Archive | Sponsor

Everything you wanted to know about cloud security in your enterprise SPONSOR

[Sponsor] Everything you wanted to know about cloud security in your enterprise

Many thanks to secure cloud hosting experts FireHost, who again sponsored my writing for the last week. Thanks guys!

FireHost is offering readers a free white paper by independent analyst and consultancy firm Ovum, that explores the challenges and opportunities in adopting the cloud, and the role of security in furthering cloud acceptance across applications and services.

The white paper, written by Ovum's Principal security analyst, discusses key topics such as cloud adoption rates; drivers for outsourcing to specialist providers; multi-cloud strategies; and the requirements for cloud service provides around security, risk and compliance.

Reading the free white paper, you'll learn that security and compliance must be central components to cloud-based infrastructure services within the enterprise.


If you’re interested in exclusively sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
[Sponsor] "Security of Internet Payments - Legislative Developments in Europe" - a free report to download SPONSOR

[Sponsor] "Security of Internet Payments - Legislative Developments in Europe" - a free report to download

My sincere thanks to authentication experts VASCO, who have sponsored my writing for the last week. Thanks guys!

Following the popularity of the free mobile security ebook and free reference guide to building a secure mobile strategy, VASCO Data Security is now offering readers of Graham Cluley Security News a new guide that will is essential reading for some businesses.

Rising levels of fraud are being observed in internet payments, with latest pan-European figures showing that fraud on card internet payments alone caused €794 million of losses in 2012 (up by 21.2% from the previous year).

It's against this backdrop that the European Banking Authority (EBA) has set out its guidelines, aimed at creating a more secure, competitive and consumer-friendly rules for payments in the European Union.

Learn everything you need to know by downloading "Security of Internet Payments - Legislative Developments in Europe", VASCO's free industry briefing, right now.

(more…)

Read more...
Everything you wanted to know about cloud security in your enterprise SPONSOR

[Sponsor] Everything you wanted to know about cloud security in your enterprise

My sincere thanks to secure cloud hosting experts FireHost, who have sponsored my writing for the last week. Thanks guys!

FireHost is offering a free white paper by independent analyst and consultancy firm Ovum, that explores the challenges and opportunities in adopting the cloud, and the role of security in furthering cloud acceptance across applications and services.

The white paper, written by Ovum's Principal security analyst, discusses key topics such as cloud adoption rates; drivers for outsourcing to specialist providers; multi-cloud strategies; and the requirements for cloud service provides around security, risk and compliance.

Reading the free white paper, you'll learn that security and compliance must be central components to cloud-based infrastructure services within the enterprise.


If you’re interested in exclusively sponsoring my site for a week, and reaching an IT-savvy audience that cares about computer security, you can find more information here.

Read more...
Download your free copy of VASCO's "Biometrics in Banking" guide [Sponsor] SPONSOR

[SPONSOR] Learn how to successfully implement a secure mobile strategy – Download VASCO's free guide

My sincere thanks to authentication experts VASCO, who have sponsored my writing for the last week. Thanks guys!

Following the popularity of the free mobile security ebook VASCO gave away last week, they've put together a new free reference guide which aims to help you build a secure mobile strategy that your users will love.

(more…)

Read more...
[SPONSOR] Download VASCO's free guide to securing mobile apps SPONSOR

[SPONSOR] VASCO's free guide to securing mobile apps - download now!

My sincere thanks to VASCO, who have sponsored my writing for the last week, and continue to sponsor me for the upcoming week too. Check out their free ebook about mobile security or their free guide for implementing a secure mobile strategy. Thanks guys!

Mobile applications are changing the way business is done, offering instant access to services for your users. Unfortunately, attackers are taking advantage of the many complexities created by the mobile ecosystem to exploit vulnerabilities, resulting in sophisticated fraud schemes and theft of sensitive data

When it comes to your mobile applications, VASCO can help you ensure the right levels of security, without creating additional challenges for your mobile users.

To help you, VASCO has put together a great free ebook which looks at the challenges of today's mobile application ecosystem, the top 10 mobile security risks and the pitfalls you might encounter in mobile application development.

(more…)

Read more...
WikID SPONSOR

[SPONSOR] WiKID Two-factor Authentication without the hassle factor - Free for 5 users!

My sincere thanks to WiKID, who have sponsored my writing for the last week. Check out their two-factor authentication solution - which is free for five users. Thanks guys!

Here is how they describe their product:

The WiKID Strong Authentication System is a dual-source, on-premises two-factor authentication solution for enterprises. The WiKID server is simple to implement and maintain, highly reliable and supports all Enterprise-class remote access and privileged account solutions.

The WiKID server is available as a virtual appliance - no Linux experience necessary or as DEB/RPM packages.

(more…)

Read more...
IKANOW logo SPONSOR

[SPONSOR] IKANOW's free eBook "Beyond The Kill Chain"

My sincere thanks to IKANOW, who have sponsored my writing for the last week. Thanks guys!

The Kill Chain can play an important part of your cyber defense - however it's a very reactive approach.

Download IKANOW's latest FREE eBook, "Beyond The Kill Chain: How Information Security Platforms Must Evolve For Today's CISO" to learn about how to take a more proactive stance.

This eBook covers:

  • How today's CISO needs to be proactive, not reactive
  • Why the Kill Chain is crucial, but not enough
  • 7 requirements for a next-gen security platform

Download the free ebook now and learn more.

(more…)

Read more...
activedefence SPONSOR

[SPONSOR] activereach's free guide to DDoS attacks and mitigation

My sincere thanks to DDoS mitigation and testing specialists activereach, who have sponsored my writing for the last four weeks. Thanks guys!

Receive part one of activereach's free "Guide to DDoS and mitigation 2015" now and also receive "Assessing the risk to business of DDoS attacks" and "Aspects of DDoS mitigation testing" free over the next few weeks.

In part one of the guide to DDoS and mitigation, Max Pritchard of activereach looks at the history of distributed denial-of-service attacks, describes the way DDoS attacks are categorised and examines the mitigation techniques and solutions that are being employed by companies today.

(more…)

Read more...
ImmuniWeb SPONSOR

Thanks to our sponsor: ImmuniWeb from High-Tech Bridge

My sincere thanks to information security experts High-Tech Bridge, who sponsored my writing this week.

High-Tech Bridge is the developer of ImmuniWeb.

I’ve had my own experience with ImmuniWeb, after it successfully found a (thankfully small) vulnerability on my website, and helped me secure against it. So I’m delighted to have the experts at High-Tech Bridge supporting the site, as I can personally vouch for the quality of their service.

(more…)

Read more...
Foursys logo SPONSOR

Thanks to our sponsor: Foursys

My sincere thanks to IT security specialists Foursys, who sponsored my writing this week.

You can download the free Foursys "Quick Start Guide to Ethical Hacking" now - including example lab tests.

The Foursys Quick Start Guide to Ethical Hacking sets out the definition, goals and processes involved in the use of ethical hacking.

Using practical examples, the guide covers the 5 key phases of hacking typically used by hackers to gain access to networks that IT Administrators all too often believe are secure.

From initial network and system reconnaissance of target networks, to scanning for possible areas of vulnerability, through gaining and maintaining access, to hiding the evidence of an attack, the Guide offers often thought-provoking insights into the techniques and secrets of malicious hackers.

With example lab tests that can be readily used by IT professionals, the “Quick Start Guide to Ethical Hacking” offers a comprehensive look at some of the methods used, helping you stay a step ahead of the hackers by understanding their mind-set. Crucially, it will also help you put the necessary measures in place to prevent them compromising your network.

Download the "Quick Start Guide to Ethical Hacking" now.

(more…)

Read more...
AV-Comparatives SPONSOR

Thanks to our sponsor: AV-Comparatives

My sincere thanks to AV-Comparatives who sponsored my writing this week.

AV-Comparatives is an independent organization offering systematic testing that checks whether security software, such as PC/Mac-based antivirus products and mobile security solutions, lives up to its promises.

Using one of the largest sample collections worldwide, it creates a real-world environment for truly accurate testing. AV-Comparatives offers freely accessible results to individuals, news organizations and scientific institutions.

The AV-Comparatives Summary Report 2014 is now available! Find out which products scored best in its public main-test series of 2014.

(more…)

Read more...
IKANOW SPONSOR

Thanks to our sponsor: IKANOW

My sincere thanks to IKANOW who sponsored my writing this week.

You're invited to attend an upcoming webinar hosted by IKANOW & 451 Research Group that will cover how to arm your team with big data analytics & threat intelligence to effectively fight cyber attacks.

IKANOW is an open, flexible & scalable Information Security Platform that provides Business Intelligence to the CISO to drive change in an organization, reduces the resource required to perform critical security tasks and provides an additional layer of defense against Advanced Persistent Threats.

Space is limited so find out more and register today!

(more…)

Read more...
Sponsor: Suits and Spooks DC 2015 SPONSOR

Thanks to our sponsor: Suits and Spooks DC 2015

Thanks go this week to Suits and Spooks DC 2015, for their sponsorship of Graham Cluley Security News.

You're invited to attend Suits and Spooks DC 2015, the most intriguing cybersecurity-focused event of the year, on February 4-5 2015.

Suits and Spooks is a unique, limited attendance cyber security event (which they call a "collision"). Each event draws thought leaders and decision makers from the public, private, defense, law enforcement and intelligence sectors who come to learn about and discuss key security challenges.

(more…)

Read more...
WPEngine SPONSOR

Thanks to our sponsor: WP Engine

My sincere thanks go to managed WordPress hosting firm WP Engine for its support this week of Graham Cluley Security News.

WP Engine specialises in WordPress-hosting. They live and breathe this stuff, which means that they know their onions – and have thought through exactly how to harden a WordPress site from attack.

There is more I could say, but maybe all you need to know is that when I set up Graham Cluley Security News, I realised that security and uptime were not something I was prepared to compromise over. So I chose to host my site with WP Engine.

Oh, and until the end of January you can save 15% off an annual WP Engine subscription on the Personal, Professional, and Business plans, by using the code NEWYEARNEWHOST15

Go here for a free 60-day trial or contact them directly for more info.

(more…)

Read more...