FEATURED

Tor network exit nodes found to be sniffing passing traffic

Tor network exit nodes found to be sniffing passing traffic

If you are routing your traffic through the Tor network, don't make the assumption that it is always providing end-to-end security.

LATEST NEWS

Apple fixes dozens of vulnerabilities in iOS and OS X

Apple fixes dozens of vulnerabilities in iOS and OS X

Security flaws would have allowed remote code execution and Man-in-the-Middle attacks

Updated: Cisco Systems moves to buy OpenDNS for £405m

Updated: Cisco Systems moves to buy OpenDNS for £405m

The news that Cisco Systems intends to buy OpenDNS for $635 million (£405 million) raises questions about the company's strategy regarding cloud and IoT security.

US still lags on chip and pin for card security

US still lags on chip and pin for card security

Speaking at a US Federal Reserve conference in Missouri, Jerome Powell called EMV card deployment a step forward but questioned the security of cards that use signatures, not PINs, for authentication.

PRODUCT REVIEWS

Boldon James Classifier v3.7

starstarstarstar½
The Boldon James Classifier bundle is a comprehensive data leakage prevention solution that is easy to implement in organisations large and small.

TITUS Classification Suite

starstarstarstarstar
TITUS Classification Suite approaches data classification in a unique way: By giving power back to the user while double-checking with automated analysis.

Code Green Networks TrueDLP

starstarstarstar½
Code Green Network's TrueDLP product is an extremely effective solution to data leak protection.

Upcoming Webcasts

Opinions

Security considerations when taking iPad POS mainstream

Security considerations when taking iPad POS mainstream

Businesses of all sizes have begun to consider iPad POS as a viable option, but what are the security implications, asks Josh Smith.

Last Word: Cyber-blackout - The dangers within and without the grid

Last Word: Cyber-blackout - The dangers within and without the grid

Utilities face thousands of cyber-attacks every day, but we are not prepared for a successful take-down despite the very real threat says Oliver Eckel

THREAT OF THE MONTH: Cryptolocker

THREAT OF THE MONTH: Cryptolocker

Director's Cut

SC Webcasts UK

Sign up to our newsletters

FOLLOW US