COMPUTING SECURITY AWARDS
|
|
The Computing Security Awards celebrate all that is best in our industry. At our latest gala event on 12 October, the top talent to capture the honours in their specific categories for 2017 were named and feted. Year after year, the awards show what a wealth of flair and expertise exists right across our industry – something that is serving to keep businesses safe from the relentless attacks being perpetrated at every turn.
The full list of our 2017 awards winners can be seen by going to: www.computingsecurityawards.co.uk |
|
Features
|
Machine Learning Applied to Cyber Security
Charlotte Gurney, group marketing manager, Brookcourt Solutions, discusses how cyber security has seen some of the widest-ranging and impacting implementations of machine learning, deep learning, natural language processing, and more |
|
In the line of fire
A plethora of regulations are soon to hit UK businesses, imposing harsh penalties where there is overt failure to comply. Yet some organisations don’t think the new rules even apply to them. Brian Wall reports |
|
How easy is it to steal a friend’s identity?
A new BBC TV drama shows how easy it is to steal the identity of someone close to you. Now individuals are being urged to think about where they share their personal information |
|
Reviews
|
Red Sift OnDMARC
Email is the weapon of choice for cyber criminals, with phishing and spoofing attacks increasing exponentially. Red Sift’s OnDMARC aims to streamline the entire process of implementation, reporting and ongoing management to counteract these assaults.
|
|
Malwarebytes Endpoint Protection
Malwarebytes’ next-generation Endpoint Protection (MEP) places seven layers of detection technology on your endpoints. Called ‘multi-vector protection’, it employs a signature-less, rules-based approach, to protect against known and unknown malware.
|
|
|
|
Welcome to the October 2017 issue of the Computing Security Newsletter.
The US government is warning that hackers are targeting nuclear, energy and industrial firms. And that doesn’t mean installations and organisations within its own boundaries. These are believed to be prime targets wherever they may be located.
Since May, hackers have been penetrating the computer networks of companies that operate nuclear power stations and other energy facilities, as well as manufacturing plants in the United States and other countries, according to a report in The New York Times.
Among the companies targeted was the Wolf Creek Nuclear Operating Corporation, which runs a nuclear power plant near Burlington, Kansas. The attack was revealed via security consultants and an urgent joint report issued by the Department of Homeland Security and the Federal Bureau of Investigation.
The origins of the hackers are not known. But the report indicated that an “advanced persistent threat” actor was responsible, which is the language security specialists often use to describe hackers backed by governments.
Those familiar with the investigation say that, while it is still in its early stages, the hackers’ techniques mimicked those of the organisation known to cybersecurity specialists as ‘Energetic Bear’, the Russian hacking group that researchers have tied to attacks on the energy sector since at least 2012.
These are worrying trends. The likelihood of a highly sensitive and vulnerable facility such as a nuclear installation being hacked and brought down is ever increasing, as the hackers become increasingly capable of such an infiltration. Governments are loath to discuss or acknowledge such an eventuality in public, but most of us in the industry, aware enough to recognise the portents, are holding our collective breathes against such a moment.
To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.
Brian Wall, Editor
Computing Security
Follow us :
|
|