FEATURED

NSA, GCHQ or both behind Stuxnet-like Regin malware?

NSA, GCHQ or both behind Stuxnet-like Regin malware?

Symantec has discovered a new piece of customisable malware - reminiscent of the Stuxnet worm - which has been stealing data from governments, telcos, energy companies and SMEs since 2008. And experts say the threat actor could be the US or UK government.

LATEST NEWS

National Grid CISO talks up security convergence

National Grid CISO talks up security convergence

National Grid's chief information security officer and head of digital risk Graham Wright talked targeted attacks, critical infrastructure and the blurring of physical and digital security at a recent London conference.

Defending against APTs: 'We are behind the curve'

Defending against APTs: 'We are behind the curve'

High-profile CISOs and senior IT security managers talked advanced persistent threats (APTs) and how they can be countered at SC Magazine's latest roundtable in central London.

Russia to ban State use of foreign software in bid to boost IT-security

Russia to ban State use of foreign software in bid to boost IT-security

Russia reportedly plans to ban imports of foreign software for state use from next year according to recent government statements.

China could put America's lights out, says NSA chief

China could put America's lights out, says NSA chief

The head of the NSA has said China and "one or two" other countries could shut down America's power and financial services companies, and that such an attack was "a matter of when not if".

PRODUCT REVIEWS

RiskIQ Platform

Threat protection centered outside the firewall.

RSA Web Threat Detection

Detects anomalous behaviour on websites.

TITUS Classification Suite

Provides classification for data, largely in a Microsoft environment, plus mobile environments.

Virtual Events

Opinions

Start with security

Start with security

Security needs to be a concern throughout the software development cycle, not just a developer issue, nor simply tagged on at the end says Stephen Morrow.

Avoid security breaches during reorganis​ation and mergers

Avoid security breaches during reorganis​ation and mergers

Paul Bonner advises companies merging to take the best security practice from each component company, and not impose the practices of the dominant player - or resistance is likely.

Is your website fit and secure for King Consumer?

Is your website fit and secure for King Consumer?

B2B websites could learn a lot about security from their consumer facing compatriots suggests Bob Tarzey.

Director's Cut

Sign up to our newsletters