FEATURED

SC Exclusive: Cyber-security fails to make the grade at university

SC Exclusive: Cyber-security fails to make the grade at university

The cyber-security skills gap is likely to continue, if not get worse, according to the numbers of people studying the subject at degree level.

LATEST NEWS

Video nasty as Blu-ray malware routes identified

Video nasty as Blu-ray malware routes identified

Blu-Ray vulnerabilities exploited to create 'take-over' disc that also keeps the movie running.

Hackers target hedge funds to manipulate trading algorithms

Hackers target hedge funds to manipulate trading algorithms

It's not just Ed Milliband that has hedge funds in his sights, there are others looking for rich pickings too.

TalkTalk blames supplier for breach affecting 4m customers

TalkTalk blames supplier for breach affecting 4m customers

UK telephone and broadband provider TalkTalk has blamed an unidentified third-party for a data breach late last year, which saw hackers steal account numbers, addresses, phone numbers - and money - from up to four million customers.

Target breach costs £124 million - so far

Target breach costs £124 million - so far

The costs of the Target breach dwarf the costs of increased security or insurance.

PRODUCT REVIEWS

Norse DarkWatch

Threat intelligence appliance that ties the Norse DarkMatter infrastructure to your network.

iSight Partners ThreatScape

Adds a lot of value to your security stack by applying threat intelligence. Provides a prodigious amount of extremely useful research, much of it from analysts around the globe.

SurfWatch CSuite

This is a very good threat intelligence tool where almost all of the threat sources and analytics are under the covers.

Upcoming Webcasts

Opinions

Are digital loss prevention and signature-based anti-virus living on borrowed time?

Are digital loss prevention and signature-based anti-virus living on borrowed time?

Should fingerprint-based data leakage protection be declared dead asks Peter Tyrrell, suggesting it just doesn't scale for the hyper-connected world.

Change management - security vulnerability or scapegoat?

Change management - security vulnerability or scapegoat?

IT security issues continue to hit critical services, but do we, the public, ever know for sure if they are due to error, system failure, or an attack?

How does PCI DSS 3.0 affect you?

How does PCI DSS 3.0 affect you?

Suspicious activity now needs to be monitored in the entire processing chain, hence implementing PCI DSS 3.0 helps stop attacks before compromises occur says Ross Brewer.

Director's Cut

SC Webcasts UK

Sign up to our newsletters

FOLLOW US