|
Computing Security Awards
|
The build-up to the 2019 Computing Security Awards is fast gathering pace now. Those who won last year will be seeking to repeat their success, while those who were contenders will be looking to go one step further next time and carry off the laurels.
The Computing Security Awards were set up to recognise the solutions and the solution providers which have been particularly impressive in the fight against security threats. We ask you now to put forward those you feel are most worthy. Your nominations will determine the finalists. Go the following link and submit your nominations now: https://www.computingsecurityawards.co.uk
Vendors: just a reminder that all those solutions that have been independently reviewed for Computing Security in the year leading up the Awards will be shortlisted for the Editor’s Choice. If you have a solution that you would like to be reviewed, please contact the Computing Security team on 01689 616000.
To whet everyone’s appetite, here are some more of the Computing Security Awards winners from 2018: | |
|
Industry Insight
|
Malware malaise mounts
Could it be that new malware features matter less than you might think – and that what really matters is behaviour? | |
Cyber-attacks: a major global risk
Scott Gordon, CMO, Pulse Secure, looks at the mounting global risks that cyber threats are posing, while also outlining the many opportunities that are also emerging for the enterprise | |
|
Inside View
|
A lesson in protection
Timely intervention – from Malwarebytes – has freed one university from the peril of malware vulnerabilities | |
|
Opinions
|
Think like an attacker
With data theft, cybercrime and state-sponsored hacktivists seemingly under every stone, a strategic approach to cyber security is a must have, says Brookcourt Solutions | |
Clever thinking
Gaining insight into every incoming threat is invaluable to a company’s security posture and can be gathered through a combination of smart security strategies, as Jaime Blasco, AVP of product development for AT&T Cybersecurity (formerly AlienVault), explains | |
Much loved – and maligned
While IoT has won plaudits, there is another side: the business repercussions that can come as a result of poor IoT security |
|
Life beyond the walls
Constructing high walls around a corporate environment may well be a security approach that is now delivering ever more diminishing returns
|
|
Document Logistix Document Manager 5.7
Document Logistix aims to conquer your paper mountain with a software suite that provides automated document capture, secure storage, full indexing and workflow management
|
|
|
|
Welcome to the July 2019 issue of the Computing Security Newsletter.
It seems timely – and a positive outcome – to see the UK privacy watchdog has ruled that any police force or private organisation using live facial recognition technology is processing personal data and needs to pay attention to data protection laws.
Live facial recognition (LFR) technology that can scan crowds and then check large databases for matches in seconds is processing personal data, according to the Information Commissioner’s Office (ICO). This is a key preliminary finding of an ICO investigation into police trials of the technology and comes just days after an independent report into the application of the technology by a UK police force found that the use of LFR by the Metropolitan Police could be held unlawful, if challenged in court.
According to Tamara Quinn, Partner, International law firm Osborne Clarke, specialising in data privacy and intellectual property: “Facial recognition and video surveillance are covered by a complex web of regulations which isn't easy to navigate, plus there is reputational risk, if companies aren't seen to be taking privacy seriously. Under the GDPR, use of biometrics, such as facial recognition systems, is covered by stricter safeguard than ordinary personal data.”
For many companies, this means that they may need to get consent from every person scanned – and prove that these individuals were fully informed and have given consent freely, without pressure or being penalised for not participating.
“With the ICO promising to pay closer attention to private organisations that use facial recognition systems that cover public areas, businesses should act now to ensure that their software doesn’t break the law,” adds Quinn. This can include reassessing the use of external cameras overlooking the street, public parking or other communal spaces. “As well as making sure that their systems comply with strict legal requirements, companies should be looking at their contracts with external suppliers of these systems.”
So, the abiding advice is to make sure you have strong legal protections in place at all times and under all circumstances!
To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.
Brian Wall, Editor
Computing Security
Follow us :
|
|