Featured news

IoTSF conference: EU should become de facto regulator

IoTSF conference: EU should become de facto regulator

Companies will produce products that meet the strictest requirements of the regions in which they want to operate, and the EU should take advantage of this to regulate IoT, speaker says.

LATEST NEWS

News Bournemouth University students showcase their cyber-security skills

Bournemouth University students showcase their cyber-security skills

Bournemouth University hosted students responding to real time simulated cyber-attack on a network server and cyber-lock picking challenges designed by leading industry employers BT and Raytheon.

News Automated phishing campaigns increase profits for hackers

Automated phishing campaigns increase profits for hackers

Imperva Hacker Intelligence Initiative report reveals Phishing-as-a-Service campaigns cost less to execute and are twice as profitable as traditional campaigns.

News N. Korea accused of hacking S. Korea' military cyber-command

N. Korea accused of hacking S. Korea' military cyber-command

South Korea has announced that its military cyber-command appears to have been breached by North Korea. It is not clear whether low-grade documents or more important details like war plans were accessed.

News DailyMotion breached, 85 million accounts made off with

DailyMotion breached, 85 million accounts made off with

One of the internet's foremost video hosting platforms has been breached and hackers have made off with tens of millions of account details.

Feature Articles

IBM: Carmina Lees interview

IBM: Carmina Lees interview

IBM is starting to make waves in the cyber-security space, leveraging the fact that it has to secure its own vast global business. Carmina Lees, vice president, security business unit, UK & Ireland at IBM, is effectively a mini-CEO running her own P&L operation within IBM where she is an 18-year industry veteran, but when it comes to cyber-security, Lees is a relative newcomer.

The information security implications of M&A deals

The information security implications of M&A deals

Sooraj Shah finds out which areas of information security companies should be focusing on first to ensure their business is secure post-M&A

Crafty downloads: they had you at 'free'

Crafty downloads: they had you at 'free'

Security researchers from Google have published the results of a year-long investigation into the practice of pay-per-install software bundling - and they aren't impressed.

Opinions

The fines they are a changin'...

The fines they are a changin'...

Nic Scott discusses how UK businesses can re-evaluate and enhance the security measures they currently have in place in order to avoid potentially crippling fines when EU GDPR comes into force.

Cyber-security must reflect risk not just regulation

Cyber-security must reflect risk not just regulation

Security is often closely associated with standards and regulations, and there's an assumption that if you are compliant, by default you are secure. That's a dangerous assumption says Nadav Shatz.

Account takeover fraud is not a lottery: lax security allows fraudsters in

Account takeover fraud is not a lottery: lax security allows fraudsters in

Roberto Valerio addresses the latest breach from the National Lottery and analyses how and why this type of fraud is on the rise

PRODUCT REVIEWS

AlgoSec Security Management Solution

starstarstarstarstar
This tool can manage security – and, thus, risk and policies – by managing the data flows within the enterprise.

Skybox Security Suite

starstarstarstarstar
This tool manages the security on the enterprise’s entire threat surface.

SolarWinds Network Configuration Manager

starstarstarstarstar
SolarWinds has pulled all of its capabilities together in its network configuration manager (NCM).

Upcoming Webcasts

Director's Cut

SC Webcasts UK

Sign up to our newsletters

FOLLOW US