2024 Issues |
July-August - Featuring |
Editor's Comment:
Why continuous security training should have a role to play in the long-term development of all |
PDF Version
|
Is this Directive in the right direction?
New EU-wide legislation is focused on stepping up cybersecurity attack compliance
|
Click here for the full contents... |
May-June - Featuring |
Editor's Comment:
European start-ups and SMEs need all the help they can get to develop AI models, with more established and resource-rich organisations forging ahead |
PDF Version
|
Microsoft recent email breach labelled
Microsoft source code and 'other secrets' compromised by Midnight Blizzard attack
|
Click here for the full contents... |
March-April - Featuring |
Editor's Comment:
A new taskforce is being set up by a number of leading accounting and security organisations in the UK, as cybersecurity threats hit unprecedented levels |
PDF Version
|
Is AI already beyond control?
We invited consultancy and implementation agency WeAreBrain to give us its take on the likely future of this controversial technology
|
Click here for the full contents... |
January-February - Featuring |
Editor's Comment:
A provisional agreement is paving the way for what would be a landmark deal on the use of artificial intelligence |
PDF Version
|
Support-line aims to ward off attackers
With almost a third of UK businesses reporting a cyber breach or attack in the past 12 months, a cyber and data security support line has been launched
|
Click here for the full contents... |
2023 Issues |
November-December - Featuring |
Editor's Comment:
We all need recourse to legal services at various times in our lives and rely on these firms to protect our interests during those transactions |
PDF Version
|
Leadership skills - why they matter
With so many threats faced by organisations, leaders who can motivate and guide the workforce are vitally important
|
Click here for the full contents... |
September-October - Featuring |
Editor's Comment:
The idea that we can ever protect the overwhelming majority of organisations from suffering severe cyber-attacks has long been put out to pasture |
PDF Version
|
Tensions mount
The continued geopolitical tensions, stronger regulation and AI-shaped revolution forecast by Infosecurity Europe's security community are all intensifying as 2023 enters its final phase
|
Click here for the full contents... |
July-August - Featuring |
Editor's Comment:
More than 3,600 people are looking to embark on a new career in cyber this year through applications to the UK government's 'Upskill in Cyber' programme. |
PDF Version
|
Russia's cyber rampage
Businesses warned to brace for impact from barrage of attacks
|
Click here for the full contents... |
May-June - Featuring |
Editor's Comment:
In the face of escalating attacks on every front, the imperative for organisations to deliver the appropriate levels and quality of cybersecurity training to their workforce has never been greater |
PDF Version
|
Wake-up call goes out to businesses
More than half of IT departments are saddled with the burden of compliance, warns a Hornetsecurity survey
|
Click here for the full contents... |
March-April - Featuring |
Editor's Comment:
In the face of escalating attacks on every front, the imperative for organisations to deliver the appropriate levels and quality of cybersecurity training to their workforce has never been greater |
PDF Version
|
Do We Still Need Firewalls?
In short, yes - now more than ever. There has never been a greater or more deliberate threat to information and communication systems...
|
Click here for the full contents... |
January-February - Featuring |
Editor's Comment:
Data ethics is no longer an academic or niche geek issue, as it has been since the inception of the internet and the world wide web. It has never been more urgent. |
PDF Version
|
EU e-signatures – what’s their legal status?
Across Europe, the majority of businesses have replaced wet ink signatures with electronic signatures when handling documents like sales contracts...
|
Click here for the full contents... |
2022 Issues |
November-December - Featuring |
Editor's Comment:
Data ethics is no longer an academic or niche geek issue, as it has been since the inception of the internet and the world wide web. It has never been more urgent. |
PDF Version
|
Why ransomware is 'moving towards data destruction'
Signs of a new data extortion technique show threat actors may leverage Exmatter to destroy, rather than encrypt, data, according to a Cyderes Threat Report
|
Click here for the full contents... |
September-October - Featuring |
Editor's Comment:
How likely is it that criminal gangs are going to return all your data intact and untarnished after a ransomware attack, if you comply with their requirements and pay whatever it is they demand of you? |
PDF Version
|
Hornetsecurity launches next-generation Security Awareness Training
Cyber criminals are constantly innovating and attacks are on the rise: Hornetsecurity's 2022 Ransomware Report found that 60% of attacks came from phishing attempts.
|
Click here for the full contents... |
July-August - Featuring |
Editor's Comment:
Saturday, 7 May, this year marked the first anniversary of the infamous Colonial Pipeline hack, which ended with a ransom fee of US$4.4 million being handed over. |
PDF Version
|
Gas giant hit by ransomware attack
IT system brought down as energy crisis mounts
|
Click here for the full contents... |
May-June - Featuring
|
Editor's Comment:
Saturday, 7 May, this year marked the first anniversary of the infamous Colonial Pipeline hack, which ended with a ransom fee of US$4.4 million being handed over. |
PDF Version
|
Chains of freedom
Supply chains are prone to wild swings and uncertainties. How can they be stabilised and less exposed, in order to create a cooperative supply-chain platform?
|
Click here for the full contents... |
March-April - Featuring
|
Editor's Comment:
There is still a clear lack of diversity and inclusion in tech.
|
PDF Version
|
The cloud conundrum
Cloud, in its various shapes, is often hailed as the way forward - so why is it sometimes so poorly protected? Computing Security finds out where the cracks are in an increasingly cloud-laden age
|
Click here for the full contents... |
January-February - Featuring
|
Editor's Comment:The first ever Government Cyber Security Strategy was launched on 25 January, in a move to further protect the public services people rely on.
|
PDF Version
|
Ransomware finds its next big victim: governments
Alarming surge in ransomware and malicious cyberattacks
|
Click here for the full contents... |
2021 Issues |
November-December - Featuring
|
Editor's Comment:The 2021 Computing Security Awards were back live at a gala evening in London.
|
PDF Version
|
Secure Password Reset 'made easy' with SecurEnvoy SecurPassword
Michael Urgero, Senior Security Engineer, SecurEnvoy, offers his insights on solving the problem of lost passwords for users and the support team
|
Click here for the full contents... |
September-October - Featuring |
Editor's Comment:Jeffrey Carpenter and (posthumously) Dan Kaminsky are the latest to be inducted into FIRST's Incident Response Hall of Fame. They join past inductees Ian Cook, Don Stikvoort and Klaus-Peter Kossakowski... |
PDF Version |
Quantum leaps - and bounds
Quantum computers will soon smash through the mathematical cryptography we rely on as a society, it is forecast. How do we keep ourselves safe then? |
Click here for the full contents... |
May-June - Featuring |
Editor's Comment:NTT launched its annual Global Threat Intelligence Report recently and some of the key findings are not going to provide great reassurance to most organisations... |
PDF Version |
The real artificial intelligence revealed
Can AI help transform the industry, making it sharper, wiser and less vulnerable?... |
Click here for the full contents... |
March-April - Featuring |
Editor's Comment:Apprenticeships are the solution to attracting more young people into cybersecurity, according to 42.5% of respondents to a new Twitter poll run by Infosecurity Europe, Europe's information security event... |
PDF Version |
Through a glass darkly
We asked several industry commentators for their views on where 2021 will lead us, as we continue to grapple with COVID19... |
Click here for the full contents... |
January-February - Featuring |
Editor's Comment:Apprenticeships are the solution to attractiing more Young people into cybersecurity,acccording to 42.5% of respondents to new Twitter poll run by infosecurity Europe,... |
PDF Version |
From data lockdown to digital transformation
Businesses need insight, not just data, when it comes to digital transformation, according to Peter Ruffley at Zizo... |
Click here for the full contents... |
2020 Issues |
November-December - Featuring |
Editor's Comment:Recent research has revealed that GDPR doesn't go far enough in the eyes of many IT leaders and employees, who are calling for greater tech regulations around data protection and cyber security.... |
PDF Version |
HACKERS FOR HIRE
Hacker for hire groups are on the rampage globally, leaving a trail of destruction in their wake. The right cyber resilience strategies... |
Click here for the full contents... |
September-October - Featuring |
Editor's Comment: |
|
Cyber threats - legally speaking
Data breaches are becoming more prevalent and the legal sector is a favoured target, falling victim to cyber-attacks at an alarming rate... |
Click here for the full contents... |
July-August - Featuring |
Editor's Comment:
It was not good news to see in a recent report that a massive 67% of all malware in Q1 2020 was delivered via encrypted HTTPS connections... |
|
Open and shut case
Being open to ethical disclosure is vital, states Paul Ritchie, Managing Security Consultant, Pentest Limited... |
Click here for the full contents... |
Working from HOME - Special |
Editor's Comment: Nearly half of cybersecurity staff have been taken off security duties to assist with equipping a mobile workforce and incidents have doubled during the pandemic... |
PDF Version |
Voice of hope
What is hailed as a significant step forward in the UK's fight against online harm has been taken, with the launch of the Online Safety Tech Industry Association (OSTIA)... |
Click here for the full contents... |
May-June - Featuring |
Editor's Comment:By any Measure, the recent revelations that cyber scammers have been using SMS alerts to Wrongly inform people they have been in contact with someone who has tested positive for coronavirus... |
PDF Version |
Remote workers targeted
Attackers have been quick to seek out ways of exploiting the many vulnerabilities laid bare by home working... |
Click here for the full contents... |
March-April - Featuring |
Editor's Comment:We are all well aware of the 'enemies at the gate': the hackers and attackers looking for every opportunity to seize data by exploiting weaknesses in your defences... |
PDF Version |
CEOs in the firing line
Why you can't rely on others to get your Public Key Infrastructure in order - and what happens if you don't. Andrew Jenkinson, Group CEO, Cybersec Innovation Partners, offers his insights... |
Click here for the full contents... |
January-February - Featuring |
Editor's Comment:According to a new industry report, one out of every three enterprises is sending its employees to work in challenging conditions without the latest available equipment and technology... |
PDF Version |
Putting business at peril
Kyle Chrzanowski, AT&T Cybersecurity Consultant, looks at the dangers of tech advancement without the insurance of security risk assessment... |
Click here for the full contents... |
2019 Issues |
November-December - Featuring |
Editor's Comment:In yet another high-profile and worrying instance of phishing in action, the United Nations has been made aware of various correspondences, being circulated via e-mail, from Internet web sites... |
PDF Version |
Riding the learning curve
Facebook has suffered a succession of serious data leaks that have left customer data worryingly exposed. The company's past promises to reform its processes and protect these precious assets... |
Click here for the full contents... |
September-October - Featuring |
Editor's Comment:Some 73% of chief information and security officers (CISOs) of financial institutions plan to ask their organisations' chief financial officer for an increase in cybersecurity investments in the next year... |
PDF Version |
Riding the learning curve
Artificial Intelligence (AI) applies Machine Learning, deep learning and other techniques to solve actual problems. But there are downsides, too... |
Click here for the full contents... |
July-August - Featuring |
Editor's Comment:I note that a new report (yes, I know - how many more can there be!) is claiming to serve as a reality check on digital transformation by outlining where organisations actually are in the process... |
PDF Version |
The state we're in
It isn't just the energy sector, communications and industrial organisations that are at risk of attack from nation state and other malicious actors... |
Click here for the full contents.. |
May-June - Featuring |
Editor's Comment:It is deeply concerning to hear that universities' high-value data can be obtained by hackers in less than two hours - concerning, though not surprising... |
PDF Version |
Think like an Attacker: A strategic risk-based approach to cyber security
Occurrences of data theft, corporate reputational damage, cybercrime, state-sponsored actors and hacktivists would fill several volumes... |
Click here for the full contents.. |
Mar-Apr - Featuring |
Editor's Comment:It seems that organisations are struggling to keep their cybersecurity workforce fully staffed, as competitors increasingly pick off employees enticed by higher pay and bonuses... |
PDF Version |
Future imperfect
In Part 2 of our coverage of top predictions for cybersecurity in 2019, we offer further expert insights and future-gazing from those in the know |
Click here for the full contents.. |
Jan-Feb - Featuring |
Editor's Comment:Security web scans and analysis on over 80,000 European Magento websites - the most popular e-commerce platform globally... |
PDF Version |
Brought down to earth
Cybercriminals who carried out a hack on British Airways compromised the data of around 380,000 passengers |
Click here for the full contents.. |
2018 Issues |
November-December - Featuring |
Editor's Comment:Following a recent spate of aggressive phishing attacks on NHSmail - the email service approved by the Department of Health and Social Care... |
PDF Version |
9 million Brits fall victim to cybercrime
Consumers increasingly feel companies should be responsible for protecting victims - but is that simply surrendering responsibility? |
Click here for the full contents.. |
September-October - Featuring |
Editor's Comment:When I misplace something - phone, house keys, bank card etc - it tends not to have devastating consequences for thousands of other people... |
PDF Version |
Education, Education, Education - And Phishing!
An organisation's worst enemy can still be its staff when it comes phishing attacks |
Click here for the full contents.. |
July-August - Featuring |
Editor's Comment: It would appear that many leading websites, including Amazon and Wikipedia, are failing to support users with advice on how to securely protect their data... |
PDF Version |
Full-on visibility
When fast-growing company HubSpot needed to gain better visibility of devices on their network and track down potential malicious activity, it turned to ForeScout |
Click here for the full contents.. |
May-June - Featuring |
Editor's Comment: Every NHS trust that has been tested against cyber security standards since 2017's WannaCry attack has failed, NHS Digital has revealed, with plans... |
PDF Version |
Sun or rain, bring it on!
Is the cloud right for everyone? That, says one leading observer, is the wrong question. "Like any evolutionary development, it's our current reality." |
Click here for the full contents.. |
Mar-Apr - Featuring |
Editor's Comment: A new and deeply disturbing report from Big Brother Watch reveals that UK councils are severely unprepared for cybersecurity threats, with 25%... |
PDF Version |
Deadly game of Hide 'n' Seek
Bitdefender researchers have uncovered an emerging botnet that uses advanced communication techniques to exploit victims and build its infrastructure |
Click here for the full contents.. |
Jan-Feb - Featuring |
Editor's Comment: It is worrying to hear that some UK banks still aren't telling regulators about all the cyber-attacks wreaked on the financial services industry... |
PDF Version |
Hacking on the cheap
A team of experts bypassed an iPhone's fingerprint sensor and manipulated facial and voice recognition security systems on various banking apps. |
Click here for the full contents.. |
2017 Issues |
Nov-Dec - Featuring |
Editor's Comment: The breach of the Appleby law firm, now dubbed the 'Paradise Papers', has seen a raft of salacious information pour out into the public domain... |
PDF Version |
Mighty storm unleashed
New cyber-storm clouds are gathering, threatening even more potential damage than the fearsome Mirai botnet of 2016 |
Click here for the full contents.. |
Sept-Oct - Featuring |
Editor's Comment:I note that the Institute of Information Security Professionals (IISP) has released the first IISP Knowledge Framework as part of its commitment... |
PDF Version |
Pragmatism and computing security
Rodolfo Saccani, Libraesva Security R&D manager, outlines the benefits of a pragmatic approach to email security |
Click here for the full contents.. |
July-August - Featuring |
Editor's Comment:A total of 69% of board-level executives are neglecting to ensure the UK businesses they
run will comply with the General Data Protection Regulation (GDPR... |
PDF Version |
Torn by tough choices
Organisations face a dichotomy - while mobile technology brings operational benefits, it also introduces the compromise of network security... |
Click here for the full contents.. |
May-June - Featuring |
Editor's Comment:Should we be surprised by the news that one in five businesses have fallen victim to cyber
attacks in the past year - or is this now almost a given?... |
PDF Version |
Mass data breaches eliminated
Panoptex Technologies is a software company out of the U.S. that's making waves by providing an industry first: a massive scale NoSQL database... |
Click here for the full contents.. |
March-April - Featuring |
Editor's Comment:The recent revelation (in a blog) by security researcher Troy Hunt that data from CloudPets teddy bears was being leaked and ransomed online... |
PDF Version |
Malware malevolence
The average data breach results in a cost of $158 per stolen record and is often not detected for an average of 229 days, it is estimated. |
Click here for the full contents.. |
Jan-Feb - Featuring |
Editor's Comment:It is a mark of the times we live in that a new line-up of cybersecurity degrees has been
launched to help fight hackers and online criminals, as demand for skilled specialists
grows... |
PDF Version |
Time to stop living in fantasy land
National Lottery operator Camelot did not have the greatest of years in 2016. No doubt it took plenty of money, but it also took plenty of flak... |
Click here for the full contents.. |
2016 Issues |
Nov-Dec - Featuring |
Editor's Comment:The dark web is regarded as a breeding ground for crime - a secretive and murky part of the world wide web that requires special software to gain entry... |
PDF Version |
Who's afraid of APT?
An advanced persistent threat (APT) uses multiple phases to break into a network, avoid detection and harvest valuable information over the long term... |
Click here for the full contents.. |
Sept-Oct - Featuring |
Editor's Comment:The loss or theft of important data over the past two years has been on a staggering scale... |
PDF Version |
Beyond The Nightmare
Governance, risk and compliance are vitally important, especially as more and more legislation is introduced that could have grave consequences for any enterprise that flouts its rules... |
Click here for the full contents.. |
July-August- Featuring |
Editor's Comment:The loss or theft of important data over the past two years has been on a staggering
scale.... |
PDF Version |
Battle for Cloud domination
The biggest concern in cloud right now is security. According to Oracle executive chairman Larry Ellison: "We need much better security. We need a next-generation of security... |
Click here for the full contents.. |
May-June - Featuring |
Editor's Comment: At a time when too many enterprises are succumbing to cyber attacks and breaches that often leave their businesses badly damaged, even devastated... |
PDF Version |
After the flood
With mobile devices now seemingly everywhere, and more and more applications pouring into the market, mobile monitoring and device management have never been so vital... |
Click here for the full contents.. |
Mar-Apr - Featuring |
Editor's Comment: The top security threats plaguing enterprises over the past year figure prominently in a new report released by Hewlett Packard Enterprise (HPE)... |
PDF Version |
Upping the ante with anti-malware
Combating malware means going way beyond locating suspicious programs on servers and workstations, and detecting and interfering with the use of malware on the network... |
Click here for the full contents.. |
Jan-Feb - Featuring |
Editor's Comment: As we wend our way through the early part of 2016, thoughts inevitably turn to the threat landscape and that niggling worry in the back of the mind... |
PDF Version |
The race to better cyber security
GCHQ seeks to draw line under UK organisations' poor cyber strategies... |
Click here for the full contents.. |
2015 Issues |
Nov-Dec - Featuring |
Editor's Comment: Encryption is vital for protecting precious data. But, in the wrong hands, it can be a weapon that is turned upon its owner - with devastating consequences... |
PDF Version |
CODE RED! An essential guide to protecting your data
How should organisations minimise the likelihood that unauthorised code is able to manipulate applications, in order to access, steal... |
Click here for the full contents.. |
Sept-Oct - Featuring |
Editor's Comment: It's alarming to hear that the services used by hundreds of thousands of people � legitimately to protect their identity on the web ... |
PDF Version |
Chasing away the turbulent clouds
Security skills are in limited supply and, as such, cost and retention of security teams can be a significant challenge. ... |
Click here for the full contents.. |
July-August - Featuring |
Editor's Comment: According to a new survey by iStorage, almost a third of public and private sector professionals are not aware of what the forthcoming EU General... |
PDF Version |
Hand-to-hand combat
How concerned should businesses in the UK be about cyber assaults � are the attackers gaining the upper hand... |
Click here for the full contents.. |
May-June - Featuring |
Editor's Comment: Would you consider stripping your employees of company smart phones and memory sticks to protect your business from cyber attacks... |
PDF Version |
Acunetix Online Vulnerability Scanner
In today's competitive global markets, SMBs need to protect their web sites from hackers just as much as enterprises do, but few have the financial resources... |
Click here for the full contents.. |
Mar-Apr - Featuring |
Editor's Comment: Following the recent Anthem breach � where the USA's second largest health insurer was hacked, exposing personal details... |
PDF Version |
Risk - And Reward
The message is clear: organisations must adopt a more agile risk-based approach to cyber security, if they are to address new challenges at short notice... |
Click here for the full contents.. |
Jan-Feb - Featuring |
Editor's Comment: No new year can ever come along without a wealth of security predictions already hanging on tenaciously to its young coat-tails... |
PDF Version |
Negotiating the more slippery slopes
With the average cost of security breaches to large organisations increasing to between �600k-�1.15m* in the last year... |
Click here for the full contents.. |