Content on this page requires a newer version of Adobe Flash Player.

Get Adobe Flash player

Home Articles Reviews eNewsletters Awards Subscribe About/Contact Us More
Untitled Document
Human frailty
Most data breaches are the result of human mistakes, negligence or unexpected system glitches...
Why the Pen can be mightier than the sword
Penetration ('pen') testing is the practice of attacking your systems and network to seek out any vulnerabilities that others might try to exploit.
Raising the Standards
Launched in 2010, the Asset Disposal and Information Security Alliance (ADISA) has been busy working with a range of companies...
Security Directive Could Cost Organisations Billion
UK businesses could be hit hard in the pocket by a new EU Cyber Security Directive...
The Force that fights the cyber foes
The IBM X-Force Trend & Risk Report has been reporting on the alarming rate at which cyber attacks have continued to occur for some years now...
Internal security breaches soar
Despite the widespread occurrence of the insider threat, only one in four I.T. professionals consider this to be a security priority
315,000 new malicious files detected every day
The overall global Internet threat level has grown by 6.9 percentage points – during 2013, 41.6% of user computers were attacked..
BYOD - How to make it your friend
BYOD - bring your own device - is enjoying enormous growth and that is likely only to accelerate. However, opinion is still..
The data security divide
Barely a week goes by without yet another media report about a high-profile leak of confidential data.
The Internet's Light And Dark Sides
While the internet is a positive force for good, it is also a haven for the very bad. And it doesn't get much worse than cybercrime..
Taking Phishing Off The Menu
Halon security's dmarc prevents attacks from spammers targeting spoof weaknesses

Sun Shines On Cloud
The market for cloud, or Internet, computing is hitting the stratosphere. Market research firm IDC expects businesses worldwide..
Cold Shoulder Treatment
Many organisations are failing to adopt established industry best practice to protect their clients' information. The need for increased..
Celestix Networks HOTPin v3.7
The exponential growth of mobile workforces is making businesses rethink their security strategy for remote access...
GFI WirelessSentry
GFI's WirelessSentry (WiSe) takes the expense out of wireless network monitoring by uniquely offering it as a cloud service
ManageEngine EventLog Analyzer
ManageEngine's EventLog Analyzer (MEA) offers an interesting alternative to the mainstream SIEM (security information and event management)...
Celestix Networks' HOTPin v3.7
The exponential growth of mobile workforces is making businesses rethink their security strategy for remote access...
GFI LanGuard 2014
Focusing on endpoint vulnerability assessment, patch management and auditing...

SecurEnvoy SecurAccess 7.1
The use of two-factor authentication (2FA) for online security is growing exponentially as businesses move away from inherently...
SolarWinds Log & Event Manager
Despite the wide choice of SIEM (security information and event management) solutions, their high prices put most of them...
AhnLab Malware Defense System
Currently the largest security company in South Korea, AhnLab now turns it gaze on the European market. Having dealt efficiently...
Titania Nipper Studio
Total compliance with data protection regulations is now essential, otherwise businesses could find themselves....
CenterTools DriveLock Executive Suite 7.2
Data loss and security breaches are rarely out of the news, showing that, despite all the warnings...
Security? It's in Microsoft's DNA!
While many rue what they see as the disappearance of Microsoft from the security business...
Can cyber-risk insurance really keep you safe?
Cyber-risk insurance policies are growing in popularity with the business community, but there’s a danger...
Why Windows 8 is so gr8!
Tim Ager says the demise of Windows xp is no cause for lamentation - Windows 8 has so much to offer...
2014: Into The Unknown
We need to keep evolving ways in which to authenticate our trusted users, if we are to stay ahead...
Managing The Risks
Risk-based authentication is now making its presence felt. Tim Ager of Celestix explains why and what it is all about...
Key factors in a mobile world
As mobile device management becomes an ever greater challenge, its convergence with two-factor authentication...
Urgent need to boost cyber skills
Businesses must do far more to tackle cybercrime, which is threatening to spiral out of control...
Don't let it all end in floods of tears
Water has been constantly in the headlines of late, infiltrating communities on a massive scale and leaving a trail of destruction in its wake
Inside 2014
Ask those in the know what will be the hot topics for security in 2014 and there is no shortage of response...
Massive strides forward
If there is one thing that the 2013 Computing Security Awards demonstrated above all else, it's the fact that the industry...
Data Breaches - Time To Come Clean
The day that telecoms operators and internet service providers (ISPs) across Europe must have dreaded has finally arrived...
Anxious times signal need for action
The Intelligence and Security Committee (ISC) of Parliament has just published its Annual Report for 2012-2013...
Celestix networks seeks out an Edge
Celestix Networks has recently launched its new Cloud Edge Security Appliance series to enable secure and seamless connectivity...
Espion to bolster Cyber Security Innovation
ICT 'Company of the Year' Espion has now begun work on a dynamic research project, funded by European Commission...
On the crest of a wave
Portcullis Computer Security has been accepted into the CREST Cyber Security Incident Response (CSIR) Scheme
Cybersecurity guidelines needed
The Institution of Engineering and Technology (IET) is calling for greater clarity from the government about which cyber security advice it wants UK businesses to follow
'Overconfidence' threatens security...
Steria has revealed that 96% of UK's enterprises believe they are capable of dealing with a major security crisis...
New Malware Milestone
According to a new report, malware creation hit a new milestone in 2013, with cyber-criminals creating and distributing 20% of all malware that has ever existed...
How to prepare your organisation...
To help professionals strengthen their organisation's security and prepare for attacks
Cyber security skills gap
BCS, The Chartered Institute for IT, has welcomed the recommendations that have been laid out in the government's latest report...
Budget ignores new generation of internet crime
The recent Budget announcements by the government were seen as a mix of 'good and bad' by Rob Cotton, CEO at NCC Group
'Heartbleed' vulnerability sparks widespread fears
A critical vulnerability affecting the popular OpenSSL cryptographic software library...
Labour calls for compulsory...
The Labour Party has called for a new defence review to consider creating a statutory requirement for firms to report serious cyber-attacks
Hacker insights in Milan
SANS Institute is hosting its popular ‘SEC504: Hacker Techniques, Exploits & Incident Handling’ training for the first time in Milan
Oxford University School calls for respondents...
As part of a major Cabinet Office effort to help organisations defend themselves against security incidents caused by insiders...
100 million-plus attacks blocked
FireHost has released its 2013 year in review Superfecta report

Be warned - Not being in cyber space...
Reacting to the recent publication of the Office of National Statistics' figures suggesting that some 6.7 million adults...
UK falling behind in cyber-security awareness
Following BT research revealing that the UK trails in big business cyber-security awareness rankings, Amar Singh and Mike Small, both members of the ISACA UK...
Sophos acquires Cyberoam
Sophos has acquired Cyberoam Technologies, a provider of network security products...
Virgin Media raises security level
Virgin Media Business has been accredited to provide safe and secure network services up to the government's published Business Impact...
Move to raise awareness of online threats
Global internet and mobile security company BullGuard is partnering with Get Safe Online, the UK's national internet security awareness initiative...
Plaudits for the PCI audits
Ian Whiting, CEO at Titania, offers his insights on PCI-DSS Compliance - and important changes that have now emerged for Pen Testers
Endpoint Security: A Call to Action
In a world of constant combat between hackers and security practitioners, corporate IT teams must continually strengthen their IT security...
Raising the standard for cyber security is vital
Organisations will now have to meet a rigorous new cyber security 'kitemark' if they want to work with the UK government
Securing the Mobility Age through the Cloud
Employee mobility will be the rule, rather than the exception, in 2014. Michael Sutton, VP of security research at Zscaler, explains why
Tackling the fraudsters
Fraud is on the rise. Wherever you surf, tweet or otherwise go online, it rears its devious and lucrative head..
The security challenges ahead for 2014
Tim 'TK' Keanini, CTO at Lancope, has put together his thoughts on some promising, as well as some concerning, innovations that will shape the way we secure..
Securing the honours!
It was another night of celebrations at the 2013 Computing Security Awards, as people from right across the industry gathered..
Celebration - and jubilation!
It was another night of huge celebrations at the 2013 Computing Security Awards, as people from right across the industry...
Security - Anti Spam Solution of the Year 2013
WINNER: Kaspersky Lab - Endpoint Security for Business...


Security - Anti Malware Solution of the Year 2013
WINNER: Cloudmark - Server Edition..

Security - Content Security Solution of the Year 2013
WINNER: Check Point - Application Control Software Blade..

Network Security Solution of the Year 2013
WINNER: Emulex - EndaceProbe