FEATURED

VPN services at risk from IPv6 vulnerability

VPN services at risk from IPv6 vulnerability

Users who have opted for a VPN service could be at risk from hackers thanks to the way that providers handle IPv6 traffic.

LATEST NEWS

Tor network exit nodes found to be sniffing passing traffic

Tor network exit nodes found to be sniffing passing traffic

If you are routing your traffic through the Tor network, don't make the assumption that it is always providing end-to-end security.

US still lags on chip and pin for card security

US still lags on chip and pin for card security

Speaking at a US Federal Reserve conference in Missouri, Jerome Powell called EMV card deployment a step forward but questioned the security of cards that use signatures, not PINs, for authentication.

Cisco intends to buy OpenDNS

Cisco intends to buy OpenDNS

Cisco plans to acquire OpenDNS for £405 million.

PRODUCT REVIEWS

Gemalto SafeNet Authentication Service

starstarstarstar¾
SafeNet Authentication Service is a cloud-based authentication service that uses a wide range of tokens and custom agents to support multifactor authentication to include one-time passwords generated by a phone app, SMS, a hardware token or email.

Cyphercor LoginTC

starstarstarstar½
LoginTC from Cyphercor is a cloud-based solution that uses a mobile device or a desktop for authentication. It has easy-to-use iOS, Android and Chrome desktop applications to approve logins to a variety of products.

Imation IronKey F200 Flash Drive

starstarstarstarstar
The Imation IronKey F200 Flash Drive is a simple, easy to set up and extremely secure device for users who need to transport confidential data between computers.

Upcoming Webcasts

Opinions

The world of data breaches - and how to avoid being part of it

The world of data breaches - and how to avoid being part of it

Norman Shaw looks at the causes of data breaches, what it costs and what the market needs to consider in order to protect itself.

Rombertik: what you should know about the evolution of destructive malware

Rombertik: what you should know about the evolution of destructive malware

Protecting yourself against malware that's aware of anti-virus programs and can self destruct to avoid detection is tricky, says Corey Nachreiner.

EU relaxes Data Protection Regulation reform

EU relaxes Data Protection Regulation reform

Less stick more carrot: EU relaxation of Data Protection Regulation reform is a positive development, says James Henry.

Director's Cut

SC Webcasts UK

Sign up to our newsletters

FOLLOW US