Featured news

ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud

ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud

Our roundup of top stories from this week, have a great weekend!

LATEST NEWS

News Data centres are on the move - where will they end up?

Data centres are on the move - where will they end up?

Tech companies are seeking to move their data centres out of the UK's jurisdiction to avoid any data privacy issues due to Brexit and the GDPR.

News Imperva: beware of automated registration bots, they're great at concealing fraud

Imperva: beware of automated registration bots, they're great at concealing fraud

One of Imperva's security researchers has warned of automated registration bots, says "they're great at concealing fraud."

News 'Avalanche' cyber-crime platform dismantled, EU security forces praised

'Avalanche' cyber-crime platform dismantled, EU security forces praised

A four-year long investigation by various multinational law enforcement agencies including Europol, the FBI and the US Justice Department, has brought down the international criminal infrastructure platform known as 'Avalanche'.

News iCloud calendar spammers seize the day, sending junk invites

iCloud calendar spammers seize the day, sending junk invites

Apple users over the last few weeks have reportedly been besieged with spam hitting their iCloud calendars in the form of unwanted invites, after cyber-criminals figured out that they could send their junk offers directly to recipients' iCloud accounts.

Feature Articles

The information security implications of M&A deals

The information security implications of M&A deals

Sooraj Shah finds out which areas of information security companies should be focusing on first to ensure their business is secure post-M&A

Crafty downloads: they had you at 'free'

Crafty downloads: they had you at 'free'

Security researchers from Google have published the results of a year-long investigation into the practice of pay-per-install software bundling - and they aren't impressed.

AI in cyber-security - are we trying to run before we can crawl?

AI in cyber-security - are we trying to run before we can crawl?

Intelligent and automated systems are currently being touted as the next step in cyber-security to help combat the 'always-on' cyber-criminal, but are they right for us? And are we prepared for them?

Opinions

Cyber-security must reflect risk not just regulation

Cyber-security must reflect risk not just regulation

Security is often closely associated with standards and regulations, and there's an assumption that if you are compliant, by default you are secure. That's a dangerous assumption says Nadav Shatz.

Account takeover fraud is not a lottery: lax security allows fraudsters in

Account takeover fraud is not a lottery: lax security allows fraudsters in

Roberto Valerio addresses the latest breach from the National Lottery and analyses how and why this type of fraud is on the rise

Comply to supply - Firms to prove their cyber-credentials or risk losing business

Comply to supply - Firms to prove their cyber-credentials or risk losing business

If cyber-crime wasn't considered a business risk before, it is certainly being pushed to the front and centre stage by large firms now, says Chris Dye who urges adoption of file-regeneration technology.

PRODUCT REVIEWS

AlgoSec Security Management Solution

starstarstarstarstar
This tool can manage security – and, thus, risk and policies – by managing the data flows within the enterprise.

Skybox Security Suite

starstarstarstarstar
This tool manages the security on the enterprise’s entire threat surface.

SolarWinds Network Configuration Manager

starstarstarstarstar
SolarWinds has pulled all of its capabilities together in its network configuration manager (NCM).

Upcoming Webcasts

Director's Cut

SC Webcasts UK

Sign up to our newsletters

FOLLOW US