23.05.2017 Views

CS1705

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Secure systems, secure data, secure people, secure business<br />

Computing Security May/June 2017<br />

contents<br />

CONTENTS<br />

Computing<br />

Security<br />

New encryption<br />

in use technology<br />

ELIMINATES MASS<br />

DATA BREACHES<br />

NEWS<br />

OPINION<br />

INDUSTRY<br />

COMMENT<br />

CASE STUDIES<br />

PRODUCT REVIEWS<br />

Panoptex Technologies<br />

releases its groundbreaking<br />

Olfactex Solution<br />

PANOPTEX CTO INTERVIEW<br />

PG<br />

12<br />

COMMENT 3<br />

Cyber attacks soar across the UK<br />

EDITOR’S FOCUS 5<br />

The massive cyber attack that crippled the<br />

NHS could have been readily avoided<br />

ARTICLES<br />

CAN PRIVACY BE PROTECTED? 6<br />

The NHS breach, plus revelations over CIA<br />

hacking methods, have cast a long shadow<br />

over how to keep data safe and secure<br />

DATA BREACHES ELIMINATED 12<br />

Panoptex Technologies is making waves by<br />

providing a powerful industry first<br />

SHOW TIME ONCE AGAIN 18<br />

Infosecurity Europe 2017 is not far off<br />

now - and it’s the right place to be!<br />

REAL PRICE OF SECURITY 29<br />

Making purchasing decisions for security<br />

solutions that are based on quality is vital<br />

PRESSURE MOUNTS ON ISPS 30<br />

More and more security professionals are<br />

demanding additional help from their ISPs<br />

to block DDoS traffic before it hurts them<br />

MANY HAPPY RETURNS! 31<br />

Recalls happen, but handled right they<br />

can be turned into a positive experience<br />

HEAVEN SCENT? 32<br />

Two new 'fragrances' have been released<br />

by Kaspersky that have that certain whiff<br />

of danger about them<br />

REVIEWS<br />

• Acunetix 11 20<br />

• Aegis Secure Key 3z 34<br />

NOWHERE TO HIDE 8<br />

With email under constant attack, what is<br />

the best way to protect your organisation's<br />

communications? How do you keep your<br />

data vital and easily accessible to you and<br />

yours, yet useless to anyone out to<br />

access/steal it?<br />

THE DOUBLE-EDGED SWORD 14<br />

Encryption plays a vital role in protecting<br />

valuable information from being stolen or<br />

altered. But it can be used by your enemies<br />

just as readily<br />

THE CLOCK IS TICKING 22<br />

With the new European General Data<br />

Protection Regulations soon due to<br />

become law, many businesses will need to<br />

look closely at how they protect their data<br />

throughout the course of its lifecycle<br />

AFTER THE FLOOD 26<br />

With mobile devices now in their multibillions<br />

globally, and more and more<br />

applications flooding the market, the<br />

need for mobile monitoring and device<br />

management has never been greater or<br />

more urgent<br />

4<br />

computing security May/June 2017 @CSMagAndAwards www.computingsecurity.co.uk

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!