FEATURED

ICYMI: EU data protection, iPhone spyware and Flash zero-days

ICYMI: EU data protection, iPhone spyware and Flash zero-days

The latest ICYMI column looks at the biggest stories on SC this week, including worrying news on EU data protection laws, claims of iPhone spyware and new Flash Player zero-days.

LATEST NEWS

ENISA launches cloud certification framework

ENISA launches cloud certification framework

The European Union has introduced a new scheme to help customers negotiate the security minefield when buying cloud services.

New EU data protection law to arrive in 2015

New EU data protection law to arrive in 2015

The European Union has indicated that the widely-awaited General Data Protection Regulation (GDPR) will come to fruition before the end of the year.

UK lawyer warns of cyber-insurance loopholes

UK lawyer warns of cyber-insurance loopholes

A leading UK lawyer has said that cyber-insurance can play a part in a business cyber-security strategy, so long as the risks are understood.

Ghostbusting in the 'critically' vulnerable Linux machine

Ghostbusting in the 'critically' vulnerable Linux machine

Whose afraid of GHOSTs? Disagreement over potential risks of new Linux vulnerability, but layered defence is recommended.

PRODUCT REVIEWS

RiskIQ Platform

Threat protection centered outside the firewall.

TITUS Classification Suite

Provides classification for data, largely in a Microsoft environment, plus mobile environments.

Boldon James Classifier

Allows users to apply relevant visual and metadata labels.

Upcoming Webcasts

Opinions

Who could deny that spies now use covert spyware?

Who could deny that spies now use covert spyware?

A good spying programme in the 21st century cannot exist without good covert spyware. So it's time to put a military discipline behind defending our state IT infrastructure says Ralf Benzmüller.

What data jurisdiction means for cloud providers: Satisfy local, grow global

What data jurisdiction means for cloud providers: Satisfy local, grow global

New data sovereignty regulations should not be seen as an obstruction, but as an opportunity to increase market share with innovative offerings says Cameron Burke.

Sound and webcam loggers

Sound and webcam loggers

Every sensor has the potential to be used for malicious logging - and anti-virus based systems aren't an effective defence says Janusz Siemienowicz who adovcates monitoring of behaviour.

Director's Cut

SC Webcast 17 Feb 2015

Sign up to our newsletters