The Wayback Machine - https://web.archive.org/web/20130426090410/http://blogs.computerworlduk.com/security-spotlight/

Security Spotlight

RSSSubscribe to this blog
About Author

Contact Author

Email Security


Recent Posts

Why the UK shouldn't fear a Cyber Pearl Harbour

Don't relax, but don't believe all the security hype

There’s no doubt that “Cyber Pearl Harbour” is a great headline, evoking memories of the devastating surprise attack by Japanese fighters on a US military base that forced the States into World War 2. Information security commentators and politicians alike...

Tags: cloud computing, national crime agency, national cyber crime unit, scada, security, trend micro

The architects of our own destruction

Caesar, infrastructure, outsourcing and offshoring

I never wanted to spend my life in IT. I passed a programming exam at high school because I promised the teacher I would never return. It was the hardest 50% I ever had to work for! My passions were...

Tags: certificate authority, firewall, jericho foorum, roman empire, security, venafi

The world's first cyberwar has started

The USA threw some big rocks at Iran, which is now throwing some back

We can now say with some certainty that the world’s first cyberwar is upon us, unfolding behind the scenes with a rising level of intensity, so far pretty much ignored by all but the need-to-knows.On one side are the US...

Tags: ddos, denial-of-service attack, iran, public sector, security, shamoon, stuxnet, us government

Five common practices that lead to failed IT compliance audits and security breaches

Avoiding the auditor's trap is a strong motivator, but avoiding falling into a criminal's trap has got to be the ultimate goal

To put it simply, privileged accounts are like the keys to the kingdom of IT. They grant access to sensitive data and configuration settings. They’re rarely changed in most organisations, yet they’re known to nearly everyone. They don’t have the same...

Tags: admin logins, applications, audit, password policies, security

Twitter, stress and confusion will define the security landscape in 2013

In 2013, we can expect to see more and more companies not only "embracing" but also "adjusting" to the new social landscape

2012 was a year where Twitter became an integral part of everyday lives. For some, Sally Bercow perhaps being the most high-profile example from the UK, 2012 was also the year where Twitter had to be relegated to the past....

Tags: byod, defamation, mobile & wireless, mobility, privacy, sally bercow, security, twitter

How to secure everything, everywhere

With employees increasingly moving away from the desktop, how can businesses embrace the benefits of mobile working while ensuring the management and security of these devices?

The typical business cannot afford to keep up with the short upgrade cycle that drives consumer purchases, but can increase efficiency and cut operational costs by allowing employees to use their own devices in the working environment, allowing the organisation...

Tags: applications, byod, centrify, data loss, mobile & wireless, security

Mature IT: It's time for IT departments to enforce grown-up passwords and intelligent monitoring

To ensure security through variation, IT should not enforce just one syntax across the whole company

Organisations have a continuing problem with password management. Users don’t like complicated passwords; helpdesks don’t like resetting forgotten passwords, and managers don’t like seeing them stuck to the PC monitor.There’s no way round it, it’s essential to create strong passwords...

Tags: applications, hp enterprise security, outlook, risk management, security

Security best practice - Why should you care and what should you do?

It's a catch 22 situation - but it doesn't have to be

Organisations of all sizes and industries maintain extensive financial, customer and mission-critical business data. However, when sensitive information is misused or compromised, organisations will often pay a heavy price. Recent high-profile security breaches have cost millions in revenue and lost...

Tags: certificate authority, public-key cryptography, security

Nobody is perfect - including certificate authorities

Lessons have been learned, yet many have not heeded the warning.

According to Access, an international NGO that helps advocate for digital rights, “if a single one of the 650 public certificate authorities (CAs) that your systems support, by default, is compromised the entire system is compromised - so keeping 100%...

Tags: certificate authority, electronic frontier foundation, public key infrastructure, security, stuxnet, venafi, windows

Digital forensics: proactive or reactive?

It is a necessary but complex balancing act to combine the two

Avecto examines the difference between proactive and reactive digital forensics and explains their contribution in the fight against malware and malicious activity For a number of years digital forensics has referred to ‘the application of computer investigation and analysis techniques...

Tags: avecto, digital evidence, digital forensics, it management, malware, microsoft windows, security, windows