Backup Collaboration Mobile Security Storage Strategy Virtualisation
ALL | CAD | Cloud Hosting | Construction | Document | Green | Networking | Security | Storage

Article Index: Security>(Topic)>(Company)>(Product)>(Editorial)>(Date)      

Sort Articles By :    Most Popular           Latest     

Current Page: 1        | 1 | 2 | 3 |        1460 Article(s)  Total Views of these articles: 2019859

Game on!

Type: Case Study       Published: 05-2014      Views: 47973   
Description: Games Workshop found that the value of its electronic communications was being severely eroded by a deluge of spam, phishing emails and other unwanted messages. Now its chosen solution means spam is all but eliminated and ‘false positives’ are near to zero. Here’s how it was achieved

Five FTP Server Security Fails: FTP Issues and How to Avoid Them         

Type:       Published: 01-2015      Views: 32602   
Description: When Patrick Clark, network analyst, higher education, Greenville, NC, asked fellow analysts and engineers for their thoughts on how FTP servers could be more secure, the prevalent response was: "Don't use them." Here follows his own take on this

New University of Oxford study warns of the increasing risk of internal cyber-attacks

Type: News       Published: 08-2014      Views: 26381   
Description: In a new Harvard Business Review article, Professor David Upton of Said Business School, and Professor Sadie Creese of Oxford’s Global Cyber Security Capacity Centre warn that internal cyber attacks against companies are an increasing threat that costs tens of billions of dollars a year worldwide, can destroy companies, and sink the careers of many senior executives.

Female techie boosts cyber security team         

Type: News       Published: 10-2016      Views: 24031   
Description: First -class honours security engineering graduate Preena Patel has joined Equilibrium Security - and becomes the latest of three graduates to join its security engineering team in the last 12 months

Acunetix Online Vulnerability Scanner         

Type: Review       Published: 05-2015      Views: 11176   
Description: In today's competitive global markets, SMBs need to protect their web sites from hackers just as much as enterprises do, but few have the financial resources to ensure they are totally secure

Feel the fear - and take to the clouds anyway!

Type:       Published: 09-2014      Views: 9339   
Description: The worldwide market for cloud computing is expected to top $57.4 billion by the end of this year - double that of only a few years ago. Does this signal a brave new world of 'cloud without borders'?

IoT - the good and the bad         

Type:       Published: 03-2017      Views: 8152   
Description: With as many as 30 billion machines and other physical products expected to be hooked up to the Internet, can organisations really stay safe? Brian Wall reports

Gemalto SafeNet ProtectV 2.0         

Type: Review       Published: 05-2015      Views: 7649   
Description: The cost benefits alone make moving virtualised data centres into the cloud a no-brainer, but concerns about security are still a major stumbling block

Malware malevolence         

Type:       Published: 03-2017      Views: 7204   
Description: The average data breach results in a cost of $158 per stolen record and is often not detected for an average of 229 days, it is estimated. Where should the fightback against malware begin?

Sane strategies in risk-infested waters

Type: Industry Focus       Published: 11-2015      Views: 7202   
Description: What steps does any business have to take to get governance, risk and compliance right - and what dangers might surface along the way?

Libra ESVA 3.5 Review         

Type: Review       Published: 05-2015      Views: 6894   
Description: Based in Italy, Libra scores over the big names in the anti-spam market as its ESVA (email security virtual appliance) offers tough messaging security at a very affordable price. Ideally suited to enterprises and SMBs alike, ESVA employs a 13-step filtering process and claims a near-perfect spam detection rate

Friendly Fire: the insider threat         

Type:       Published: 01-2016      Views: 6891   
Description: Nullifying the malicious insider threat poses a different challenge to that of solving the intruder threat. So what are your options when the attackers are inside the building?

Ixia ThreatARMOR         

Type: Review       Published: 11-2016      Views: 6656   
Description: The amount and sophistication of cyber-attacks is increasing exponentially and many enterprises are finding their security systems are wilting under the pressure

No more password buck-passing!         

Type: Opinion       Published: 05-2016      Views: 6507   
Description: Do weak passwords keep you awake at night? David Hald of SMS PASSCODE and Dan Evans of VCW Security explain just why they should, in a follow-up to our feature last issue

The Internet's Light And Dark Sides

Type: Industry Focus       Published: 11-2013      Views: 6242   
Description: While the internet can be a positive force for good, it is also a haven for the very bad - and it doesn't get much worse than cybercrime. What is being done to protect UK businesses? Are the cybercriminals getting the upper-hand in a one-way battle? Brian Wall finds out

Who's afraid of APT?         

Type:       Published: 11-2016      Views: 6194   
Description: An advanced persistent threat (APT) uses multiple phases to break into a network, avoid detection and harvest valuable information over the long term. How do you fight back against those odds? What should be your strategy? Brian wall reports

Identity In Crisis

Type: Industry Focus       Published: 09-2013      Views: 5919   
Description: How do you ensure you have the right identity access management system in place that protects you from exposure to charges of non-compliance? Brian Wall finds out

Security Service Provider of the Year – Computing Security 2015

Type: Awards       Published: 11-2015      Views: 5753   
Description: WINNER: ZeroDayLab

Who Holds the Upper Hand?

Type: Industry Focus       Published: 05-2014      Views: 5656   
Description: With mobile devices now seemingly everywhere, and more and more applications flooding the market, mobile monitoring and device management have never been so vital.

Sun Shines On Cloud

Type: Industry Focus       Published: 09-2013      Views: 5504   
Description: The market for cloud, or Internet, computing is hitting the stratosphere. Market research firm IDC expects businesses worldwide to spend $57.4 billion by next year – with more to come. Brian Wall reports

Thinking your way to safety         

Type:       Published: 07-2016      Views: 5047   
Description: The tools and technology that can help organisations to embrace a secure future are close to hand. But first they need to put the structures in place to make that happen

2013 - Where Will It Take Us?

Type: Opinion       Published: 01-2013      Views: 5014   
Description: What are likely to be the major challenges that organisations are faced with in the year ahead? Computing Security quizzes those in the know

Don't be a data breach casualty!         

Type: Industry Focus       Published: 07-2015      Views: 4772   
Description: Today's highly sophisticated cyber attacks demand a security system that continuously develops and resists the abundance of attack patterns the 'enemy' now employs

When the cracks start to show

Type: Industry Focus       Published: 01-2014      Views: 4667   
Description: A comprehensive compliance strategy can be onerous to achieve, but, if not enforced, leave businesses highly vulnerable. It's the challenges compliance brings that makes some organisations avoid enforcing it - often to their regret. Brian Wall reports

Single point of control         

Type:       Published: 03-2015      Views: 4648   
Description: Identity and access management solutions - how much of a difference do they really make to an enterprise's defences? Computing Security asks those in the know.

Chasing away the turbulent clouds         

Type:       Published: 09-2015      Views: 4588   
Description: Security skills are in limited supply and, as such, cost and retention of security teams can be a significant challenge. this is a major factor now driving the growing race to the cloud – though it’s far from the only one, as computing security reports

What will be Big in 2014?

Type: Industry View       Published: 01-2014      Views: 4532   
Description: The burning issues that organisations are in the throes of dealing with this year are already proving to be highly challenging, as we enter the second quarter of 2014. Brian Wall reports

Heading In The Right Direction

Type: Industry Focus       Published: 05-2013      Views: 4531   
Description: What are the key steps needed to get governance right, specifically where overall security is concerned? And what are the obstacles that can surface along the way?

Password Protected: A Survey on Two-Factor Authentication

Type: White Paper       Published: 02-2013      Views: 4404   
Description:

Out Of The Lab And Into The Wild

Type: Industry Focus       Published: 05-2013      Views: 4397   
Description: What are the best ways to defend and protect your vital company information, using the latest technology and defence strategies? Computing Security has been investigating

GhangorCloud Information Security Enforcer         

Type: Review       Published: 07-2016      Views: 4389   
Description: Security breaches relating to IT now have such serious consequences that enterprises must protect to survive

macmon NAC         

Type: Review       Published: 07-2015      Views: 4305   
Description: Network access control has traditionally had a mixed reception in enterprises, as all too many solutions are notoriously difficult to install, complex to manage and expensive

Why the Pen can be mightier than the sword

Type: Industry Focus       Published: 03-2014      Views: 4187   
Description: Penetration ('pen') testing is the practice of attacking your systems and network to seek out any vulnerabilities that others might try to exploit. It could save you and your customers from the hackers and attackers out there

Avoiding The Security Black Hole

Type: Industry Focus       Published: 05-2013      Views: 4127   
Description: In this second part of our focus on collaboration, we conclude our investigations into the ever-increasing sharing and utilisation of data across businesses.

Secure Mobile Workflows

Type: White Paper       Published: 08-2013      Views: 4078   
Description: The majority of employees now demand their choice of apps, collaboration spaces, and cloud storage. Each personalized, consumer-grade workspace enables productive collaboration: employees can efficiently navigate around their workdays and a host of smartphones and tablets.

ManageEngine EventLog Analyzer

Type: Review       Published: 01-2014      Views: 4021   
Description: ManageEngine's EventLog Analyzer (MEA) offers an interesting alternative to the mainstream SIEM (security information and event management) solutions, as its low price makes it highly suited to SMEs

Cloud's silver lining for the mobility age

Type: Industry Focus       Published: 01-2014      Views: 4014   
Description: Is a cloud-based security model the way forward - one that is not reliant on where users are or what devices they are using to access the web or cloud applications? Computing Security reports

At your own risk…

Type: Industry Focus       Published: 01-2014      Views: 3980   
Description: Keeping business systems safe and protecting your data has never been more difficult to achieve. And it is only likely to become harder. Getting the right risk management strategy in place is critical

BYOD - How to make it your friend

Type: Industry Focus       Published: 11-2013      Views: 3947   
Description: BYOD - bring your own device - is enjoying enormous growth and that is likely only to accelerate. However, opinion is still divided as to whether it is a force for good or bad. Brian Wall reports

The Exploitation Game         

Type: Industry Focus       Published: 11-2015      Views: 3928   
Description: What steps can be taken to detect and block exploits as soon as they attempt to use software vulnerabilities? And how can businesses get a clear understanding of the behaviour of legitimate software components?

Time to share the pain         

Type: Feature       Published: 07-2018      Views: 3903   
Description: Is the cloud right for everyone? That, says one leading observer, is the wrong question. "Like any evolutionary development, it's our current reality." But woe betide those who fail to take every security measure along the way

IBM Steps Up Security Investment

Type: Industry Focus       Published: 09-2013      Views: 3850   
Description: IBM has closed the deal to acquire Trusteer, greatly furthering its investment in cloud-delivered software and services

Human frailty

Type: Industry Focus       Published: 05-2014      Views: 3829   
Description: Most data breaches are the result of mistakes, negligence or unexpected system glitches. Human nature dictates that they will always happen, so businesses must take pre-emptive action now to stop them occurring

Titania Nipper Studio

Type: Review       Published: 07-2013      Views: 3811   
Description: Total compliance with data protection regulations is now essential, otherwise businesses could find themselves faced with hefty fines. There are a wide range of security auditing solutions available, but some can be prohibitively expensive, many rely only on network scanning and few extend their focus beyond firewalls

Cloud-based services: Easing the IT burden while taking control

Type: White Paper       Published: 02-2013      Views: 3805   
Description: The potential benefits of employing cloud-based services, either in place of existing IT resources or alongside them, are undoubtedly significant. This white paper examines some of the benefits for IT administrators when their applications or services are moved to or managed via the cloud.

Aiming high with IAM

Type: Industry Focus       Published: 05-2014      Views: 3794   
Description: Poorly controlled identity & access management (iam) processes can lead to a myriad of problems, such as regulatory non-compliance where an organisation is audited and company data found to be at risk of being misused. Brian Wall reports.

Data loss threats on Macs

Type: Opinion       Published: 09-2013      Views: 3732   
Description: Roman Foeckl, CEO of CoSoSys, looks at how Macs became part of company networks and how to deal with the challenges this can bring

The Dark Side Of Trust

Type: Industry Focus       Published: 01-2013      Views: 3723   
Description: 'Who can you trust?' is one question that needs to be pondered when considering your corporate security. But even more so: 'Who should you trust?' Brian Wall reports.

Security with App-titude!

Type: Industry Focus       Published: 03-2013      Views: 3645   
Description: Apps are everywhere, it would appear, and spreading like wildfire. What are the security implications? and just how do you keep pace?

After the flood         

Type: Industry Focus       Published: 05-2016      Views: 3638   
Description: With mobile devices now seemingly everywhere, and more and more applications pouring into the market, mobile monitoring and device management have never been so vital

To err is human, but…         

Type:       Published: 05-2015      Views: 3608   
Description: According to the IBM Security Services 2014 Cyber Security Intelligence Index report, over 95% of all incidents investigated recognise human error as a contributing factor.

GFI LanGuard 2014

Type: Review       Published: 09-2013      Views: 3533   
Description: Focusing on endpoint vulnerability assessment, patch management and auditing, LanGuard has been a stalwart member of GFI's security suite for many years.

Are you getting it right?

Type: Industry Focus       Published: 01-2013      Views: 3511   
Description: How far do you take company policy when trying to control computer usage? There's a fine line between what is acceptable, it seems, and overstepping the mark. Brian Wall investigates in this second part of our report.

The data security divide

Type: Industry Focus       Published: 11-2013      Views: 3469   
Description: Barely a week goes by without yet another media report about a high-profile leak of confidential data. How can these breaches be stopped?

Shielding off the Phishers

Type: Industry Focus       Published: 01-2013      Views: 3448   
Description: Phishing, spear phishing, pharming - the threats from hackers are constantly multiplying and their means of breaching defences ever more cunning. How do you keep them at arm's reach?

Towering challenge

Type: Industry Focus       Published: 07-2013      Views: 3414   
Description: Just like the story of the Tower of Babel, technology often speaks in FAR too many tongues - encryption being a case in point. It's time for greater unity of voice and purpose

Success at InfoSec         

Type: Events       Published: 07-2015      Views: 3403   
Description: Infosec 2015 bustled and thrived for three days in June at its new London base OF Olympia. Computing Security was there to catch all the action.

Sharp Eye On The Main Chance

Type: Industry Focus       Published: 11-2012      Views: 3398   
Description: Security compliance should mean exactly that - not something that can be worked around or ignored, especially by the 'privileged few'. But how do you set up your compliance processes in the first place? Brian Wall reports, in this second part of our focus !

GFI LanGuard 2014 R2

Type: Review       Published: 05-2014      Views: 3397   
Description: GFI clearly has a solid development program for its LanGuard software, as only a few months have passed since it launched version 2014 and already it has released a major R2 update

MDM: Quick fix or IT security redesign?

Type: Industry Focus       Published: 05-2013      Views: 3384   
Description:

Mobile Device Management (MDM) addresses the unique needs of a growing computing platform

Sun or rain, bring it on!         

Type: Opinion       Published: 05-2018      Views: 3344   

Description: Is the cloud right for everyone? That, says one leading observer, is the wrong question. "Like any evolutionary development, it's our current reality." But woe betide those who fail to take every security measure

Becoming an APT Spycatcher

Type: Opinion       Published: 09-2014      Views: 3304   
Description: Cybercrime has become somewhat 'old school' in its approach today, writes Andy Travers, VP EMEA at Fortinet. It's not always about brute force anymore

IdentityIQ from SailPoint

Type: Review       Published: 04-2012      Views: 3288   
Description:

Titania TEC         

Type: Review       Published: 07-2015      Views: 3277   
Description: UK-based Titania has a sharp focus on data security compliance and its latest TEC aims to make regulatory auditing on all network devices a breeze

Joining the gold rush!

Type: Industry Focus       Published: 07-2013      Views: 3269   
Description: The race is truly on to use apps to gain a competitive advantage. At the same time, applying secure, robust testing must not be sacrificed in the process.

Titania Nipper Studio

Type: Review       Published: 09-2012      Views: 3265   
Description:

The year ahead - what lies in wait?         

Type: Industry Focus       Published: 01-2015      Views: 3210   
Description: 2014 was a tumultuous 12 months: think only Heartbleed, Sony and JP Morgan Chase. 2015 may be even more daunting. Here are some of the things you can look forward to - or not! - according to the experts. Brian Wall reports.

Adapt - or go under!

Type: Industry Focus       Published: 07-2013      Views: 3196   
Description: BYOD is proving a massive challenge for businesses. But standing in the way of such change would be a futile and damaging response, they've been warned.

AhnLab Malware Defense System

Type: Review       Published: 07-2013      Views: 3195   
Description:

Digital evidence is everywhere!

Type: Industry Focus       Published: 03-2013      Views: 3191   
Description: How secure is the information on your smartphone? Who has been looking at your electronic documents and web mail? Welcome to the world of forensics, where the experts know nigh on everything about you.

SolarWinds Log & Event Manager

Type: Review       Published: 09-2013      Views: 3188   
Description: Despite the wide choice of SIEM (security information and event management) solutions, their high prices put most of them beyond the reach of SMEs

To block or not to block?

Type: Editorial       Published: 11-2012      Views: 3176   
Description: As hordes of mobile devices invade the workspace and social media hits new heights, what should THE usage policy be? Many are struggling to find the answer. Brian Wall reports

Powerful updates for CoSoSys Endpoint Protector 4 platform

Type: News       Published: 05-2014      Views: 3165   
Description: CoSoSys, a leading provider of cross-platform data loss prevention (DLP), device control and mobile device management (MDM) solutions, has released a suite of powerful updates for the endpoint protector 4 platform

Heartbleed: the aftermath

Type: Industry Focus       Published: 05-2014      Views: 3159   
Description: While many reports around Heartbleed - the security bug discovered in the OpenSSL cryptography library - have been very much doom and gloom oriented, there are things you can do right away to protect yourself

Cloud gets personal         

Type:       Published: 01-2015      Views: 3157   
Description: IBM has patented the design for a data privacy engine that can help businesses protect personal data as it is shared between countries, including across private clouds.

Celestix Networks seeks out an Edge

Type: News       Published: 05-2014      Views: 3154   
Description: Celestix Networks has recently launched its new Cloud Edge Security Appliance series to enable secure and seamless connectivity across physical, virtual and cloud based servers

It's a mixed-up, muddled up, shook-up world         

Type:       Published: 01-2017      Views: 3149   
Description: Security breaches ripped through the defences of one organisation after another last year. Can we expect 2017 to be any different?

The Worm's Still Turning

Type: Industry Focus       Published: 03-2013      Views: 3119   
Description: In a two-part investigation, computing security looks at the ever-growing threat from worms, viruses and spyware: and how security systems can detect and repel these at all points in the network

Halon Virtual Spam Prevention

Type: Review       Published: 06-2012      Views: 3115   
Description:

Protecting your digital identity         

Type: Industry Focus       Published: 09-2015      Views: 3104   
Description: Digital services are expanding rapidly, making the chances of identity theft an ever greater reality. Businesses must take every step necessary to ensure they don’t become the next victim.

PSN-compliant mobile working

Type: Masterclass       Published: 11-2014      Views: 3098   
Description: A PSN-compliant mobile working solution offers tangible benefits, but it is critical to enter into the process with a robust strategy, cautions Tim Ager of Celestix

A year in recovery

Type: News       Published: 12-2013      Views: 3062   
Description: The continuing proliferation of new drive types and the ever-growing problem of malware were among the biggest trends impacting the data recovery industry in 2013, according to year-end information from data recovery and e-disclosure products and services provider Kroll Ontrack

New EU Data Protection reforms can be used to secure funding for IT security, says Databarracks

Type: News       Published: 09-2014      Views: 3061   
Description: The EU is to impose new data protection legislation to ensure better protection of the personal information of all EU citizens. The reforms will come with more severe fines for organisations that suffer data breaches.

Taking the next step up

Type: Opinion       Published: 11-2014      Views: 3061   
Description: The industry needs to move towards a more holistic view of information and systems, argues Dr Anand Narasimhan, director, Sims Lifecycle Services EU

GFI LanGuard 2014

Type: Review       Published: 09-2013      Views: 3060   
Description: Focusing on endpoint vulnerability assessment, patch management and auditing, LanGuard has been a stalwart member of GFI's security suite for many years

Celestix Networks' HOTPin v3.7

Type: Review       Published: 11-2013      Views: 3047   
Description: The exponential growth of mobile workforces is making businesses rethink their security strategy for remote access, as simple usernames and passwords are not enough

Risk And Reward         

Type: Industry Focus       Published: 09-2012      Views: 3034   
Description: Do you have a risk management strategy in place? If so, how solid is it? Will it withstand the rigours of any security threat? If not, the consequences could be catastrophic, as editor Brian Wall repo

SecurEnvoy SecurAccess 7.1

Type: Review       Published: 09-2013      Views: 2998   
Description: The use of two-factor authentication (2FA) for online security is growing exponentially as businesses move away from inherently insecure username and password combinations

Shared Intelligence is a Must!

Type: Industry Focus       Published: 05-2014      Views: 2969   
Description: Senior figures from government and industry are calling for greater collaboration on how security intelligence is shared to protect against cyber attacks - and ensure security insight spreads beyond I.T. teams to IMPACT boardroom decisions

CODE RED! An essential guide to protecting your data         

Type: Industry Focus       Published: 11-2015      Views: 2969   
Description: How should organisations minimise the likelihood that unauthorised code is able to manipulate applications, in order to access, steal, modify or delete sensitive data? Computing Security investigates

Crime fighters

Type: Industry Focus       Published: 09-2014      Views: 2945   
Description: Cyber threats to the UK remain a Tier-One national security risk. The need for highly skilled experts to help fight has never been so great - or so urgent. Brian Wall reports.

Encryption - a potent partner for protection

Type:       Published: 05-2014      Views: 2923   
Description: Encryption is a powerful ally to have: it ensures that when data is at rest, it cannot be compromised, and, when data is in motion, it cannot be deciphered. But it's the policies behind the practice that make it truly effective

Cold Shoulder Treatment

Type: Industry Focus       Published: 09-2013      Views: 2915   
Description: Many organisations are failing to adopt established industry best practice to protect their clients' information. The need for increased compliance is a fact of life, warns cyber security experts IT Governance

Anti-Virus, the Cloudmark way

Type: Opinion       Published: 09-2014      Views: 2907   
Description: Is there any way to defend against malware that is undetectable once it reaches your computer? The answer is 'yes', says Andrew Conway - lead software engineer at Cloudmark, who explains exactly how.

The Identity of Everything

Type:       Published: 05-2014      Views: 2900   
Description: Has identity now become the cornerstone of 'The Internet of Things' - and, if so, what implications does that have? Computing Security speaks with NetIQ's Geoff Webb

Life beyond the walls         

Type: Industry Focus       Published: 05-2019      Views: 2899   
Description: Constructing high walls around a corporate environment may well be a security approach that is now delivering ever more diminishing returns

Businesses at risk from BYOD?

Type: News       Published: 03-2013      Views: 2893   
Description: Almost a third (31%) of senior managers use personal smartphones for work and close to a quarter (23%) of businesses have a 'bring your own device' (BYOD) policy in place, according to a report by YouGov SixthSense carried out among business owners, IT decision-makers and employees

Data Leaks - Where the buck stops

Type:       Published: 05-2014      Views: 2850   
Description: High-profile leaks of confidential data are constantly in the news - while many more are hushed up. But why are they happening? And who should be responsible for ensuring such breaches do not occur?

Integral Memory Crypto SSD         

Type: Review       Published: 07-2015      Views: 2850   
Description: It beggars belief that, even with all the publicity surrounding data protection, hardly a week goes by without us hearing about yet another government department or business losing sensitive or personal data

Tackling the fraudsters

Type: Opinion       Published: 11-2013      Views: 2845   
Description: Fraud is on the rise. Wherever you surf, tweet or otherwise go online, it rears its devious and lucrative head. Computing Security has been talking to Shaun Hipgrave, an intelligence analytics executive with IBM, about the implications of fraud and what can be done to counteract it

BYOD - handle with care!

Type:       Published: 01-2014      Views: 2844   
Description: Bring your own device - BYOD - has the potential to transform the way an enterprise works. But the process needs careful management, if that experience is to be a truly positive one

Hand-to-hand combat         

Type: Industry Focus       Published: 07-2015      Views: 2844   
Description: How concerned should businesses in the UK be about cyber assaults – are the attackers gaining the upper hand? And how do they best protect themselves from malware?

Beating Back The Cyber Terrorists

Type: Industry Focus       Published: 07-2013      Views: 2836   
Description: The UK's defences against cyber attacks are being strengthened under new plans that will see the Ministry of Defence working with its biggest contractors

New Factor in mobile security from IBM

Type: News       Published: 11-2013      Views: 2790   
Description: IBM scientists have developed a new mobile authentication security technology, based on the radio standard known as near-field communication (NFC)

The human factor          

Type: Industry Focus       Published: 03-2016      Views: 2777   
Description: The barriers that keep any organisation safe from attack are often guarded by nothing more than a single factor of authentication. Just one weakness and the whole business can be breached.

Everything connected - and safe         

Type:       Published: 05-2015      Views: 2765   
Description: The Internet of Everything (IoE) brings together people, process, data and 'things' to make networked connections more relevant and valuable than ever before. But it also brings a great deal of risk that needs to be carefully controlled and managed.

The Access-Lockdown Dilemma

Type: Industry Focus       Published: 03-2013      Views: 2751   
Description: Businesses, many with global operations, are now entering a new level of collaboration and openness that will increase their organisational vulnerability to data breaches. As we all start to share and utilise data on a massive scale, how do we stay safe?

Celestix Networks HOTPin v3.5

Type: Review       Published: 09-2012      Views: 2749   
Description:

Perfectly secure - the impossible dream?

Type: Industry Focus       Published: 09-2012      Views: 2722   
Description: Total security compliance is the Utopia most businesses dream of, but how hard is it to achieve? Is it even possible and, if so, at what cost? How disruptive is it to the business to implement, And wh

GFI WirelessSentry

Type: Review       Published: 05-2014      Views: 2714   
Description: GFI's WirelessSentry (WiSe) takes the expense out of wireless network monitoring by uniquely offering it as a cloud service

'Surely Not' - The Surprising Weakness Of Strong Authentication Technologies

Type: White Paper       Published: 02-2013      Views: 2711   
Description: Dr Basil Philipsz outlines vulnerabilities in current Authentication Technologies and explains how his company, Distributed Management Systems Ltd (DMS), has developed a new innovative solution, CASQUE SNR (CASQUE) that is immune from such flaws.

Big Data Demands Big Thinking

Type: Industry Focus       Published: 09-2013      Views: 2700   
Description: Big data has been dubbed 'the new oil' by the World Economic Forum, greatly improving decision-making, reducing time to market and increasing profits. But it can also raise significant risk

Grave New World

Type: Industry Focus       Published: 05-2014      Views: 2696   
Description: Following the Waking Shark II security scenario at the end of last year, which involved financial firms being hit with a series of cyber attacks in order to test their defences - see box-out - the Bank of England has now announced that it is to employ ethical hackers to conduct penetration tests, in a bid to strengthen cyber security within the financial industry.

The Worm Lives On

Type: Industry Focus       Published: 05-2013      Views: 2694   
Description: In this second part of our investigation, we look at the escalating threat from worms, viruses and spyware – and how security systems can be employed to detect and repel these

The right train of thought         

Type: Industry Focus       Published: 09-2016      Views: 2688   
Description: IT security training could not be more essential. But what should the practices and policies be that underscore this? Who should be responsible for making the decisions relating to that training and how exactly should employees be monitored?

CenterTools DriveLock File Protection

Type: Review       Published: 05-2014      Views: 2680   
Description: Businesses dealing with sensitive or confidential information must take steps to protect it

Time to halt the Torrent

Type: Industry Focus       Published: 11-2014      Views: 2677   
Description: Stopping data leakage requires a robust chain of custody, with a high level of security, auditability and transparency that provides organisations with the visibility to track that information asset right across its lifecycle

Losing Track Of Critical Data Means Trouble In Store

Type: News       Published: 03-2013      Views: 2676   
Description: Commenting on a New York Times story about the governance issues that portable devices and their leaky apps create for companies, Varonis Systems says that mobile access to cloud-based data - and replication to the device itself - has become the new corporate norm

The CR35iNG security appliance from Cyberoam

Type: Review       Published: 09-2014      Views: 2653   
Description: Cyberoam's latest NG Series of security appliances set themselves apart from the competition, as they deliver the best price/performance ratio

DDoS attacks – Potent Weapon

Type: News       Published: 11-2013      Views: 2637   
Description: Fraudsters are increasingly using DDoS attacks to distract institutions during account takeover and other fraudulent schemes, states Avivah Litan of analysts Gartner

Are you being properly served?

Type: Industry Focus       Published: 09-2014      Views: 2635   
Description: Managed security services are designed to help improve information security. but how well do they perform this function? The picture is one of varied results, it would seem.

Law unto itself - university opts for hybrid cloud solution

Type: News       Published: 05-2013      Views: 2633   
Description: The University of Law, the UK's leading professional law school with over a 100 year history, thousands of students and eight locations has today implemented Securstore's Hybrid Cloud solution

All-out Attack

Type: Industry Focus       Published: 09-2014      Views: 2632   
Description: Are Advanced Persistent Threats - APTs - getting out of control? A new report contains some stark findings that may well leave many organisations deeply concerned

315,000 new malicious files detected every day

Type: Industry Focus       Published: 01-2014      Views: 2628   
Description: The overall global Internet threat level has grown by 6.9 percentage points – during 2013, 41.6% of user computers were attacked at least once

Erasing the data on Solid State Drives: Impossible or just difficult?

Type: Industry Focus       Published: 01-2014      Views: 2628   
Description: Thanks to Solid State Drives (SSD), the wider world has now become our office. But there are many thorny issues regarding the retirement of these assets. Steve Mellings, ADISA, and Professor Andrew Blyth, University of South Wales, offer their expert insights

Security? It's in Microsoft's DNA!

Type: Masterclass       Published: 05-2014      Views: 2627   
Description: While many rue what they see as the disappearance of Microsoft from the security business, Tim Ager argues the software giant has never been more committed to the cause

Celebration - and jubilation!

Type: Awards Winner       Published: 11-2013      Views: 2626   
Description: It was another night of huge celebrations at the 2013 Computing Security Awards, as people from right across the industry gathered at the Hotel Russell in London's Russell Square to hear who had triumphed - and would be carrying off the much coveted winners' accolades. 2014 promises to be just as competitive and exciting

Under pressure, taking control         

Type:       Published: 07-2015      Views: 2620   
Description: Managed security services providers may promise the expertise, knowledge and infrastructure you need to secure your information assets from Internet attacks, often at a fraction of the cost of in-house security resources. But does the reality actually live up to the promises?

EOL - Getting it right!         

Type: Industry Focus       Published: 05-2015      Views: 2602   
Description: In a world where data proliferates – and is growing at a staggering rate - ensuring end-of-life (EOL) sensitive data and intellectual property is erased both securely and cost-effectively is crucial. But exactly how do you achieve that goal?

8MAN: from protected-networks.com         

Type: Review       Published: 01-2015      Views: 2592   
Description: A fundamental requirement for meeting compliance regulations is Active Directory (AD) auditing, but many businesses still do not have the tools in place to achieve this effectively

Thycotic Secret Server         

Type: Review       Published: 11-2015      Views: 2580   
Description: Privileged account credentials are the number one target for today's cyber criminals, as they provide easy access to the very heart of a business's IT infrastructure

Upping the ante with anti-malware         

Type: Industry Focus       Published: 03-2016      Views: 2573   
Description: Combating malware means going way beyond locating suspicious programs on servers and workstations, and detecting and interfering with the use of malware on the network

Lepide Auditor Suite 15.2         

Type: Review       Published: 11-2015      Views: 2569   
Description: Change auditing is an essential requirement for enterprises, helping them to comply with ever tougher data protection regulations

Malwarebytes Breach Remediation         

Type: Review       Published: 03-2016      Views: 2552   
Description: Enterprises can never let their guard down in the fight against malware

How safe is your quantified self?

Type: Industry Focus       Published: 09-2014      Views: 2534   
Description: Computing Security talks to Symantec's Orla Cox about the world of self-tracking, monitoring and wearable technology - and the issues around privacy these raise.

Plaudits for the PCI audits

Type: Opinion       Published: 05-2014      Views: 2527   
Description: Ian Whiting, CEO at Titania, offers his insights on PCI-DSS Compliance - and important changes that have now emerged for Pen Testers

Privacy Compliance Laws: the right stuff at last!

Type: Opinion       Published: 01-2013      Views: 2523   
Description: The European Commission's new privacy rules are a golden opportunity to make significant strides forward. ISACA's Marc Vael explains why

Taking Phishing Off The Menu

Type: Industry Focus       Published: 11-2013      Views: 2520   
Description: Halon security's DMARC prevents attacks from spammers targeting spoof weaknesses

CBEST foot forward for banking?

Type: News       Published: 06-2014      Views: 2519   
Description: Geoff Webb, senior director, solution strategy at NetIQ, comments on the Bank of England's new cybercrime testing framework, CBEST.

Concerned about GDPR compliance? VTL could be part of the solution

Type: Feature       Published: 12-2017      Views: 2517   
Description: By now, you have probably heard that we’re set to see the biggest change to data privacy legislation in decades with the introduction of the General Data Protection Regulation (GDPR) on 25th May 2018. But do you know how it will affect different areas of your business, and are you sure that you’ll be compliant by the May deadline?

Technologies to keep you safe         

Type: Opinion       Published: 01-2015      Views: 2505   
Description: With attacks increasing in frequency and sophistication, which are the technologies that can best protect your organisation? Global analyst Gartner offers some insights.

Navigating the forest of security certifications         

Type: Opinion       Published: 03-2015      Views: 2501   
Description: Patrick Warley, global head of research & development at Integral Memory, delivers his insights into the level of quality reassurance provided by the many security certification offerings now 'out there'

UK government launches Cyber Streetwise campaign

Type: News       Published: 01-2014      Views: 2495   
Description: As the UK Government begins its Cyber Streetwise campaign the security industry has been quick to offer its feedback on the launch

Time for friendly enforcement!         

Type:       Published: 01-2015      Views: 2484   
Description: With mobile devices now seemingly everywhere, and more and more applications flooding the market, mobile monitoring and device management have never been so vital.

Network Sentry from Bradford Networks

Type: Review       Published: 06-2012      Views: 2481   
Description:

Massive DDoS Attack Sparks Deeper Fears

Type: Industry Focus       Published: 05-2013      Views: 2477   
Description: A recent attack on anti-spam watchdog organisation spamhaus raises serious industry concerns

Beyond Antivirus

Type: Opinion       Published: 09-2014      Views: 2466   
Description: Comodo's Melih Abdulhayoglu explains his company's unique approach to sandboxing and the powerful protection this delivers

Strategies for Endpoint Security: A Call to Action

Type: Opinion       Published: 09-2013      Views: 2464   
Description: In a world of constant security combat between hackers and security practitioners, corporate IT teams must continually strengthen its security, warns Lawrence Garvin, head geek at SolarWinds

Sealing up the leaks         

Type: Industry Focus       Published: 07-2016      Views: 2464   
Description: What does a successful data protection strategy look like in the face of eroding security perimeters, increasing targeted attacks, and evolving user habits and expectations?

Secure, Rugged Android Tablet

Type: News       Published: 09-2013      Views: 2460   
Description: Becrypt has established a new technology partnership with Getac to provide the first secure Android tablet solution suitable for military, defence and government and wider public sector markets, based on Getac's ruggedised devices

Top 3 data security threats         

Type: Opinion       Published: 05-2015      Views: 2450   
Description: Roman Foeckl, CEO and founder of CoSoSys, offers his insights on how to mitigate threats through a sound data security plan

Things are not always what they SIEM!         

Type:       Published: 03-2015      Views: 2441   
Description: Security information and event management is now widely seen as critical, as vast quantities of data are generated from multiple sources. Brian Wall reports.

Northamber out to shake up security market

Type: Industry Focus       Published: 11-2015      Views: 2430   
Description: With a newly launched solutions division and two security vendors just signed up, distributor Northamber is aiming to drive growth to new heights

Managing The Risks

Type: Masterclass       Published: 09-2013      Views: 2410   
Description: Risk-based authentication is now making its presence felt. Tim Ager of Celestix explains why and what it is all about

HID Global Fuels Adoption Of Layered Authentication Solutions

Type: News       Published: 09-2013      Views: 2406   
Description: HID Global is continuing its drive to enable financial institutions to secure online banking services that, it states, nearly half of all their customers prefer for convenient account access

Security - Content Security Solution of the Year 2013

Type: Awards Winner