CS Mar-Apr 2020
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Secure systems, secure data, secure people, secure business<br />
Computing Security <strong>Mar</strong>ch/<strong>Apr</strong>il <strong>2020</strong><br />
contents<br />
CONTENTS<br />
Computing<br />
Security<br />
NEWS<br />
OPINION<br />
INDUSTRY<br />
COMMENT<br />
CASE STUDIES<br />
PRODUCT REVIEWS<br />
Nightmare Visions<br />
Outmanoeuvred!<br />
Breached and unaware<br />
<strong>2020</strong> in deeper focus<br />
No ducking the issues<br />
CEOs in the firing line<br />
Enigma variations<br />
Film plots with a powerful twist<br />
COMMENT 3<br />
COVID-19: A NEW LEVEL OF THREAT<br />
ARTICLES<br />
EDITOR’S FOCUS 6<br />
Big moves on finger vein recognition and<br />
Identity-as-a-Service technologies.<br />
CYBERSECURITY & GDPR UNITE 8<br />
Regulation and technology will underpin<br />
data security in the years ahead, argues<br />
Robert Allen of Kingston Technology<br />
CEOs IN THE FIRING LINE 14<br />
You can't rely on others to get your Public<br />
Key Infrastructure in order, states Andrew<br />
Jenkinson, Cybersec Innovation Partners<br />
THE PLOT THICKENS 16<br />
CORONAVIRUS SPOOF ATTACKS 24<br />
What are the chances that secure data<br />
Coronavirus outbreak fuels new levels of<br />
cyber-attacks and defence breaches<br />
management might have changed the<br />
outcomes of several landmark films?<br />
BREACHED - AND UNAWARE 26<br />
Charlotte Williams, marketing & PR<br />
47.6% admit they wouldn’t know, were a<br />
manager at total information management<br />
breach to occur within their organisations,<br />
company Shredall SDS Group, offers her<br />
QUANTUM CRYPTO REVOLUTION 28<br />
thoughts from the front row<br />
Encryption systems offer huge promise,<br />
despite many issues still to be overcome<br />
BATTLING THE BREACHES 29<br />
A glut of breaches is prompting many to<br />
seek Cyber Essentials audits<br />
WORLD-WIDE MALICE 20<br />
The impact of indiscriminate malicious<br />
CYBER THREAT INTELLIGENCE 30<br />
activity online is soaring and estimated to<br />
Thornton-Trump, Cyjax, on vulnerability,<br />
hit a global price tag of $6 trillion by next<br />
exploitation and attacker motivation<br />
year. Four actionable principles have been<br />
HOMING IN ON COVID-19 31<br />
identified as successful in preventing<br />
More and more employees are working<br />
malicious activities reaching their targets<br />
from home. But dangers lurk there as well<br />
A CYBERSECURITY EDUCATION 32<br />
Despite the GDPR, businesses may still not<br />
be taking cybersecurity seriously enough<br />
ATTACK STATS 'TIP OF ICEBERG’ 22<br />
ESSENTIAL BUILDING BLOCKS 34<br />
New figures that report a fall in 'computer<br />
A more secure network architecture is<br />
misuse' and a rise in fraud show the<br />
vital, states Myles Bray, Forescout<br />
authorities are failing to grasp the true<br />
PRODUCT REVIEWS<br />
impact of cybercrime, according to a<br />
• Cloud Protection for Salesforce<br />
leading cybersecurity expert.<br />
from F-SECURE 32<br />
• Flowmon ADS 33<br />
computing security <strong>Mar</strong>ch/<strong>Apr</strong>il <strong>2020</strong> @<strong>CS</strong>MagAndAwards www.computingsecurity.co.uk<br />
4<br />
MORE 20/20 VISIONS 10<br />
As cyber anxiety shows itself everywhere,<br />
Part 2 of our top predictions for <strong>2020</strong><br />
looks at the many challenges that lie<br />
ahead. Now, with the emergence and<br />
global impact of COVID-19, that task has<br />
been made a whole lot tougher