Home Articles News Issues eNewsletters Subscribe Media/Events Contact Privacy More
Untitled Document
Latest Issue
CS Jan-Feb 2024
CS Nov-Dec 2023
CS Sep-Oct 2023
CS Jul-Aug 2023
CS May-Jun 2023
CS Mar-Apr 2023
CS Jan-Feb 2023
CS Nov-Dec 2022
CS Sep-Oct 2022
CS Jul-Aug 2022
CS May-Jun 2022
CS Mar Apr 2022
CS Jan Feb 2022
CS Sep-Oct 2021
CS May-Jun 2021
CS Mar-Apr 2021
CS Nov-Dec 2020
CS May-Jun 2020
CS Mar-Apr 2020
CS Jan-Feb 2020
2024 eNewsletters
February - Featuring
Editor's Comment: A provisional agreement is paving the way for what would be a landmark deal on the use of artificial intelligence
AI - where to next?
How might AI technology advance and mutate from here – and what might that mean for the security industry?
Click here for the full contents..
January - Featuring
Editor's Comment: A provisional agreement is paving the way for what would be a landmark agreement on the use of artificial intelligence.
Phishing enters deep dark waters
The sophistication of phishing attacks is soaring, with cybercriminals using worryingly powerful new tactics to gain access to data and systems
Click here for the full contents..
2023 eNewsletters
December - Featuring
Editor's Comment: We all need recourse to legal services at various times and rely on these firms to protect our interests during such transactions.
False positive
Out of 78% of organisations that claimed they were ready to deal with a ransomware attack, 50% still fell victim
Click here for the full contents..
November - Featuring
Editor's Comment: We all need recourse to legal services at various times and rely on these firms to protect our interests during such transactions
Why orphaned data is a goldmine for cyber attackers
Daniel Hofmann, CEO at Hornetsecurity, looks at the sizable threat that staff turnover can have on a company's cybersecurity
Click here for the full contents..
October - Featuring
Editor's Comment: The idea that we can ever protect the overwhelming majority of organisations from suffering severe cyber-attacks has long been put out to pasture
Understanding media sanitisation
In an information security climate of increasingly sophisticated threat actors and more challenging operational estates, ADISA...
Click here for the full contents..
September - Featuring
Editor's Comment: With the number of attacks soaring by nearly 50% across the defence industry, remedial action to prevent these incursions cannot be delayed.
PAM before IAM?
PAM and IAM are both crucial areas of protection - though PAM should lead the way, argues one advocate...
Click here for the full contents..
August - Featuring
Editor's Comment: With the number of attacks soaring by nearly 50% across the defence industry, remedial action to prevent these incursions cannot be delayed.
AI - Appropriate Interruption?
'To halt or not to halt?' Scores of advocates on both sides of the AI debate have emerged - but AI's...
Click here for the full contents..
July - Featuring
Editor's Comment: While cyber security breaches and attacks remain a common threat, smaller organisations are identifying them less than last year, according to a recent government breach survey.
Why we need a return to Prevention-first Cybersecurity
Stopping zero days, ransomware and other never-before-seen malware is a race against the clock...
Click here for the full contents..
June - Featuring
Editor's Comment: The UK government has reintroduced new GDPR legislation, which it claims will save businesses and charities as much as £4.7bn over the coming decade, while bolstering data protection and privacy...
What to do when things turn inside out
How do hackers get inside an organisation's defences? Is it carelessness that opens the gates...
Click here for the full contents..
April - Featuring
Editor's Comment: I note that cybersecurity budgets are tipped to increase or are expected to be maintained, despite the economic downturn, which is encouraging news, bearing in mind the soaring level of threats faced by organisations.
Do We Still Need Firewalls?
In short, yes - now more than ever. There has never been a greater or more deliberate threat...
Click here for the full contents..
March - Featuring
Editor's Comment: What will prove to be the biggest challenges that organisations face throughout this year? Where will the most devastating attacks come from? And how do they keep sufficiently well informed, in order to defend themselves?
Unlock the potential of your redundant IT
Founder and CEO of ADISA, Steve Mellings, welcomes the 'green shoots of improvement' around...
Click here for the full contents..
January - Featuring
Editor's Comment: It’s deeply concerning to hear that 33% of companies are not providing any cybersecurity awareness training to users who work remotely. The study – conducted by cybersecurity provider Hornetsecurity– has also revealed that nearly three-quarters (74%) of remote staff have access to critical data
Surviving the 2023 shockwaves
To slightly misquote a priceless line from a classic film and attribute it to the year that's rapidly approaching...
Click here for the full contents..
2022 eNewsletters
December - Featuring
Editor's Comment: The UK government has confirmed that the Network and Information Systems (NIS) Regulations 2018 are to be strengthened to protect essential and digital services against cyber-attacks. The changes bring providers of outsourced...
Ransomware on the rampage
With 24% of businesses identified in recent research as having been victims to an attack, the omens for the year ahead look worrying. How...
Click here for the full contents..
November - Featuring
Editor's Comment: The cyberthreat landscape has reached a new level of commercialisation and convenience for would-be attackers
Bitdefender partners with Ferrari
Bitdefender has entered into a multi-year partnership with Ferrari S.p.A. to become cybersecurity global partner of Scuderia Ferrari, which is...
Click here for the full contents..
October - Featuring
Editor's Comment: Half (49%) of respondents to a recent Twitter poll - carried out by Osirium Technologies...
A wing and a prayer?
How likely is it that criminal gangs are going to return all your data intact and untarnished after a ransomware attack, if you comply with their requirements...
Click here for the full contents..
August - Featuring
Editor's Comment: Welcome to the May 2022 issue of yourComputing Security Newsletter. In the wake of Russia's invasion of Ukraine
Tackling the Ransomware Threat
The upcoming International Cyber Expo in London aims to help individuals and organisations stay one step ahead of the ever-evolving threat landscape
Click here for the full contents..
May - Featuring
Editor's Comment: Welcome to the May 2022 issue of yourComputing Security Newsletter. In the wake of Russia's invasion of Ukraine
Education sector bombarded by breaches and attacks
University College London faced almost 60 million malicious email attacks in the first three months of 2022, it is reported - prompting a stark warning
Click here for the full contents..
April - Featuring
Editor's Comment: You will have seen from recent issues of the magazine that the menace which is ransomware has taken a global grip that goes far beyond anything envisaged when it first surfaced.
Top court rules against data misuse
The European Court of Justice has ruled that the general and indiscriminate retention of traffic and location data TO combat serious crime is prohibited by EU law.
Click here for the full contents..
February - Featuring
Editor's Comment: It is deeply concerning to see that Linux, a core part of digital infrastructure, is quickly becoming an attacker's ticket into a multi-cloud environment...
BIOMETRICS
Facial recognition technology, behavioural biometrics, biometric authentication, homomorphic encryption and more - all are vying to emerge on top as our digital lives come under ever greater threaty
Click here for the full contents..
January - Featuring
Editor's Comment: The administrators of the largest illegal marketplace on the darknet for stolen credit cards are retiring after making an estimated $358m (£260m). Is it because the police...
2022: where will it take us?
We asked several industry observers to give us their top predictions for 2022, against a background of uncertainty and challenge. Here's what they had to say
Click here for the full contents..
2021 eNewsletters
December - Featuring
Editor's Comment: Research just released by managed security services provider Orange Cyberdefense reveals there has been a 13% increase in cyberattacks on enterprises over the past 12 months
Supply chain under stress
Digital supply chain cyber security plans are not just something to be concerned about in the wider scheme of things, says Martin Tyley, head of UK Cyber at KPMG UK - they are "the safety net our country needs to survive and thrive".
Click here for the full contents..
November - Featuring
Editor's Comment: Just in case you think you've stepped into a scene from the new James Bond film, this is for real: Sir Jeremy Fleming, the director of GCHQ
Achieving a secure wipe
Gareth Owen, managing director of Redkey USB, delves into the world of Data Wipe Standards and, where there is any doubt or confusion, advises how organisations can handle this process responsibly
Click here for the full contents..
October - Featuring
Editor's Comment: As reported by Digital Trends, Acer has confirmed that its servers were beached by a group of hackers called 'Desorden'. The hackers stole more than 60 gigabytes worth of data containing sensitive information about millions of Acer's customers.
Cyber-attacks soar in wake of pandemic
Changes to working practices leave businesses ever more exposed
Click here for the full contents..
September - Featuring
Editor's Comment: A threat actor has leaked a list of almost 500,000 Fortinet VPN login names and passwords that were allegedly scraped from exploitable devices last summer
Covid-19 attack surge
As business have adopted to new ways of working, the COVID-19 pandemic has exposed them to more and increasingly sophisticated cyber-attacks, and brought underfunded cyber defences into the spotlight.
Click here for the full contents..
July - Featuring
Editor's Comment: After terrorising countless organisations with ransomware demands and paralysing their activities until they paid up, it came as a surprise, albeit a pleasing one, to see that websites for a Russian-linked ransomware gang REvil had suddenly gone offline.
CLEVER THINKING
Can AI help transform the industry, making it sharper, wiser and less vulnerable?...
Click here for the full contents..
June - Featuring
Editor's Comment: Research by Egress has revealed that an overwhelming 90% of security leaders are concerned about group legal settlements following a serious data breach, compared to 85% who are worried about regulatory fines.
PUT A SOC IN IT!
A Security Operations Centre (SOC) has become one of the vital components of a well-rounded cyber security programme...
Click here for the full contents..
March - Featuring
Editor's Comment: The good news of late - and we really did need some! - is that we may soon have a viable vaccine to take on COVID-19
Through a glass darkly
We asked several industry commentators for their views on where 2021 will lead us, as we continue to grapple with COVID19 and a multitude of other challenges...
Click here for the full contents..
2020 eNewsletters
November - Featuring
Editor's Comment: The good news of late - and we really did need some! - is that we may soon have a viable vaccine to take on COVID-19
Hackers for hire
Hacker for hire groups are on the rampage globally, leaving a trail of destruction in their wake. The right cyber resilience strategies must be put in place to counteract this...
Click here for the full contents..
August - Featuring
Editor's Comment: As someone looking at buying a new car and selling off my old one in the not too distant future, I was alarmed to read a Which...
Remote workers targeted
Attackers have been quick to seek out ways of exploiting the many vulnerabilities laid bare by home working
Click here for the full contents..
June - Featuring
Editor's Comment: By any measure, the recent revelations that cyber scammers have been using SMS alerts to wrongly inform people they have been in contact with someone who has tested positive for coronavirus is shocking...
Profits and Pitfalls
Well-crafted social media content can deliver a multitude of benefits. But there is a potential downside, warn the Cyber Threat Intelligence Professionals at Cyjax
Click here for the full contents..
March - Featuring
Editor's Comment: Three in five (60%) UK businesses - the equivalent of 3.5 million companies...
Putting business at peril
Kyle Chrzanowski, AT&T Cybersecurity Consultant, looks at the dangers of tech advancement without the insurance of security risk assessment
Click here for the full contents..
January - Featuring
Editor's Comment: Foreign currency seller Travelex was forced recently to take down its website, following a cyber-attack. Although the company said shortly afterwards that an early investigation had been conducted...
Promoting IT sustainability through risk management
E-waste is the largest-growing waste stream. By changing our 'use and discard' approach, this is an area where we can make a significant impact, says Steve Mellings, CEO and founder of ADISA
Click here for the full contents..
2019 eNewsletters
November - Featuring
Editor's Comment: We've long come to recognise that no one is safe from attacks on line and that there are no boundaries beyond which perpetrators will not go.
Ransomware strikes entire cities
Governments and healthcare organisations have now become key targets in an increasingly aggressive campaign of ransomware attacks
Click here for the full contents..
September - Featuring
Editor's Comment: It seems timely - and a positive outcome - to see the UK privacy watchdog has ruled that any police force or private organisation using live facial recognition technology is processing personal data and needs to pay attention to data protection laws...
Critical mass
Critical asset owners increasingly have to protect their ICT infrastructures against cyber attacks. It's no longer enough for the supplier of a single machine component or subcomponent to claim it is cyber-secure - the entire machine must be so
Click here for the full contents..
July - Featuring
Editor's Comment: It seems timely - and a positive outcome - to see the UK privacy watchdog has ruled that any police force or private organisation using live facial recognition technology is processing personal data and needs to pay attention to data protection laws...
Malware Malaise
Could it be that new malware features matter less than you might think - and that what really matters is behaviour? Computing Security gets some of the industry's views.
Click here for the full contents..
May - Featuring
Editor's Comment: Due to the vast amount of sensitive data they hold, educational institutions are a key target for cyberattacks...
Think like an Attacker....
Occurrences of data theft, corporate reputational damage, cybercrime, state-sponsored actors and hacktivists would fill several volumes - with room to spare. A strategic approach to cyber security has never been more necessary or urgent
Click here for the full contents..
April - Featuring
Editor's Comment: With cyber threats increasing on a daily basis, the UK government has been recommending that companies of all sizes take a proactive approach when it comes to cybercrime...
Multi-factor authentication... in six takes
Your organisation is going down the multi-factor authentication path, but how does it know it's the right one? Adrian Jones, CEO of Swivel Secure, offers some insights into solving that challenge
Click here for the full contents..
March - Featuring
Editor's Comment: A question: what is Ireland doing right that others are failing to achieve? To put that in context, according to latest research findings, nearly half (45%) of UK organisations have been compromised by phishing attacks in the last two years....
Powerful alliance
CYJAX has been working closely for some time now with Oxford University and the Centre for Doctoral Training in Cyber Security - and these 'Deep Dive Days' are really paying off
Click here for the full contents..
February - Featuring
Editor's Comment: It is disturbing to hear that cyber criminals have placed 617million hacked accounts for sale on the dark web, stemming from 16 separate data breaches....
Facing up to the facts
Should we be using facial recognition technology? It's currently a hot topic in the US, where Amazon has asked for government input, while civil liberties groups in both the UK and US are fundamentally opposed to it
Click here for the full contents..
2018 eNewsletters
December - Featuring
Editor's Comment: With Christmas almost upon us, and the New Year celebrations not far behind that, it's time for some sober reflection on the plight of those who've been looking forward to spending the festive season...
NHS breach - the true cost
The WannaCry attack that hit the NHS last year, is estimated to have cost the health service a massive £92million. Could such hard-nosed reckoning help in ensuring the NHS is more resilient in future
Click here for the full contents..
November - Featuring
Editor's Comment: Responsibility for information security is not falling to any one senior executive function, according to the 2018Risk:Value report from NTT Security, which surveyed 1,800 senior decision...
Good news, bad news
Identity fraud has fallen for the first time in four years - which is a real positive. At the same time, there is an acute shortage of cyber security skills in-house to deal with threats against the business
Click here for the full contents..
October - Featuring
Editor's Comment: It's been a long time coming, one way or another, but it was good to see that Tesco Bank has been fined £16.4 million by the Financial Conduct Authority (FCA) ...
Factoring In Your Security
Sounds familiar? More employee accounts were accessed when hackers breached the two-factor authentication used to confirm log-in. 'Groundhog Day' comes to mind
Click here for the full contents..
September - Featuring
Editor's Comment: When catastrophe strikes, it is only right and just that those at the top have to take the fall...
Ins and outs of cyber resilience
The European Union is planning to enhance its cyber resilience with a new EU-wide certification framework. In our pre-Brexit state, what are the 'ins' and 'outs' of this?
Click here for the full contents..
August - Featuring
Editor's Comment: A cyber risk survey produced by the London Financial Times has found that 58% of cyber-attacks are attributable to employee behaviour, such as human negligence, accidental disclosure and lost or stolen devices...
Data security for your mobile workforce
We live in a flexible, mobile world that is constantly reinventing itself. Paul Norbury, Chief Executive, Cardwave Services, steps inside for a closer view
Click here for the full contents..
July - Featuring
Editor's Comment: The level of engagement with the business at the top of our corporate trees can sometimes be breathtaking. In one recent survey, only 55% of those who responded said their organisation's...
The search for the security champions of 2018
Time to make your nominations - we ask you now to tell us who and what has impressed you the most
Click here for the full contents..
June - Featuring
Editor's Comment: The success of digital transformation projects is being stalled by the fear of the impact and rising costs of breaches associated with 'data on the go'. ...
The search for the security champions of 2018
Time to make your nominations - we ask you now to tell us who and what has impressed you the most
Click here for the full contents..
May - Featuring
Editor's Comment: The overwhelming majority of businesses and charities are reliant on online services, which, of course, exposes them to cyber security risks....
Deadly game of Hide 'n' Seek
Bitdefender researchers have uncovered an emerging botnet that uses advanced communication techniques to exploit victims and build its infrastructure
Click here for the full contents..
April - Featuring
Editor's Comment: More than 90% of surveyed senior business leaders agree that strong technology governance contributes to improved business outcomes and increased agility...
Protecting data to protect patients
Cyber criminals are netting massive financial returns from ransomware and other crippling cyberattacks against healthcare providers. How can they be stopped? Mark Sangster, VP and industry security strategist with eSentire, offers his insights
Click here for the full contents..
February - Featuring
Editor's Comment: in an important move, BSI, the business standards company, has published the revised international standard for risk management, BS ISO 31000:2018 Risk management: guidelines...
Life on the cutting edge
Distributed Denial of Service (DDoS) attacks come in many flavours. Here, Charlotte Gurney, Marketing Manager, Brookcourt Solutions, considers one in particular
Click here for the full contents..
January - Featuring
Editor's Comment: It's deeply worrying to hear that fewer than half of all businesses and charities are aware of new data protection laws four months before they come into force...
Life on the cutting edge
The way must now be paved for the adoption of cutting-edge technologies, tackling the barriers that businesses are facing, says the CBI
Click here for the full contents..
2017 eNewsletters
December - Featuring
Editor's Comment: At a time of growing anxiety about the level of breaches that are occurring - with high profile after high profile organisation revealed to have suffered a serious breach....
The Rise and Rise of Ransomware
Javvad Malik, security advocate at AlienVault, reflects on how the digital revolution has made ransomware such a powerful and ominous presence
Click here for the full contents..
October - Featuring
Editor's Comment: The US government is warning that hackers are targeting nuclear, energy and industrial firms. And that doesn't mean installations and organisations within its own boundaries....
Fear and loathing in cyber-space: the summer of ransomware
Infecting computers and holding businesses to ransom has become very big business. Malwarebytes VP, Anthony O'Mara, considers how organisations can fight back
Click here for the full contents..
September - Featuring
Editor's Comment: KNOWLEDGE IS POWER I note that the Institute of Information Security Professionals (IISP) has released the first IISP Knowledge Framework...
Magnetic influence
Artificial Intelligence (AI) is exerting an ever-greater influence on our security decisions and direction...
Click here for the full contents..
August - Featuring
Editor's Comment: We are now living in an age when data has never been so vulnerable. Every organisation fears the hacker who may soon come stalking them, because everyone is a possible target....
Space invaders
All too often victims of identity fraud do not even realise that they have been targeted. By then, it is way too late - the damage has been done....
Click here for the full contents..
June - Featuring
Editor's Comment: We are now living in an age when data has never been so vulnerable. Every organisation fears the hacker who may soon come stalking them, because everyone is a possible target....
SUBMIT YOUR NOMINATIONS FOR 2017 NOW!
The Computing Security Awards were set up to recognise the solutions and the solution providers that are helping to keep organisations secure. The process to determine the 2017 winners has now begun. Who and what has impressed you most? We invite you now to play your part in these awards by making your nominations....
Click here for the full contents..
February - Featuring
Editor's Comment: With GDPR now less than 18 months away, companies are running out of time to get their houses in order before the regulation is implemented next May...
Battle of wits
Organisations must assume responsibility for their security by undertaking due diligence and self-regulation - else they could be the next victims of a data breach...
Click here for the full contents..
2016 eNewsletters
December - Featuring
Editor's Comment: So, Camelot and Google have become two of the latest big name organisation to suffer a data breach. They are now like ducks at the fairground...
Heroes and villains
The role and importance of digital forensics are being driven by changes in the technology available...
Click here for the full contents..
November - Featuring
Editor's Comment: The prevailing news around security tends to be very negative and downbeat. Indeed, the received wisdom is that European IT security professionals...
Beyond the nightmare
Governance, risk and compliance are vitally important, especially as more and more legislation is introduced that could have grave consequences for any enterprise that flouts its rules...
Click here for the full contents..
October - Featuring
Editor's Comment: Fraud is taking off at a ferocious rate. The stats are horrific. It now costs the UK economy �193 billion a year and rarely a day goes by without news hitting the headlines of a company falling victim...
Startups in the firing line
According to security firm ThreatMetrix, cybercrime attacks went up by 50% in all segments in the 2nd quarter of 2016 - a worrisome trend. And startups are a top target...
Click here for the full contents..
September - Featuring
Editor's Comment: At a time when ransomware and other attack techniques that exploit insider negligence have become rampant, I was alarmed to hear recently that only 39% of end users believe they take all appropriate steps to protect company data...
Outgunning the criminal mind
The role and importance of digital forensics are being driven by changes in the technology available...
Click here for the full contents..
August - Featuring
Editor's Comment: The recent scandal over O2 cutomers' data appearing for sale on the dark web shook many, not least those directly affected. O2 says it was not a victim of a data breach - hackers actually stole the data from another source nearly three years ago - but that has left many unimpressed...
Mind Games
Increased innovation in IoT from a security standpoint is playing into the hands of hacktivists and cyber criminals. How can they be stopped?
Click here for the full contents..
July - Featuring
Editor's Comment: Some interesting figures have just come out from leading analyst Gartner, which reports that worldwide security software revenue totalled $22.1 billion in 2015, a 3.7% increase from 2014...
Under siege - in your own car
With today's connected vehicle technologies, the risk of potential cyber security threats is vast - and growing - with cars already forced off the road. What can be done to safeguard these systems and drivers?
Click here for the full contents..
June - Featuring
Editor's Comment:Small businesses are at risk from cybercrime by not putting adequate protection measures in place, according to new research from Barclaycard...
COMPUTING SECURITY AWARDS 2015
More of our winners from the 2015 Computing Security Awards:
Click here for the full contents..
May - Featuring
Editor's Comment:Recently, Metropolitan Police Commissioner Sir Bernard Hogan-Howe said victims of online fraud were "being rewarded for bad behaviour" by not updating their anti-virus software...
COMPUTING SECURITY AWARDS 2015
More of our winners from the 2015 Computing Security Awards:...
Click here for the full contents..
April - Featuring
Editor's Comment:You may well recall how, just a short while back, Google released patches that set out to tackle the latest collection of Android security blunders, ten of which...
Stepping inside the cyber criminal's mind
Cyber Security Challenge UK recently teamed up with Protection Group International...
Click here for the full contents..
March - Featuring
Editor's Comment:This year is shaping up to be the biggest yet for ransomware in the enterprise after the latest Trend Micro intelligence found infections among UK firms in February 2016 ...
Security camera hacked to 'watch the watchers'
A Motorola Focus 73 outdoor security camera has been hacked by researchers,...
Click here for the full contents..
February - Featuring
Editor's Comment:So, HSBC is launching voice recognition and touch ID services to protect customers. It signals what could be the beginning...
Free-flowing access control
Certes Networks' CryptoFlow product suite offers automatically enforced role-based...
Click here for the full contents..
January - Featuring
Editor's Comment: It is interesting to see how much academia is now involving itself in the world of cyber security. For many such institutions, it is a case of asserting that whatever industry...
Spear phishing sparks fears
Cloudmark has announced the results of a survey that, it states, provides new insight...
Click here for the full contents..
2015 eNewsletters
December - Featuring
Editor's Comment: In our Jan-Feb 2016 issue, we will be bringing you some of the top predictions from the experts about what will be uppermost in people’s minds, security wise, as we...
COMPUTING SECURITY AWARDS 2015
More of our winners from the 2015 Computing Security Awards:
Click here for the full contents..
November - Featuring
Editor's Comment: Readers will no doubt have seen how the European Court of Justice struck down the Safe Harbor agreement that many companies have been relying on to allow data transfers between the US...
COMPUTING SECURITY AWARDS
The results from the 2015 Computing Security Awards were revealed at a ceremony in London in October...
Click here for the full contents..
October - Featuring
Editor's Comment:I see that the Information Commissioners Office has received a record number of complaints from individuals concerned that their...
COMPUTING SECURITY AWARDS
Thanks to everyone who voted and attended the Computing Security Awards on the 8th October....
Click here for the full contents..
September - Featuring
Editor's Comment:It was extremely worrying to see PandaLabs – Panda Security’s malware research laboratory –confirm a record increase in the creation of new malware...
COMPUTING SECURITY AWARDS
Just a reminder that you have until 30th September to cast your votes. The awards will be presented....
Click here for the full contents..
August - Featuring
Editor's Comment:It’s good to see that a new careers hub has been set up to encourage people into the cyber security industry – and then keep them there. It’s a welcome...
How to avoid a tangled Web
Web 2.0 aids enterprises in conducting business, but also introduces many damaging risks....
Click here for the full contents..
July - Featuring
Editor's Comment:When do you think your organisation is at its most vulnerable to malware attacks? The chances are it's a Monday mornings when users reconnect...
How to avoid a tangled Web
Web 2.0 aids enterprises in conducting business, but also introduces many damaging risks...
Click here for the full contents..
June - Featuring
Editor's Comment:Here's a sobering point to reflect on. Check Point has monitored and analysed hundreds of millions of security events from over 17,000 organisations...
EOL - Getting it right!
Ensuring end-of-life sensitive data and IP are properly erased is crucial. But how?
Click here for the full contents..
April - Featuring
Editor's Comment:Recent high-profile hacking attacks and data breaches, such as those affecting Sony, Netflix, health insurer Anthem and parking ticket website PaymyPCN.net have served to...
Risk - and Reward
Organisations must adopt a more agile risk-based approach to cyber security, if they are to address new challenges
Click here for the full contents..
March - Featuring
Editor's Comment:Recent high-profile hacking attacks and data breaches, such as those affecting Sony, Netflix, health insurer Anthem and parking ticket website PaymyPCN.net, have served to increase...
Finger on the security pulse
In a bid to outwit the fraudsters, biometrics is beginning to exert an ever greater influence
Click here for the full contents..
February - Featuring
Editor's Comment:In the government's cyber security strategy, 'Protecting and promoting the UK in a digital world', there is a much emphasis on how increasing our reliance on cyberspace brings new...
The year ahead - what lies in wait
2015 may be even more daunting than last year. Here’s what you can look forward to – or not! - according to the experts
Click here for the full contents..
January - Featuring
Editor's Comment:This is the time of year when all of the predictions for the 12 months ahead come pouring out of the cupboard. At Computing Security, I've seen a plethora of future-gazing commentary...
Enough to make your pulse soar
Imagine this: employers monitoring programmers' pulses, eye movements and even...
Click here for the full contents..
2014 eNewsletters
December - Featuring
Editor's Comment:Welcome to the December 2014 issue of the Computing Security Newsletter. One thing you can always be sure of when dealing with emerging technologies is that the stats quoted will almost invariably...
Taking the next step up
The industry needs to move towards a more holistic view of information and systems, argues Dr Anand Narasimhan, director, Sims Lifecycle Services EU
Click here for the full contents..
November - Featuring
Editor's Comment:It was interesting to see that Francis Maude, Minister for the Cabinet Office with responsibility for the UK Cyber Security Strategy, co-hosted a summit...
Anti-Virus, the Cloudmark way
How do you defend against malware that is undetectable once it reaches your computer? Andrew Conway, lead software engineer at Cloudmark, offers some answers
Click here for the full contents..
October - Featuring
Editor's Comment:Even if you had been living in the depths of some dense jungle (are there any left?) or on an Arctic icecap (ditto)...
CS Awards 2014
All the winners of the 2014 Computing Security Awards were revealed at an awards ceremony on 9 October to cap another great evening of celebration...
Click here for the full contents..
September - Featuring
Editor's Comment:The global business and IT landscape has changed greatly over the last year, with a growing number of cybersecurity incidents and large-scale data...
Are you being properly served?
Technical vulnerabilities in their businesses - eg, cyber security, data integrity and mobile devices - are causing SMES ever deeper concerns
Click here for the full contents..
August - Featuring
Editor's Comment:Despite commitments to bolster the country’s critical infrastructure, continued public spending cuts have reduced the funds available for the government...
Business Risk Fears Leap
Technical vulnerabilities in their businesses - eg, cyber security, data integrity and mobile devices - are causing SMES ever deeper concerns
Click here for the full contents..
July - Featuring
Editor's Comment:What is being hailed as the world's first 100% secure method of sharing data (using quantum mechanics) has been successfully demonstrated for the first time.
Grave New World
Following the Waking Shark II security scenario at the end of last year, which involved financial firms being hit with a series of cyber attacks in order to test their defences....
Click here for the full contents..
June - Featuring
Editor's Comment:It was encouraging to see how the UK's National Crime Agency has joined forces with other agencies such as the FBI in the US to deliver a nationwide alert, urging organisations and individuals to protect themselves against powerful malicious software...
Taking Biometric security to the next level
The TABULA RASA consortium is working to develop countermeasures that will see a powerful new breed of safer biometric systems
Click here for the full contents..
May - Featuring
Editor's Comment:It comes hard on the heels of the annual gathering of all things, and all people, that are security focused: namely the InfoSec 2014 show in London.....
Powering down
Many power companies are now being refused insurance cover for cyber-attacks, because their defences are perceived as too weak
Click here for the full contents..
April - Featuring
Editor's Comment:A vulnerability in a popular implementation of the Secure Socket Layer (SSL) technology, used to secure internet transactions, has been revealed that has sent the media and industry experts into something of a frenzy, dubbing it 'Heartbleed'...
Security Directive Could Cost Organisations Billion
UK businesses could be hit hard in the pocket by a new EU Cyber Security Directive
Click here for the full contents...
March - Featuring
Editor's Comment: Everywhere you turn, it seems that another malicious attack is taking place. A particularly intriguing one of late - though not if you've been hit by it, of course! - is Kaspersky Lab's discovery of 'The Mask' (aka Careto)...
Why the Pen can be mightier than the sword
Penetration ('pen') testing is the practice of attacking your systems and network to seek out any vulnerabilities that others might try to exploit. It could save you and your customers from the hackers and attackers out there...
Click here for the full contents..
February - Featuring
Editor's Comment: Of course, security threats abound and persist everywhere - we all need to be on our guard constantly. And there is nothing like a major sporting event to get everyone up on their toes: nervous, but hopefully also fully alert to what might happen...
Erasing the data on Solid State Drives...
Thanks to Solid State Drives (SSD), the wider world has now become our office. But there are many thorny issues regarding the retirement of these assets...
Click here for the full contents..
January - Featuring
Editor's Comment: Welcome to the first Newsletter of 2014 - and a happy new year to everyone! I hope you have a successful - and safe - year to come...
At your own risk...
Keeping business systems safe and protecting your data has never been more difficult to achieve. And it is only likely to become harder. Getting the right risk management strategy in place is critical...
Click here for the full contents..

2013 eNewsletters
December - Featuring
Editor's Comment: It was what many people working in London’s financial and banking sectors feared might happen one day: a brutal and sustained attack on their businesses that would leave them in tatters. But these would not be...
The Internet's Light And Dark Sides
While the internet can be a positive force for good, it is also a haven for the very bad - and it doesn't get much worse than cybercrime. What is being done to protect UK businesses? Are the cybercriminals getting the upper-hand in a one-way battle? Brian Wall finds out...
Click here for the full contents..
November - Featuring
Editor's Comment: Welcome to the November edition of the Computing Security Newsletter. And let me say straight away what a great night of celebrations it was at the recent 2013 Computing Security Awards, as people from right across...
BYOD - How to make it your friend
BYOD - bring your own device - is enjoying enormous growth and that is likely only to accelerate. However, opinion is still divided as to whether it is a force for good or bad. Brian Wall reports...
Click here for the full contents..
October - Featuring
Editor's Comment: Welcome to the October edition of the Computing Security Newsletter. No matter how high the defences we stack up against them, the more the cybercriminals come back to carry out another frenzied assault...
Malware and Malpractices
Despite the potential threats, as many as 25% of all PCs remain unprotected. Why is there such a poor attitude to security in some quarters? Computing Security finds out...
Click here for the full contents..
August - Featuring
Editor's Comment: Welcome to the August edition of the Computing Security Newsletter. The threat the UK is facing from cyber attacks is disturbing in its scale and complexity. The Intelligence and Security Committee (ISC) of...
Winners all the Way!
The Computing Security Awards are now a 'must attend' date in the calendars of more and more businesses. 2013 is certain to be as hotly contested as ever before...
Click here for the full contents..
July - Featuring
Editor's Comment: Welcome to the July edition of the Computing Security Newsletter. Here, you will find all the latest news, views and happenings relating to security - and the major issues that businesses are having to engage...
Security with App-titude
Apps are everywhere, it would appear, and spreading like wildfire. What are the security implications? and just how do you keep pace?...
Click here for the full contents..
March - Featuring
Editor's Comment: Hello... and Welcome to the March edition of the Computing Security Newsletter. Here, you will find all the latest news,views and happenings relating to security - and the major issues that businesses are having to engage...
2013 - Where will it take us?
What are likely to be the major challenges that organisations are faced with in the year ahead? Computing Security quizzes those in the know...
Click here for the full contents..