FEATURED

Love 'exaggerating mental illness to avoid extradition', court hears

Love 'exaggerating mental illness to avoid extradition', court hears

Lauri Love is hiding behind his mental illness to avoid being sent to the US for trial, according to arguments heard in his extradition hearing yesterday. Tom Reeve reports from Westminster Magistrates' court.

LATEST NEWS

Liar, liar, email on fire: the security value of lie detecting algorithms

Liar, liar, email on fire: the security value of lie detecting algorithms

Researchers have developed a method of identifying linguistic clues in electronic communications that could point to possible cases of deception. Could lie-detecting algorithms reduce the impact of phishing emails?

Founder of Just10 says global surveillance laws are a 'false dichotomy'

Founder of Just10 says global surveillance laws are a 'false dichotomy'

Fred Ghahramani, founder of Just10, says global surveillance laws are a 'false dichotomy' as the risks presented are far greater than what is gained for the average citizen.

World-Check due diligence list leaked online, Thomson-Reuters admits

World-Check due diligence list leaked online, Thomson-Reuters admits

A list of people suspected of links with crime and terrorism from due diligence company World-Check has been leaked online, reportedly by a former associate.

Hackers investing 40% of crime proceeds in new criminal techniques

Hackers investing 40% of crime proceeds in new criminal techniques

Cyber-criminals are investing up to 40 percent of their stolen funds in improving and modernising their techniques and criminal schemes according to a recent report issued by cyber-experts at the Russian Ministry of Communications.

PRODUCT REVIEWS

Beyond Trust Retina CS Enterprise Vulnerability Management

starstarstarstarstar
This is a full-featured vulnerability management platform with all of the bells and whistles you need to deal with vulnerabilities on your enterprise.

Core Insight

starstarstarstarstar
Insight automates much of the vulnerability management workflow beginning with asset discovery.

Idappcom Traffic IQ Professional

starstarstarstar½
Traffic IQ Professional may be just what the doctor ordered.

Upcoming Webcasts

Opinions

The five pillars of Network Access Control (NAC) needed to enforce BYOD

The five pillars of Network Access Control (NAC) needed to enforce BYOD

Paul Donovan outlines the main questions to ask when choosing a NAC solution to work alongside a BYOD policy while protecting the network

Email is dead ... Long live malicious email

Email is dead ... Long live malicious email

email is one of the main routes for delivering malware into the enterprise, but despite frequent reports of its demise, it appears here to stay, so companies had better tailor their security posture accordingly says Carl Leonard.

Protecting Your Business Advantage

Protecting Your Business Advantage

Andrew Rogoyski says that companies need to identify what is truly their most sensitive, most valuable data - the thing that would most severely impact the company if stolen or compromised.

Director's Cut

SC Webcasts UK

Sign up to our newsletters

FOLLOW US