If you can not view this email please click here.



Hacking Cloud Compliance Reviews


banner advert

Taking the next step up

The industry needs to move towards a more holistic view of information and systems, argues Dr Anand Narasimhan, director, Sims Lifecycle Services EU

main headline

Weapons to defeat the modern-day hackers

Security measures built into applications can help to prevent unauthorised code from manipulating applications to access, steal, modify or delete sensitive data

main headline

Cloud and the ‘Everywhere Enterprise’

The market of public cloud services is expanding rapidly, radically changing demands driven by the business

main headline

Bish… bash… bosh: The attack that left everyone shellshocked

Bash-Shellshock caught everyone by surprise - and the backlash is still being felt far and wide

main headline
banner advert


PSN-compliant mobile working

A PSN-compliant mobile working solution offers tangible benefits, but it is critical to enter into the process with a robust strategy, cautions Tim Ager of Celestix



Innovative IT asset management

Sims Recycling Solutions' 5-year strategic plan outlines comprehensive reuse and recycling services


UK to be heavily hit with targeted attacks

Security threats to Android devices will double next year, according to a new report from Trend Micro

Cloud security threats challenged

Perceived security threats associated with cloud services are becoming less of an issue

Cybercrime attacks are going unreported

Over half of Brits have fallen victim to cybercrime, according to a new report


Time to widen understanding of security risks

Basic understanding of cyber security among all company employees is critical


Vital firewall features deliberately disabled

32% of organisations turn off firewall security functions to prevent network slowdowns


Breached – and baffled

Who would you contact if your computer or another device suffered a security breach? I don’t know!


White papers


Neustar has released its 'Annual United Kingdom DDoS Attacks & Impact Report'. What were the experiences of those surveyed in 2013? The results suggest a more unstable and complex landscape

Password Protected: A Survey On Two-Factor Authentication

The background to eliminating insecure passwords

Cloud-Based Services: Easing The I.T Burden While Taking Control

The potential benefits of employing cloud-based services, either in place of existing IT resources or alongside them, are undoubtedly significant, as this white paper from GFI Cloud makes clear.

Inside the criminal mind

Infoblox has launched a whitepaper that takes a sideways look at DNS security from the perspective of a cybercriminal


Network Security Solution of the Year
WINNER: Fortinet – Fortigate 1500D

Fortinet were winners in the Network Security Solution category. David Park accepted the award

main headline

Identity and Access Management Solution of the Year
WINNER: Celestix – HOTPin

Kelly Dutton. Andrew Walter, Habba Miah and Andriy Kotnyuk accepted the first of two awards for Celestix

main headline

SIEM (Security Incident and Event Management) Solution of the Year
WINNER: RSA – Security Analytics

The SIEM Solution of the Year award went to RSA. Brian Gregory and Michaela Scurr accepted the trophy

main headline

Welcome to the December 2014 issue of the Computing Security Newsletter. One thing you can always be sure of when dealing with emerging technologies is that the stats quoted will almost invariably be going through the roof. Still, it is interesting to see that the number of global biometrics smartphone users is expected to reach 471.11 million in 2017 from 43.23 million in 2013, transitioning from the early adopter phase to the early maturity phase – thus giving biometrics technology the opportunity to outstrip existing security technologies, such as two-factor authentication (2FA). By 2019, biometrics will no doubt be all over mobile devices. New analysis from Frost & Sullivan, ‘Biometrics Go Mobile: A Market Overview’, finds that the biometric revenue from smartphones is expected to increase from $53.6 million in 2013 to $396.2 million in 2019, at a compound annual growth rate of 39.6%.

The reality is that biometric technologies need to compete with other easy-to-use identification technologies, such as near field communication (NFC), and they also require significant investments in sensors and infrastructure. Moreover, in many countries, especially in Europe, privacy is a sensitive topic. As biometrics provides personal information, individuals are still reluctant to be tracked using such data.

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

Follow us :

To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622