Content on this page requires a newer version of Adobe Flash Player.

Get Adobe Flash player

Home Articles Reviews eNewsletters Awards Subscribe About/Contact Us More
Untitled Document

Download your copy of Whitepaper now!

Under Attack: Leading the Fightback
On the 31 March this year, the UK'S Cyber Emergency Response Team went live, in a bid to strengthen the country's online defences....
Human frailty
Most data breaches are the result of human mistakes, negligence or unexpected system glitches...
Why the Pen can be mightier than the sword
Penetration ('pen') testing is the practice of attacking your systems and network to seek out any vulnerabilities that others might try to exploit.
Raising the Standards
Launched in 2010, the Asset Disposal and Information Security Alliance (ADISA) has been busy working with a range of companies...
Security Directive Could Cost Organisations Billion
UK businesses could be hit hard in the pocket by a new EU Cyber Security Directive...
The Force that fights the cyber foes
The IBM X-Force Trend & Risk Report has been reporting on the alarming rate at which cyber attacks have continued to occur for some years now...
Internal security breaches soar
Despite the widespread occurrence of the insider threat, only one in four I.T. professionals consider this to be a security priority
315,000 new malicious files detected every day
The overall global Internet threat level has grown by 6.9 percentage points – during 2013, 41.6% of user computers were attacked..
BYOD - How to make it your friend
BYOD - bring your own device - is enjoying enormous growth and that is likely only to accelerate. However, opinion is still..
The data security divide
Barely a week goes by without yet another media report about a high-profile leak of confidential data.
The Internet's Light And Dark Sides
While the internet is a positive force for good, it is also a haven for the very bad. And it doesn't get much worse than cybercrime..
Taking Phishing Off The Menu
Halon security's dmarc prevents attacks from spammers targeting spoof weaknesses

Sun Shines On Cloud
The market for cloud, or Internet, computing is hitting the stratosphere. Market research firm IDC expects businesses worldwide..
Cold Shoulder Treatment
Many organisations are failing to adopt established industry best practice to protect their clients' information. The need for increased..
Celestix Networks HOTPin v3.7
The exponential growth of mobile workforces is making businesses rethink their security strategy for remote access...
GFI WirelessSentry
GFI's WirelessSentry (WiSe) takes the expense out of wireless network monitoring by uniquely offering it as a cloud service
ManageEngine EventLog Analyzer
ManageEngine's EventLog Analyzer (MEA) offers an interesting alternative to the mainstream SIEM (security information and event management)...
Celestix Networks' HOTPin v3.7
The exponential growth of mobile workforces is making businesses rethink their security strategy for remote access...
GFI LanGuard 2014
Focusing on endpoint vulnerability assessment, patch management and auditing...

SecurEnvoy SecurAccess 7.1
The use of two-factor authentication (2FA) for online security is growing exponentially as businesses move away from inherently...
SolarWinds Log & Event Manager
Despite the wide choice of SIEM (security information and event management) solutions, their high prices put most of them...
AhnLab Malware Defense System
Currently the largest security company in South Korea, AhnLab now turns it gaze on the European market. Having dealt efficiently...
Titania Nipper Studio
Total compliance with data protection regulations is now essential, otherwise businesses could find themselves....
CenterTools DriveLock Executive Suite 7.2
Data loss and security breaches are rarely out of the news, showing that, despite all the warnings...
Security? It's in Microsoft's DNA!
While many rue what they see as the disappearance of Microsoft from the security business...
Can cyber-risk insurance really keep you safe?
Cyber-risk insurance policies are growing in popularity with the business community, but there’s a danger...
Why Windows 8 is so gr8!
Tim Ager says the demise of Windows xp is no cause for lamentation - Windows 8 has so much to offer...
2014: Into The Unknown
We need to keep evolving ways in which to authenticate our trusted users, if we are to stay ahead...
Managing The Risks
Risk-based authentication is now making its presence felt. Tim Ager of Celestix explains why and what it is all about...
Key factors in a mobile world
As mobile device management becomes an ever greater challenge, its convergence with two-factor authentication...
Urgent need to boost cyber skills
Businesses must do far more to tackle cybercrime, which is threatening to spiral out of control...
Don't let it all end in floods of tears
Water has been constantly in the headlines of late, infiltrating communities on a massive scale and leaving a trail of destruction in its wake
Inside 2014
Ask those in the know what will be the hot topics for security in 2014 and there is no shortage of response...
Massive strides forward
If there is one thing that the 2013 Computing Security Awards demonstrated above all else, it's the fact that the industry...
Data Breaches - Time To Come Clean
The day that telecoms operators and internet service providers (ISPs) across Europe must have dreaded has finally arrived...
Anxious times signal need for action
The Intelligence and Security Committee (ISC) of Parliament has just published its Annual Report for 2012-2013...
Kaseya acquires Scorpion Software
Kaseya has acquired Scorpion Software, providers of integrated two factor authentication, single sign on and password management solutions.
Faulty towers?
The U.S Secret Service has given out advice to those in the hospitality industry to inspect computers which they make available to guests...
Poor password management...
IT security professionals are gambling with the security of their organisations by failing to update important service and process account passwords on a regular basis...
UKFast CEO pledges £1m...
The CEO of cloud and hosting firm UKFast has pledged £1m to keeping businesses safe online
Sophos challenges UK public...
Sophos is calling on members of the UK public to turn sleuth and to investigate confiscated crime scene computer systems...
Getting to grips with The Internet of Things
GFI Software has announced the findings of an extensive independent research project examining the “Internet of Things” (IoT)...
Databarracks certified for government's...
Databarracks has been named as one of the first organisations in the UK to become certified with the Cyber Essentials Scheme...
Cybercrime responsible for more than £266bn...
A new report from the Center for Strategic and International Studies (CSIS) and sponsored by McAfee, “Net Losses – Estimating the Global Cost of Cybercrime,...
AlienVault releases new version of Open Threat Exchange
AlienVault has released an updated version of Open Threat Exchange (OTX), which includes OTTX ThreatFinder...
CBEST foot forward for banking?
Geoff Webb, senior director, solution strategy at NetIQ, comments on the Bank of England's new cybercrime testing framework, CBEST.
Tier-3 is early adopter of UK “Cyber Essentials” standard
Tier-3 has become one of the first adopters of the new UK Cyber Essentials standard, which has been produced by the Department for Business...
Celestix networks seeks out an Edge
Celestix Networks has recently launched its new Cloud Edge Security Appliance series to enable secure and seamless connectivity...
Malware: Coming Soon to Your Company?
As the malware threat evolves, businesses need to rethink their methods of protection.

Staying safe in the mobile world
By Sean Newman, Security Strategist, Cisco....

the great myth about mobile security
By Mark Reeves, SVP International for Entrust.

Plaudits for the PCI audits
Ian Whiting, CEO at Titania, offers his insights on PCI-DSS Compliance - and important changes that have now emerged for Pen Testers
Endpoint Security: A Call to Action
In a world of constant combat between hackers and security practitioners, corporate IT teams must continually strengthen their IT security...
Raising the standard for cyber security is vital
Organisations will now have to meet a rigorous new cyber security 'kitemark' if they want to work with the UK government
Securing the Mobility Age through the Cloud
Employee mobility will be the rule, rather than the exception, in 2014. Michael Sutton, VP of security research at Zscaler, explains why
Tackling the fraudsters
Fraud is on the rise. Wherever you surf, tweet or otherwise go online, it rears its devious and lucrative head..
The security challenges ahead for 2014
Tim 'TK' Keanini, CTO at Lancope, has put together his thoughts on some promising, as well as some concerning, innovations that will shape the way we secure..
Securing the honours!
It was another night of celebrations at the 2013 Computing Security Awards, as people from right across the industry gathered..
Celebration - and jubilation!
It was another night of huge celebrations at the 2013 Computing Security Awards, as people from right across the industry...
Security - Anti Spam Solution of the Year 2013
WINNER: Kaspersky Lab - Endpoint Security for Business...


Security - Anti Malware Solution of the Year 2013
WINNER: Cloudmark - Server Edition..

Security - Content Security Solution of the Year 2013
WINNER: Check Point - Application Control Software Blade..

Network Security Solution of the Year 2013
WINNER: Emulex - EndaceProbe