25.03.2020 Views

CS Mar-Apr 2020

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Secure systems, secure data, secure people, secure business<br />

Computing Security <strong>Mar</strong>ch/<strong>Apr</strong>il <strong>2020</strong><br />

contents<br />

CONTENTS<br />

Computing<br />

Security<br />

NEWS<br />

OPINION<br />

INDUSTRY<br />

COMMENT<br />

CASE STUDIES<br />

PRODUCT REVIEWS<br />

Nightmare Visions<br />

Outmanoeuvred!<br />

Breached and unaware<br />

<strong>2020</strong> in deeper focus<br />

No ducking the issues<br />

CEOs in the firing line<br />

Enigma variations<br />

Film plots with a powerful twist<br />

COMMENT 3<br />

COVID-19: A NEW LEVEL OF THREAT<br />

ARTICLES<br />

EDITOR’S FOCUS 6<br />

Big moves on finger vein recognition and<br />

Identity-as-a-Service technologies.<br />

CYBERSECURITY & GDPR UNITE 8<br />

Regulation and technology will underpin<br />

data security in the years ahead, argues<br />

Robert Allen of Kingston Technology<br />

CEOs IN THE FIRING LINE 14<br />

You can't rely on others to get your Public<br />

Key Infrastructure in order, states Andrew<br />

Jenkinson, Cybersec Innovation Partners<br />

THE PLOT THICKENS 16<br />

CORONAVIRUS SPOOF ATTACKS 24<br />

What are the chances that secure data<br />

Coronavirus outbreak fuels new levels of<br />

cyber-attacks and defence breaches<br />

management might have changed the<br />

outcomes of several landmark films?<br />

BREACHED - AND UNAWARE 26<br />

Charlotte Williams, marketing & PR<br />

47.6% admit they wouldn’t know, were a<br />

manager at total information management<br />

breach to occur within their organisations,<br />

company Shredall SDS Group, offers her<br />

QUANTUM CRYPTO REVOLUTION 28<br />

thoughts from the front row<br />

Encryption systems offer huge promise,<br />

despite many issues still to be overcome<br />

BATTLING THE BREACHES 29<br />

A glut of breaches is prompting many to<br />

seek Cyber Essentials audits<br />

WORLD-WIDE MALICE 20<br />

The impact of indiscriminate malicious<br />

CYBER THREAT INTELLIGENCE 30<br />

activity online is soaring and estimated to<br />

Thornton-Trump, Cyjax, on vulnerability,<br />

hit a global price tag of $6 trillion by next<br />

exploitation and attacker motivation<br />

year. Four actionable principles have been<br />

HOMING IN ON COVID-19 31<br />

identified as successful in preventing<br />

More and more employees are working<br />

malicious activities reaching their targets<br />

from home. But dangers lurk there as well<br />

A CYBERSECURITY EDUCATION 32<br />

Despite the GDPR, businesses may still not<br />

be taking cybersecurity seriously enough<br />

ATTACK STATS 'TIP OF ICEBERG’ 22<br />

ESSENTIAL BUILDING BLOCKS 34<br />

New figures that report a fall in 'computer<br />

A more secure network architecture is<br />

misuse' and a rise in fraud show the<br />

vital, states Myles Bray, Forescout<br />

authorities are failing to grasp the true<br />

PRODUCT REVIEWS<br />

impact of cybercrime, according to a<br />

• Cloud Protection for Salesforce<br />

leading cybersecurity expert.<br />

from F-SECURE 32<br />

• Flowmon ADS 33<br />

computing security <strong>Mar</strong>ch/<strong>Apr</strong>il <strong>2020</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk<br />

4<br />

MORE 20/20 VISIONS 10<br />

As cyber anxiety shows itself everywhere,<br />

Part 2 of our top predictions for <strong>2020</strong><br />

looks at the many challenges that lie<br />

ahead. Now, with the emergence and<br />

global impact of COVID-19, that task has<br />

been made a whole lot tougher

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!