CS1705
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Secure systems, secure data, secure people, secure business<br />
Computing Security May/June 2017<br />
contents<br />
CONTENTS<br />
Computing<br />
Security<br />
New encryption<br />
in use technology<br />
ELIMINATES MASS<br />
DATA BREACHES<br />
NEWS<br />
OPINION<br />
INDUSTRY<br />
COMMENT<br />
CASE STUDIES<br />
PRODUCT REVIEWS<br />
Panoptex Technologies<br />
releases its groundbreaking<br />
Olfactex Solution<br />
PANOPTEX CTO INTERVIEW<br />
PG<br />
12<br />
COMMENT 3<br />
Cyber attacks soar across the UK<br />
EDITOR’S FOCUS 5<br />
The massive cyber attack that crippled the<br />
NHS could have been readily avoided<br />
ARTICLES<br />
CAN PRIVACY BE PROTECTED? 6<br />
The NHS breach, plus revelations over CIA<br />
hacking methods, have cast a long shadow<br />
over how to keep data safe and secure<br />
DATA BREACHES ELIMINATED 12<br />
Panoptex Technologies is making waves by<br />
providing a powerful industry first<br />
SHOW TIME ONCE AGAIN 18<br />
Infosecurity Europe 2017 is not far off<br />
now - and it’s the right place to be!<br />
REAL PRICE OF SECURITY 29<br />
Making purchasing decisions for security<br />
solutions that are based on quality is vital<br />
PRESSURE MOUNTS ON ISPS 30<br />
More and more security professionals are<br />
demanding additional help from their ISPs<br />
to block DDoS traffic before it hurts them<br />
MANY HAPPY RETURNS! 31<br />
Recalls happen, but handled right they<br />
can be turned into a positive experience<br />
HEAVEN SCENT? 32<br />
Two new 'fragrances' have been released<br />
by Kaspersky that have that certain whiff<br />
of danger about them<br />
REVIEWS<br />
• Acunetix 11 20<br />
• Aegis Secure Key 3z 34<br />
NOWHERE TO HIDE 8<br />
With email under constant attack, what is<br />
the best way to protect your organisation's<br />
communications? How do you keep your<br />
data vital and easily accessible to you and<br />
yours, yet useless to anyone out to<br />
access/steal it?<br />
THE DOUBLE-EDGED SWORD 14<br />
Encryption plays a vital role in protecting<br />
valuable information from being stolen or<br />
altered. But it can be used by your enemies<br />
just as readily<br />
THE CLOCK IS TICKING 22<br />
With the new European General Data<br />
Protection Regulations soon due to<br />
become law, many businesses will need to<br />
look closely at how they protect their data<br />
throughout the course of its lifecycle<br />
AFTER THE FLOOD 26<br />
With mobile devices now in their multibillions<br />
globally, and more and more<br />
applications flooding the market, the<br />
need for mobile monitoring and device<br />
management has never been greater or<br />
more urgent<br />
4<br />
computing security May/June 2017 @CSMagAndAwards www.computingsecurity.co.uk