Backup Collaboration Mobile Security Storage Strategy Virtualisation
ALL | CAD | Cloud Hosting | Construction | Document | Green | Networking | Security | Storage

Article Index: Security>(Topic)>(Company)>(Product)>(Editorial)>(Date)      

Sort Articles By :    Most Popular           Latest     

Current Page: 1        | 1 | 2 | 3 |        1460 Article(s)  Total Views of these articles: 2027223

Battling the breaches

Type: Masterclass       Published: 03-2020      Views: 85   
Description: A glut of breaches across the UK is prompting many organisations to seek Cyber Essentials audit.

CEOs in the firing line

Type: Industry Focus       Published: 03-2020      Views: 31   
Description: Why you can't rely on others to get your Public Key Infrastructure in order - and what happens if you don't. Andrew Jenkinson, Group CEO, Cybersec Innovation Partners, offers his insights.

COVID-19: A new level of threat

Type: Comment       Published: 03-2020      Views: 21   
Description: We are all well aware of the 'enemies at the gate': the hackers and attackers looking for every opportunity to seize data by exploiting weaknesses in your defences. Breaches have reached new heights, with no organisation, however large or small, immune from such assaults

Homing in on COVID-19

Type: Industry View       Published: 03-2020      Views: 48   
Description: As the impact of the COVID-19 virus escalates, more and more employees are working from home. But dangers lurk there as well and urgent action needs to be taken

The intelligent Approach to Cyber Threat Intelligence

Type: Special Focus       Published: 03-2020      Views: 28   
Description: Seeking someone who can understand vulnerability, exploitation and attacker motivation? Ian Thornton-Trump, Chief Information Security Officer for Cyjax, may have the answer

Rich vein of possibilities

Type: Feature       Published: 03-2020      Views: 29   
Description: Hitachi and Ubisecure are joining forces to integrate their finger vein recognition and Identity-as-a-Service (IDaaS) technologies. Will similar collaborations follow?

The plot thickens

Type: Opinion       Published: 03-2020      Views: 32   
Description: What chance secure data management might have altered the outcomes of certain landmark films? Charlotte Williams, marketing & PR manager at total information management company Shredall SDS Group, offers her insights

Essential building blocks

Type: Opinion       Published: 03-2020      Views: 27   
Description: From Network Access Control (NAC) to Network Segmentation, addressing the need for a more secure network architecture is vital, states Myles Bray, VP EMEA at Forescout

Cybercrime figures 'tip of the iceberg'

Type: Feature       Published: 03-2020      Views: 32   
Description: A reported fall in 'computer misuse' disguises a link with the rise in fraud, it is claimed

Cloud Protection for Salesforce from F-Secure

Type: Review       Published: 03-2020      Views: 29   
Description: Cloud-based services have caught on fast, offering a range of benefits to organisations of every kind.

Breached - and totally unaware

Type: Analysis       Published: 03-2020      Views: 40   
Description: If a cyber breach were to take place within organisations that took part in a recent poll, a staggering 47.6% conceded they simply would not know it had actually happened

Why cybersecurity policy & GDPR compliance aren't so different

Type: Industry View       Published: 03-2020      Views: 43   
Description: The combined forces of further regulation and new technology will underpin data security in the years ahead, argues Robert Allen - European Director of Marketing & Technical Services at Kingston Technology

Spoof attack unleashed

Type: Special Focus       Published: 03-2020      Views: 28   
Description: The Coronavirus is constantly in our thoughts, as its global impact spreads. And it's proving another means for hackers and attackers to get inside organisation's security defences

More 20/20 visions

Type: Feature       Published: 03-2020      Views: 35   
Description: As cyber anxiety manifests itself ever more widely, Part 2 of our top predictions for 2020 looks at the many challenges that lie ahead

World-wide malice

Type: Security Update       Published: 03-2020      Views: 23   
Description: The impact of indiscriminate malicious activity online is soaring and estimated to hit a global price tag of $6 trillion by next year.

Flowmon Anomaly Detection System

Type: Review       Published: 03-2020      Views: 29   
Description: Traditional security tools, often signature based, can be very effective in defending against specific threats, but many focus exclusively on North/South network traffic

The Quantum crypto revolution

Type: Technology Focus       Published: 03-2020      Views: 20   
Description: Commercially available encryption systems are already with us and their potential is huge, although the technology still has many issues that must be overcome.

Cryptshare Releases Proven QUICK Technology - Award-Winning, Secure Data Transmission Solution

Type: News       Published: 02-2020      Views: 154   
Description: Technology Simplifies Encrypted File Exchange with "Create One-Time, Use Forever" Passwords

Rise of Disruptionware

Type:       Published: 02-2020      Views: 82   
Description: Inside Forescout’s latest joint report with the Institute for Critical Infrastructure Technology

Malwarebytes Launches Enhanced Cloud Platform, MSP Premier Partner Program

Type: News       Published: 02-2020      Views: 103   
Description: Simplified dashboards enable easy deployment, reporting and operational control

CISCO/Tenable Press Release

Type: News       Published: 01-2020      Views: 210   
Description:

DHS warns of potential cyber threat from Iran, attacking ICS networks

Type: News       Published: 01-2020      Views: 212   
Description: Concerns about an Iranian cyber response to the recent American military strike in Baghdad grew earlier this week with the US Department of Homeland Security urging organisations to be on heightened alert for denial-of-service and other more destructive attacks.

Looking ahead…

Type: Masterclass       Published: 01-2020      Views: 187   
Description: A term coined at SecurEnvoy, A Shearwater Group plc Company, as being absolutely critical states: ‘Identity of the user, Identity of the device and Identity of the data’. Here, CEO Steve Watts reveals why this is so when it comes to data creation, data control and management, and the art of controlling data movement

Synopsys Discuss Open Source Projects and their handling of Sensitive Data

Type: News       Published: 01-2020      Views: 227   
Description: It has been reported that open-source software projects continue to struggle with handling sensitive information, according to automated scans of hundreds of millions of commits to code repositories. Driven by increased research into software security, more software under development, companies' greater openness to vulnerability reporting, and perhaps most of all - improvements to the process of recording vulnerability reports - the number of software security issues published in the National Vulnerability Database rose to the highest recorded level in 2019, surpassing 17,300 issues reported during the year.

Microsoft To End Support for Windows 7

Type: News       Published: 01-2020      Views: 169   
Description: On January 14th, Microsoft will discontinue support for Windows 7. This means any PCs still running the software will no longer receive security updates, software updates, or technical support for any issues. If people continue to use a Windows 7 PC after the January end date, the computer will still work however it will become more vulnerable to security risks and viruses

The ramifications of misaddressed email: more than just an embarrassing mishap

Type: Opinion       Published: 01-2020      Views: 193   
Description: With the number and sophistication of cyber attacks increasing significantly, organisations have had to become aware and adapt to new and evolving digital threats. Yet, many would still consider the simple error of sending an email to the wrong contact trivial, at most embarrassing, but not of concern when it comes to data security. However, misaddressed emails have far-reaching consequences that can seriously impact an organisation, especially in highly regulated industries such as healthcare and finance.

Invoice Fraud and Business eMail Compromise – a major threat for 2020

Type: Opinion       Published: 01-2020      Views: 441   
Description: By Dr Debbie Garside, Group Chief Innovation Scientist/CEO GeoLang, The Shearwater Group plc

“54% of businesses are worried about invoice fraud”

Business Fraud is costing organisations up to 10% of their expenditure.

According to the Annual Fraud Audit 2019, [http://www.crowe.ie/wp-content/uploads/2019/08/The-Financial-Cost-of-Fraud-2019.pdf] average losses per company range between 3% and 6% with some as high as 10% of expenditure being attributed to fraud of some kind – overall an average rise from 4% to 7% in 2018.

Microsoft issues critical Windows security fix after tip off from U.S. NSA

Type:       Published: 01-2020      Views: 152   

Description: Microsoft Corp on Tuesday rolled out an important security fix after the U.S. National Security Agency tipped off the company to a serious flaw in its widely used Windows operating system, officials said. Microsoft said the flaw could allow a hacker to forge digital certificates used by some versions of Windows to authenticate and secure data. Exploiting the flaw could have potentially serious consequences for Windows systems and users

NHS Foundation Trust goes live with eObservations using Imprivata Tap & Go implemented in 8 weeks

Type: News       Published: 01-2020      Views: 167   
Description: New solution accelerates path to digital maturity and enables clinicians to electronically record patient vital signs quickly and securely via shared mobile devices, improving quality of care and patient safety

ISO 27701: the new international privacy standard to demonstrate compliance with privacy laws

Type: Special Focus       Published: 01-2020      Views: 140   
Description: In August 2019, the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) released a new privacy standard set to become the benchmark for helping organisations comply with international privacy frameworks and laws. ISO/IEC 27701:2019 serves as a privacy extension to the internationally recognised management standard for information security, ISO/IEC 27001, which already enjoys significant global adoption rates

Nozomi Networks and ElevenPaths Partner to Deliver Advanced IT and OT Security Services Worldwide

Type: News       Published: 01-2020      Views: 137   
Description: Relationship strengthens ElevenPaths’ portfolio of managed security services with deep cyber physical systems solutions and expertise, and also strengthens Nozomi Networks’ coverage and capabilities to deliver advanced It and OT Security Services through Telefonica’s Intelligent SOCs

Cybersecurity Service Provider Bulletproof Releases Its Annual Cybersecurity Industry Report

Type: News       Published: 01-2020      Views: 153   
Description: Bulletproof has released its Annual Cybersecurity Industry Report. The report is based on data that Bulletproof's penetration testing and Security Operations Centre (SOC) teams processed in 2019, which amounted to 15,000 events per second and billions of logs each month. Results show that the most pervasive of critical flaws, offering hackers an easy opening into an environment, are once again outdated components.

nCipher unveils cloud-first architecture, bringing security and control to public & private clouds

Type: News       Published: 01-2020      Views: 122   
Description: New web services APIs and container technology streamline integration of nShield® HSMs with cloud environments, bringing high assurance security to enterprise cloud migration

Are we all fed up of GDPR yet?         

Type:       Published: 01-2020      Views: 131   
Description: Now is the time to embrace all of the positives the General Data Protection Regulation can deliver, says Steve Mellings, CEO and founder of ADISA

Putting business at peril         

Type:       Published: 01-2020      Views: 566   
Description: Kyle Chrzanowski, AT&T Cybersecurity Consultant, looks at the dangers of tech advancement without the insurance of security risk assessment

baramundi Management Suite 2019 R2

Type: Review       Published: 01-2020      Views: 183   
Description: Enterprises struggling to manage and secure their desktops and mobiles need a unified endpoint management (UEM) solution to wrest back control

BEC scams rampage         

Type:       Published: 01-2020      Views: 129   
Description: Business email compromise (BEC) scams are on the rampage, striking organisations of all colours, from big corporations such as Google and Facebook, to more financially humble victims, amongst these universities. Why the massive surge?

Application security tools for empowering IT teams         

Type:       Published: 01-2020      Views: 104   
Description: There's nothing like the start of a new year to bring out the predictions of online oracles...

Looking ahead...         

Type: Masterclass       Published: 01-2020      Views: 73   
Description: A term coined at SecurEnvoy, A Shearwater Group plc Company, as being absolutely critical states: 'Identity of the user, Identity of the device and Identity of the data'. Here, CEO Steve Watts reveals why this is so when it comes to data creation, data control and management, and the art of controlling data movement

At home in the cloud         

Type:       Published: 01-2020      Views: 174   
Description: The long-held notion in many quarters that the cloud might be less secure than on-premise appears to be on the wane, making it an increasingly attractive proposition

A time for change

Type: Comment       Published: 01-2020      Views: 65   
Description: According to a new industry report, one out of every three enterprises is sending its employees to work in challenging conditions without the latest available equipment and technology, increasing the potential for data leakages and data breaches

Operation Blackout         

Type:       Published: 01-2020      Views: 58   
Description: With election-tampering by foreign powers now a global concern, a simulation exercise in London to examine government readiness to resist an anarchic group's hacking attempts had particular significance - it took place on the eve of the UK General Election

Enterprise-wide Network Segmentation with Forescout eyeSegment

Type: Review       Published: 01-2020      Views: 1172   
Description: Network segmentation is increasing in popularity, as it is proving to be a highly effective security strategy. Segmentation can reduce the attack surface presented by today's legacy flat networks, limit the impact of network intrusions and prevent lateral movement, if breaches occur

Kingston Technology IronKey D300S

Type: Review       Published: 01-2020      Views: 121   
Description: With the EU GDPR (General Data Protection Regulation) now in full force, all businesses have a legal duty to protect sensitive and personal data whilst it's in transit - and that means encrypting it

Single Sign-On Comes of Age

Type:       Published: 01-2020      Views: 117   
Description: Numb fingers from typing in multiple passwords? Relief may Well be at hand, as Norman Begg, head of marketing at My1Login, explains

Meteoric rise, soaring talent         

Type:       Published: 01-2020      Views: 124   
Description: After quitting her job as a home shopping picker in an ASDA supermarket, Stephanie Haynes has gone on to win a national award for her work in the automotive cybersecurity field. Here is her story

The year of living dangerously         

Type:       Published: 01-2020      Views: 154   
Description: In Part 1 of our top predictions for cybersecurity in 2020, we ask the experts for their insights into what may lie ahead for our industry

R&S Cloud Protector from Rohde & Schwarz Cybersecurity

Type: Review       Published: 01-2020      Views: 189   
Description: The case for website and web application protection is well established, but it's time for review

Stopping up the breaches         

Type:       Published: 01-2020      Views: 169   
Description: Of the 5,000-plus breaches reported in 2019, hacking is still the top breach type, exploiting new vulnerabilities to access sensitive information

VIPRE SafeSend

Type: Review       Published: 01-2020      Views: 174   
Description: In today's highly pressured work environments, it really is all too easy to enter the wrong email recipients or accidentally select 'Reply All' when sending a message. At a personal level, it may lead to some grovelling, but in a business environment it could prove potentially catastrophic

nCipher nShield® XC Hardware Security Modules Achieve Common Criteria EAL4+ Certification

Type: News       Published: 12-2019      Views: 259   
Description: nShield® HSMs certified to eIDAS Protection Profile EN 419 221-5

Think before you click

Type: Opinion       Published: 12-2019      Views: 293   
Description: Human error is always going to be a major factor in any organisation’s cyber threat landscape. VIPRE Security look at some of the ways in which employers can help to mitigate those risks

CoSoSys launches Endpoint Protector 5.2.0.7

Type: News       Published: 12-2019      Views: 595   
Description:

New College Oxford

Type: Case Study       Published: 12-2019      Views: 178   
Description: Situated in the very heart of the city, New College is one of the largest and most architecturally striking colleges in Oxford, combining outstanding facilities with spectacular buildings and gardens set against the medieval city wall

Enterprise Mobile Security: How to reduce the cybersecurity threat

Type: Opinion       Published: 12-2019      Views: 550   
Description: Tom Davison, EMEA Technical Director at Lookout examines how modern businesses can scale up their mobile security. As employees using company devices become an ever more attractive target for attack how can companies protect their endpoints?

Cybersecurity in 2020: Key considerations for UK businesses

Type: Opinion       Published: 12-2019      Views: 420   
Description: Cybersecurity is a global concern. From the smallest business up to the largest international enterprise protecting critical information assets and infrastructure is vital to maintain business integrity and reputation. Device Visibility and Control experts, Forescout, look at the UK cybersecurity Industry and what might be key to remaining secure over the coming months

Honda Data Breach

Type: News       Published: 12-2019      Views: 187   
Description:

Caught in the crosshairs – Why SMBs are prime targets for cyberattacks

Type: News       Published: 11-2019      Views: 1250   
Description: SMBs have a target on their back when it comes to cybersecurity. Here George Anderson, Product Marketing Director at Webroot explains why, and what SMBs can do about it

Forescout Transforms Enterprise-Wide Network Segmentation with Release of Cloud-Based eyeSegment

Type: News       Published: 11-2019      Views: 365   
Description: • Forescout eyeSegment ties together fragmented segmentation point solutions in a scalable approach across campus, data centre, cloud and OT
• Enables a Zero Trust approach to implementing granular security controls and reducing operational complexity of network segmentation projects


Nozomi Networks Unveils Community Edition of its Cyber Security Platform

Type: News       Published: 11-2019      Views: 342   
Description: Helps security and risk management teams expand their security programmes by providing visibility into OT and IoT assets

Raising the Standard!

Type: Masterclass       Published: 11-2019      Views: 295   
Description: Rob Treacey, MD, Technology Risk Management, and Antony Tuttle, Senior Consultant and QSA at Xcina Consulting, a Shearwater Group plc company, offer their insights on the latest PCI-DSS Standard developments

Airbus Launches Human Centric Cyber Security Accelerator

Type: News       Published: 11-2019      Views: 270   
Description:

Kaspersky to process & store data of its customers from the United States & Canada in Switzerland

Type: News       Published: 11-2019      Views: 328   
Description: The company will also open its fourth Transparency Center, the first in Latin America, in Sao Paulo in January 2020

Libraesva and Palo Alto Networks

Type: News       Published: 11-2019      Views: 283   
Description: Email Security IoC Feed Integration

MetaCompliance Brings Cyber Security Awareness

Type: News       Published: 11-2019      Views: 232   
Description: Training to Life with New Live-Action Nanos

DigiCert & Ubisecure partner for next-gen Legal Entity Identifier organisation identity solutions

Type: News       Published: 11-2019      Views: 317   
Description: The companies will collaborate on extending the use of Legal Entity Identifiers (LEI) for multiple types of digital certificate-based use cases

Promoting IT sustainability through risk management         

Type: Industry View       Published: 11-2019      Views: 356   
Description: E-waste is the largest-growing waste stream. By changing our 'use and discard' approach, this is an area where we can make a significant impact, says Steve Mellings, CEO and founder of ADISA

Raising the Standard!

Type: Special Focus       Published: 11-2019      Views: 171   
Description: Rob Treacey, MD, Technology Risk Management, and Antony Tuttle, Senior Consultant and QSA at Xcina Consulting, a Shearwater Group plc company, offer their insights on the latest PCI-DSS Standard developments

The ITAD rebate scam

Type: Industry Focus       Published: 11-2019      Views: 228   
Description: Jean-pierre Naylor, director, CDL, takes a look at practices relating to redundant IT equipment - PRACTICES he feels give the industry a bad name

Bigger phish - and true champions!

Type: Comment       Published: 11-2019      Views: 190   
Description: In yet another high-profile and worrying instance of phishing in action, the United Nations has been made aware of various correspondences, being circulated via e-mail, from Internet web sites, text messages and via regular mail or facsimile, falsely stating that they are issued by, or in association with, the UN and/or its officials

The Professionalisation of the Darknet         

Type: Security Update       Published: 11-2019      Views: 353   
Description: Movement away from the Darknet, as actors scatter in all directions, is making it ever harder to keep tabs on who is selling what, where and to whom, says Mark Pearce, chief marketing officer, CYJAX

A failure to protect

Type: Feature       Published: 11-2019      Views: 281   
Description: Facebook has suffered a succession of serious data leaks that have left customer data worryingly exposed. The company's past promises to reform its processes and protect these precious assets seem little better than hollow and worthless

Eliminating wastage

Type: Opinion       Published: 11-2019      Views: 271   
Description: A thorough risk assessment is essential when deciding where security efforts need to be concentrated - and in defining the budget needed to make this happen, says Eoin Keary, CEO and founder of edgescan

Caught in an endless struggle         

Type: Industry Focus       Published: 11-2019      Views: 339   
Description: Nearly 80% of organisations rank cyber risk as a top-five concern, yet only 11% have a high degree of confidence in their ability to assess cyber threats, prevent cyber-attacks and respond effectively

Jumping on the Band Wagon         

Type: Special Focus       Published: 11-2019      Views: 454   
Description: The latest data breach from Facebook is not all that it seems, states Dr Debbie Garside, Group Chief Innovation Scientist/CEO of GeoLang, A Shearwater Group plc Company

In poor health         

Type:       Published: 11-2019      Views: 181   
Description: Given the critical role healthcare plays within society and its relationship with our most sensitive information, the vast risks now posed to the sector are deeply concerning. Time for the network, server, perimeter and endpoint to be robustly protected

The security wipe-out threat         

Type:       Published: 11-2019      Views: 172   
Description: Imagine quantum computing becoming so powerful, it could destroy today's cryptographic protections in an instant. Time to get ready for the fightback

Caught in the crosshairs: Why SMBs are prime targets for cyberattacks

Type:       Published: 11-2019      Views: 149   
Description: SMBs have a target on their back when it comes to cybersecurity, says George Anderson, product marketing director at Webroot, who explains why - and what SMBs can do about it

Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 142   
Description: EXCELLENCE SHINES THROUGH

Email Security Solution of the Year - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 142   
Description: WINNER: Libraesva

Anti Malware Solution of the Year - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 133   
Description: WINNER: SonicWal

Incident Response and Investigation Provider of the Year - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 133   
Description: WINNER: Cyjax

Network Security Solution of the Year - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 135   
Description: WINNER: Neustar

Encryption Solution of the Year - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 132   
Description: WINNER: Egress

DLP Solution of the Year - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 136   
Description: WINNER: iboss

Identity and Access Management Solution of the Year - Computing Security Awards 2019

Type: Awards       Published: 11-2019      Views: 114   
Description: WINNER: Swivel Secure

Anti Phishing Solution of the Year - Computing Security Awards 2019

Type: Awards       Published: 11-2019      Views: 139   
Description: WINNER: Metacompliance

Anti Ransomware/Anti DDos Solution of the Year - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 132   
Description: WINNER: Relate Data

Secure Data Erasure Company of the Year - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 112   
Description: WINNER: Computer Disposals

Education and Training Provider of the Year - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 132   
Description: WINNER: KnowBe4

Pen Testing Solution of the Year - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 114   
Description: WINNER: Edgescan

Web Application Firewall of the Year - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 125   
Description: WINNER: Pulse Secure

The Compliance Award - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 112   
Description: WINNER: ADISA

Security Distributor of the Year - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 109   
Description: WINNER: Brigantia

Security Reseller of the Year - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 122   
Description: WINNER: Brookcourt Solutions

Security Recruitment Company of the Year - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 124   
Description: WINNER: Beecher Madden

Security Service Provider of the Year - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 548   
Description: WINNER: Brookcourt Solutions

New Hardware Solution of the Year - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 107   
Description: WINNER: Kingston Technology

New Software Solution of the Year - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 109   
Description: WINNER: Vipre Security

New Cloud-Delivered Solution of the Year - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 131   
Description: WINNER: Rohde & Schwarz Cybersecurity

SME Security Solution of the Year - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 112   
Description: WINNER: Redscan

Enterprise Security Solution of the Year - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 130   
Description: WINNER: My1Login

The Customer Service Award - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 137   
Description: WINNER: Endace

Security Project of the Year - Healthcare and Education - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 108   
Description: WINNER: King Edward V11’s Hospital/Redscan

Security Project of the Year - Public and Charity Sectors - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 107   
Description: WINNER: Stop the Traffik/Cyjax

Security Project of the Year – Private Sector Various - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 131   
Description: WINNER: ABAX/KnowBe4

Cloud-Delivered Security Solution of Year - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 134   
Description: WINNER: SecurEnvoy

Editors Choice - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 105   
Description: WINNER: Computer Disposals

Threat Intelligence Award - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 117   
Description: WINNER: Webroot

The Contribution to CyberSecurity Award - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 114   
Description: WINNER: Debbie Garside

The ‘One to Watch’ Security Company - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 95   
Description: WINNER: Adarma

Security Company of the Year - Computing Security Awards 2019         

Type: Awards       Published: 11-2019      Views: 125   
Description: WINNER: Brookcourt Solutions

GeoLang Launches Ascema Sensitive Data Discovery One-Off Scan Service

Type: News       Published: 10-2019      Views: 411   
Description: GeoLang Ltd, a Shearwater Group plc Company, has announced the latest addition to its Ascema Sensitive Data Discovery technology platform: Scan-as-a-Service

SecurEnvoy Welcomes Canadian Cloud IT Service Provider Vickohm as a key Cloud Services Partner

Type: News       Published: 10-2019      Views: 327   
Description: SecurEnvoy, A Shearwater Group plc Company and a global software leader in cybersecurity technologies including MFA and DLP, is proud to announce the addition of Vickohm to its Cloud and Accredited Partner Program

NTT Ltd Announces Winners of Inaugural Northern Europe Women in Cybersecurity Awards

Type: News       Published: 10-2019      Views: 389   
Description: Candidates from BAE and Barclays shine through in exceptional field of finalists

Cybereason and SecureLink partner to deliver new security services to Nordics, Benelux, UK And Dach

Type: News       Published: 10-2019      Views: 263   
Description:

SecurEnvoy launches SecureIdentity Data Loss Protection

Type: News       Published: 09-2019      Views: 467   
Description: SecurEnvoy, A Shearwater Group plc company is excited to announce the release of SecureIdentity Data Loss Protection; the latest offering in the company’s signature SecureIdentity Platform

ALTODIGITAL NETWORKS LTD

Type: Case Study       Published: 09-2019      Views: 281   
Description:

MERTHYR TYDFIL COUNTY BOROUGH COUNCIL

Type: Case Study       Published: 09-2019      Views: 274   
Description: Merthyr Tydfil County Borough Council (MTCBC) has worked in partnership with the team at Bob’s Business for ten years.

Riding the learning curve         

Type: Feature       Published: 09-2019      Views: 533   
Description: Artificial Intelligence (AI) applies Machine Learning, deep learning and other techniques to solve actual problems. But there are downsides, too, security wise that can harm the unwary, as editor Brian Wall reports

Put to the test         

Type: Feature       Published: 09-2019      Views: 386   
Description: The rise of biometrics has brought a rise in hackers trying to fool the system, using spoofs or fake biometrics. One argument to circumvent this is compulsory standardised testing

Understanding Data Loss Protection         

Type: Masterclass       Published: 09-2019      Views: 361   
Description: Steve Watts, CEO of SecurEnvoy, A Shearwater Group plc Company, offers his insights on how the ideal DLP solution can protect all categories of valuable data, against all manner of risky situations

Too little, too late

Type: Comment       Published: 09-2019      Views: 277   
Description: Some 73% of chief information and security officers (CISOs) of financial institutions plan to ask their organisations' chief financial officer for an increase in cybersecurity investments in the next year - and that can hardly be surprising, given the levels of breaches we have been seeing so far this year

The dark shadow that hangs over everyone         

Type: Special Focus       Published: 09-2019      Views: 512   
Description: Cryptojacking and shadow mining are terms most of us have heard. But how do they differ and what threats does each of these pose?

Joining forces in Fightback         

Type: Industry View       Published: 09-2019      Views: 410   
Description: Email and data security company Mimecast has launched a Cyber Alliance Program, designed to align security vendors into an extensive cyber resilience ecosystem

edgescan         

Type: Review       Published: 09-2019      Views: 804   
Description: As cybercriminals become ever more inventive, enterprises must look for new ways of countering the latest threats, if they want to survive

Ransomware strikes entire cities         

Type: Industry Focus       Published: 09-2019      Views: 501   
Description: Governments and healthcare organisations have now become key targets in an increasingly aggressive campaign of ransomware attacks

The spies inside your emails         

Type: Feature       Published: 09-2019      Views: 394   
Description: Unprotected emails can leave us open to exploitation on a massive scale, including government agencies. How can we fight back? Brian Wall reports

Bring your devices, not your problems         

Type: Opinion       Published: 09-2019      Views: 524   
Description: When staff bring their own devices into work, security can be greatly compromised. Rob Allen, director of marketing & technical services, Kingston Technology Europe, offers a number of approaches to allay such risks

Libraesva Email Archiver         

Type: Review       Published: 09-2019      Views: 512   
Description: Email is still the dominant form of communication in the workplace, so businesses must protect their messaging systems by implementing a robust email archiving solution

Winning ways         

Type: Industry View       Published: 09-2019      Views: 362   
Description: When the UK's largest commercial FTSE 100 property company went in search of a technology partner to deliver at the highest level, it turned to OryxAlign

Deep, dark and dangerous

Type: Industry View       Published: 09-2019      Views: 291   
Description: Half of industrial control system networks have faced a cyber-attack, as hacking groups seek out geo-political advantage or financial gain

Smoke - with plenty of fire         

Type: Feature       Published: 09-2019      Views: 556   
Description: When a ransomware attack takes place, losses can be measured in millions of dollars and thousands of hours of remediation work. Yet relatively simple measures can prevent most of these from happening

SecurEnvoy SecureIdentity DLP         

Type: Review       Published: 09-2019      Views: 453   
Description: SecurEnvoy is a pioneer in the field of multi-factor authentication (MFA) and now turns this expertise to identity, access and data security management

Figuring out the figures!         

Type: Opinion       Published: 09-2019      Views: 295   
Description: What are the potential hidden costs of deploying multi-factor authentication? Adrian Jones, CEO, Swivel Secure, offers his thoughts

Caught in the cross-hairs         

Type: Feature       Published: 09-2019      Views: 258   
Description: Ethical hackers can storm through the defences of educational institutions and seize their high-value data within a matter of a mere two hours

it-sa 2019 The IT Security Expo and Congress

Type: News       Published: 09-2019      Views: 505   
Description: Nuremberg, Germany / 8-10 October 2019

OneLogin Expands Security Platform with Industry-First Solution to Fight Top Cybersecurity Threats

Type: News       Published: 09-2019      Views: 375   
Description: Built with Privacy in Mind, Shield Protects the Enterprise by Combating Password Reuse

'edgescan supporting technology creativity in the community'

Type: News       Published: 09-2019      Views: 391   
Description: CoderDojo is a global volunteer-led community of free programming workshops for young people between 7 and 17

GeoLang releases Ascema Data Discovery 2.4 with new Hero Report

Type: News       Published: 08-2019      Views: 1039   
Description: GeoLang, a Shearwater Group plc company, has announced that the latest version of their Ascema Data Discovery software – with brand new features including its dynamic Hero Report – is now available for licencing and procurement

Over 40% of UK organisations believe they cannot stop cyber attacks

Type: News       Published: 07-2019      Views: 561   
Description: According to a new global survey from CyberArk, 43 percent of UK organisations believe attackers can infiltrate their networks each time they try. As organisations increase investments in automation and agility, a general lack of awareness about the existence of privileged credentials – across DevOps, robotic process automation (RPA) and in the cloud – is compounding risk.

Social Engineering and Red Teaming: Risks, rewards and approaches that work         

Type: Masterclass       Published: 07-2019      Views: 2325   
Description: Paul Harris, CEO, Pentest Ltd, A Shearwater Group plc company, explains the benefits that Open Source Intelligence (OSINT) can deliver in the ongoing battle against cyber attacks

Nation in transformation         

Type: Comment       Published: 07-2019      Views: 307   
Description: I note that a new report (yes, I know - how many more can there be!) is claiming to serve as a reality check on digital transformation by outlining where organisations actually are in the process

The state we're in         

Type: Analysis       Published: 07-2019      Views: 447   
Description: It isn't just the energy sector, communications and industrial organisations that are at risk of attack from nation states and other malicious actors. The economy itself is vulnerable, with UK banks right in the firing line

Fully in the flow         

Type: Industry Focus       Published: 07-2019      Views: 550   
Description: Document Logistix uses DAST to ensure security of sensitive customer data

Leading scale-ups boost cyber security future         

Type: Special Focus       Published: 07-2019      Views: 425   
Description: Twenty fast-growth cyber scale-ups have been accepted on to the first national cyber security growth programme - and they mean business

GDPR - opportunity, not threat         

Type: Opinion       Published: 07-2019      Views: 546   
Description: GDPR has increased demand for data protection processes that are flexible, autonomous and easy to use. Debbie Garside, Group Chief Innovation Scientist at Shearwater Group and CEO of Geolang, explains

GDPR bares its teeth         

Type: Feature       Published: 07-2019      Views: 694   
Description: With the one-year anniversary of GDPR come and gone - and the first few hefty fines now imposed by the regulators - we look at what it all means for the future of the industry

Critical mass         

Type: Feature       Published: 07-2019      Views: 638   
Description: Critical asset owners increasingly have to protect their ICT infrastructures against cyber attacks. It's no longer enough for the supplier of a single machine component or subcomponent to claim it is cyber-secure - the entire machine must be so

Who can you really bank on?         

Type: Research       Published: 07-2019      Views: 357   
Description: Those who rely on their online bank to keep their money safe might be alarmed to hear that last year 54% of these institutions allowed attackers to steal money. And their customer data may be equally at risk

Safetica Data Loss Prevention         

Type: Review       Published: 07-2019      Views: 1068   
Description: Data leak prevention (DLP) is now an essential security measure for businesses, but a major concern for many is the lengthy deployment processes for some products

Education, education, education!         

Type: Industry View       Published: 07-2019      Views: 358   
Description: Cybersecurity needs to be a priority for the education sector, argues Adrian Jones, CEO of Swivel Secure

Threat or treat         

Type: Industry View       Published: 07-2019      Views: 877   
Description: How organisations should best manage, detect and respond to a data breach is an on-going question. But an intelligence-driven strategy is an essential part of that

Getting to grips with endpoint detection and response         

Type: Opinion       Published: 07-2019      Views: 372   
Description: Keith Maskell, head of cybersecurity, Titan Data Solutions, takes a close-up look at what he sees as an important new concept in distribution - EDR and Packaged SOC Services

Webroot Business Endpoint Protection         

Type: Review       Published: 07-2019      Views: 429   
Description: Webroot takes data security to the next level, as its Business Endpoint Protection teams up multi-vector protection with cloud-based machine learning

Security leaders spin out of ECS Group to form Adarma

Type: News       Published: 06-2019      Views: 432   
Description: A management buyout backed by private equity firm Livingbridge has created one of the largest independent security services companies in the UK, serving FTSE 250 organisations

Think like an Attacker: A strategic risk-based approach to cyber security

Type: Opinion       Published: 05-2019      Views: 1965   
Description: Occurrences of data theft, corporate reputational damage, cybercrime, state-sponsored actors and hacktivists would fill several volumes - with room to spare. A strategic approach to cyber security has never been more necessary or urgent

Why Data Leakage Protection is Necessary for Endpoint Security

Type: