FEATURED

GitHub attack - evidence points to China

GitHub attack - evidence points to China

China is being accused of pulling unwitting users into DDos attacks on the GitHub website to hit anti-censorship activists.

LATEST NEWS

IBM invests £2bn in IoT

IBM invests £2bn in IoT

IBM has a £2 billion development programme better integrate data into its plaforms via a new internet of things unit, as well as creating a new a cloud platform.

FBI, Europol and MI6 gang up on tech firms over encryption

FBI, Europol and MI6 gang up on tech firms over encryption

Worldwide law enforcement continues to voice concerns over technology companies' increasing use of encryption.

UK Safari users able to sue Google over privacy

UK Safari users able to sue Google over privacy

Courts tell Safari users they can sue Google over cookie privacy violation, considered ironic given Google's support for combatting government surveillance.

UK firms at risk from attacks on crypto keys, digital certificates

UK firms at risk from attacks on crypto keys, digital certificates

A joint study from Venafi and the Ponemon Institute reveals that digital keys and certificates are in peril, especially at UK organisations.

PRODUCT REVIEWS

BeyondTrust UVM20 Security Management Appliance

starstarstarstar½
The BeyondTrust UVM20 Security Management Appliance is the preconfigured hardware offering of Retina CS Enterprise Vulnerability Management.

Core Security Core Insight

starstarstarstarstar
Core Security’s Core Insight is the gold standard for penetration testing and vulnerability assessment.

Qualys Express Lite

starstarstarstarstar
Qualys Express Lite is a cloud-based vulnerability assessment tool intended for small businesses.

Upcoming eConference

Opinions

Organisations are compromised - time to Respond!

Organisations are compromised - time to Respond!

In the wake of successful cyber-attacks, and security incidents taking down some of the biggest brands on the planet, impacting critical infrastructure and banking systems alike, it may be asserted that, when it comes to technology, by evidenced implication, it would seem to be exposed, fragile and vulnerable.

Spear Phishing: Extracting the sting from infected documents

Spear Phishing: Extracting the sting from infected documents

Targeted emails with infected attachments are the hacker's weapon of choice but there are ways to avoid being spiked by spear phishing says Noam Green.

You think you've nothing to steal? Hackers don't agree.

You think you've nothing to steal? Hackers don't agree.

Few understand the value of their website to hackers says Ilia Kolochenko, warning that even an individual blog is potentially at risk.

Director's Cut

SC Webcasts UK

Sign up to our newsletters

FOLLOW US