• Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
  • Events
  • Whitepapers
  • Spotlights
  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
  • Newsletters
  • Sign in
  •  
      • Newsletters
      • Account details
      • Contact support
      • Sign out
     
     
    • You are currently accessing Computing via your Enterprise account.

      If you already have an account please use the link below to sign in.

      If you have any problems with your access or would like to request an individual access account please contact our customer service team.

      Phone: +44 (0) 1858 438800

      Email: customerservices@incisivemedia.com

      • Sign in
     
  • Follow us
    • Twitter
    • LinkedIn
    • Newsletters
    • Facebook
    • YouTube
  • Register
  • Events
    • Upcoming events
      event logo
      The Pesky Password Problem: What place do passwords have in the modern workplace?

      In this webinar you'll learn: Why passwords are so easy to hack, and how the bad guys do it. How to craft a secure, risk-focused password security policy. The truth about password managers and multi-factor authentication and how they impact our risk. How to empower your end users to become your best last line of defence

      • Date: 21 Jan 2021
      event logo
      Where the buck stops: Why a shared responsibility model will help you own your cloud security flaws

      This webinar, and accompanying dedicated research, will reveal to what extent organisations are practicing a shared responsibility model for cloud security today and the degree to which IT leaders are aware of what they should be doing to ensure the secure use of their multi- and hybrid-cloud environments.

      • Date: 27 Jan 2021
      event logo
      Leveraging the Cloud to Defeat Data Disasters

      Join us and learn how your IT team can realize many of the powerful advantages of the cloud and solve the operational complexity behind managing data across hybrid and multi-cloud IT environments with centralized management, automation, end-to-end security, and lower TCO.

      • Date: 28 Jan 2021
      event logo
      Deskflix Hybrid and Multi Cloud

      One of the most powerful tools for breaking down silos and integrating resources is cloud computing. But multi-tenancy cloud is not the ideal environment for every application or every class of data and some will need to remain on-prem for the foreseeable future; nor are all clouds equal. Tune in to Deskflix season 1 to hear industry experts speak on the questions you need answered on hybrid and multi cloud.

      • Date: 10 Feb 2021
      View all events
  • Whitepapers
    • LATEST WHITEPAPERS
      Darktrace 120x194
      Cyber AI Response: Threat Report 2019

      This white paper details 7 case studies of attacks that were intercepted and neutralised by Darktrace cyber defense AI, including a zero-day trojan in a manufacturing company's network. Learn how Darktrace Antigena AI Response modules fight back autonomously, no matter where a threat may emerge, extending to the Cloud, Email and SaaS.

      Download
      Darktrace 120x194
      Cyber AI & Darktrace Cloud

      This white paper explores how cloud is a security blind spot for many organisations who struggle with the limited visibility and control in this new environment, where their existing security tools are often not applicable.

      Download
      Find whitepapers
      Search by title or subject area
      View all whitepapers
  • Spotlights
    • Spotlights

      Welcome to Computing's Spotlight section, where we focus in on particularly important themes and topics of enterprise IT.

      Intel logo

       

      Endpoint Management and Security Hub

  • IT Leaders 250
  • Research
  • Delta
  • Tech Marketing Hub
  • About Us
Computing
Computing
  • Home
  • News
  • Big Data & Analytics
  • DevOps
  • Security
  • GDPR
  • AI & ML
  • Women in Tech
  • Cloud & Infrastructure
  • CIO
  • Deskflix
 
    • Newsletters
    • Account details
    • Contact support
    • Sign out
 
 
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
 
  • Security

Top 10 security stories of 2013 so far

Computing looks back at the most important cyber security stories of the past six months

  • Stuart Sumner
  • Stuart Sumner
  • @StuartSumner
  • 13 June 2013
  • Tweet  
  • Facebook  
  • LinkedIn  
  • Send to  
0 Comments

Security is perennially a hot topic for IT professionals. In the private sector there are persistent fears that precious IP will be stolen from corporate servers by way of industrial espionage, or that malicious outsiders - or more worryingly, insiders - will find ways to smuggle out critical data for their own dubious purposes.

In the public sector, the fears are very much the same, with espionage a top concern.

But problems can equally occur less by malicious design, and more by accident as staff leave laptops, mobiles or tablets on taxis, trains or just about anywhere else. For a cash-strapped public sector organisation in the UK, that usually means a hefty fine from the ICO.

With that in mind, let's have a look at the top 10 security stories of the year so far.

10 - HTC settles with FTC over mobile security flaws

With mobile devices increasingly carrying sensitive corporate data, it is imperative that they are secure. Back in February smartphone manufacturer HTC agreed to settle Federal Trade Commission (FTC) charges that the firm failed to take "reasonable steps" to patch security vulnerabilities in its products, thus putting information belonging to millions of customers at risk.

9 - UK cyber security 'becoming more consolidated', says ENISA

Attempts to consolidate all the various bodies that have some responsibility for the UK's cyber security have made steady progress, according to the European Network and Information Security Agency (ENISA).

The government has been heavily criticised in the last year for a "lack of cohesion" between the various UK organisations set up to work towards its cyber security strategy.

Former head of the GCHQ and CESG, Nick Hopkinson, told Computing last year that there was a need for rationalisation between the organisations, as co-ordinating a policy and strategy would be a challenge when dealing with the numerous bodies involved.

But a year on from Hopkinson's comments, ENISA's head of unit, resilience and CIIP, Dr Vangelis Ouzounis, has said that every country including the UK is trying to consolidate their own strategy.

"In every member state there are different distributions which have been developed for different purposes, now they all have slightly different responsibilities around cyber security and of course there are overlaps. Every country is trying to consolidate their national strategy and ENISA does not intervene because although we recommend the simplification and avoidance of overlaps, it is up to the member states [to take action]," he told Computing at ISACA Insights World Congress 2013, in Berlin.

[Please turn to next page]

12345

Further reading

Cyber security roundtable: The next steps for government
  • Threats and Risks
  • 05 April 2013
  • Tweet  
  • Facebook  
  • LinkedIn  
  • Send to  
  • Topics
  • Security
  • Legislation and Regulation
  • Government
  • cyber crime
  • Cyber security
  • Information Commissioner's Office

More on Security

New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach
New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach

No quick fix to massive hack say security experts as a fourth malware strain is discovered

  • Security
  • 20 January 2021
Cybersecurity in 2021: Looking ahead to another unpredictable year
Cybersecurity in 2021: Looking ahead to another unpredictable year

The big topics will be the cloud, social engineering, automation and security budgets, as firms work to address corners cut in the pandemic

  • Security
  • 19 January 2021
Big tech must start paying its taxes
The Coronavirus pandemic makes it more essential than ever that big tech pays its taxes

With essential services and safety nets struggling thanks in part to years of austerity and the more recent pandemic, it's time for big tech to step up and pay its dues, argues Stuart Sumner

  • Legislation and Regulation
  • 19 January 2021
sNCSC launches CyberFirst Girls Competition - aims to boost female representation in cyber security
NCSC launches CyberFirst Girls Competition - aims to boost female representation in cyber security

Women make up just eight per cent of the cyber workforce in the UK

  • Security
  • 18 January 2021
BA faces possible £800m data breach claim

Claim would be the largest group action personal data claim in UK history

  • Legislation and Regulation
  • 13 January 2021
blog comments powered by Disqus
Back to Top

Most read

Software errors wipes 'thousands' of arrest records from police databases
Software errors wipes 'thousands' of arrest records from police databases
Women in IT: don't get stuck in 'glue work' if you want to get on
Women in IT: don't get stuck in 'glue work' if you want to get on
New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach
New SolarWinds hack victims emerging every day, as Malwarebytes goes public on breach
Delta: Microsoft's identity management lead is under threat
Delta: Microsoft's identity management lead is under threat
BT faces possible £500m claim for overcharging landline-only customers
BT faces possible £500m claim for overcharging landline-only customers
  • Contact
  • Delta
  • Marketing solutions
  • Enterprise IT Events
  • Incisive Media
  • Terms & conditions
  • Policies
  • Careers
  • Twitter
  • LinkedIn
  • Newsletters
  • Facebook
  • YouTube

im_logo

© Incisive Business Media (IP) Limited, Published by Incisive Business Media Limited, New London House, 172 Drury Lane, London WC2B 5QR, registered in England and Wales with company registration numbers 09177174 & 09178013

Digital publisher of the year
Digital publisher of the year 2010, 2013, 2016 & 2017
Loading