations Billion
UK businesses could be hit hard in the pocket by a new EU Cyber Security Directive
Click here for the full contents...
March - Featuring
Editor's Comment: Everywhere you turn, it seems that another malicious attack is taking place. A particularly intriguing one of late - though not if you've been hit by it, of course! - is Kaspersky Lab's discovery of 'The Mask' (aka Careto)...
Why the Pen can be mightier than the sword
Penetration ('pen') testing is the practice of attacking your systems and network to seek out any vulnerabilities that others might try to exploit. It could save you and your customers from the hackers and attackers out there...
Click here for the full contents..
February - Featuring
Editor's Comment: Of course, security threats abound and persist everywhere - we all need to be on our guard constantly. And there is nothing like a major sporting event to get everyone up on their toes: nervous, but hopefully also fully alert to what might happen...
Erasing the data on Solid State Drives...
Thanks to Solid State Drives (SSD), the wider world has now become our office. But there are many thorny issues regarding the retirement of these assets...
Click here for the full contents..
January - Featuring
Editor's Comment: Welcome to the first Newsletter of 2014 - and a happy new year to everyone! I hope you have a successful - and safe - year to come...
At your own risk...
Keeping business systems safe and protecting your data has never been more difficult to achieve. And it is only likely to become harder. Getting the right risk management strategy in place is critical...
Click here for the full contents..

2013 eNewsletters
December - Featuring
Editor's Comment: It was what many people working in London’s financial and banking sectors feared might happen one day: a brutal and sustained attack on their businesses that would leave them in tatters. But these would not be...
The Internet's Light And Dark Sides
While the internet can be a positive force for good, it is also a haven for the very bad - and it doesn't get much worse than cybercrime. What is being done to protect UK businesses? Are the cybercriminals getting the upper-hand in a one-way battle? Brian Wall finds out...
Click here for the full contents..
November - Featuring
Editor's Comment: Welcome to the November edition of the Computing Security Newsletter. And let me say straight away what a great night of celebrations it was at the recent 2013 Computing Security Awards, as people from right across...
BYOD - How to make it your friend
BYOD - bring your own device - is enjoying enormous growth and that is likely only to accelerate. However, opinion is still divided as to whether it is a force for good or bad. Brian Wall reports...
Click here for the full contents..
October - Featuring
Editor's Comment: Welcome to the October edition of the Computing Security Newsletter. No matter how high the defences we stack up against them, the more the cybercriminals come back to carry out another frenzied assault...
Malware and Malpractices
Despite the potential threats, as many as 25% of all PCs remain unprotected. Why is there such a poor attitude to security in some quarters? Computing Security finds out...
Click here for the full contents..
August - Featuring
Editor's Comment: Welcome to the August edition of the Computing Security Newsletter. The threat the UK is facing from cyber attacks is disturbing in its scale and complexity. The Intelligence and Security Committee (ISC) of...
Winners all the Way!
The Computing Security Awards are now a 'must attend' date in the calendars of more and more businesses. 2013 is certain to be as hotly contested as ever before...
Click here for the full contents..
July - Featuring
Editor's Comment: Welcome to the July edition of the Computing Security Newsletter. Here, you will find all the latest news, views and happenings relating to security - and the major issues that businesses are having to engage...
Security with App-titude
Apps are everywhere, it would appear, and spreading like wildfire. What are the security implications? and just how do you keep pace?...
Click here for the full contents..
March - Featuring
Editor's Comment: Hello... and Welcome to the March edition of the Computing Security Newsletter. Here, you will find all the latest news,views and happenings relating to security - and the major issues that businesses are having to engage...
2013 - Where will it take us?
What are likely to be the major challenges that organisations are faced with in the year ahead? Computing Security quizzes those in the know...
Click here for the full contents..