FEATURED

SC Exclusive: Cyber-security fails to make the grade at university

SC Exclusive: Cyber-security fails to make the grade at university

The cyber-security skills gap is likely to continue, if not get worse, according to the numbers of people studying the subject at degree level.

LATEST NEWS

SC Congress: People are biggest risk in APT attacks

SC Congress: People are biggest risk in APT attacks

People remain the weakest security link, especially when it comes to nation-state APT attacks.

SC Congress: Can we trust cloud security?

SC Congress: Can we trust cloud security?

Cloud security was a key issue at SC Congress in London earlier today.

Russia updates its IT security stategy in reaction to current tensions

Russia updates its IT security stategy in reaction to current tensions

Russia says it is revising its policies to help prevent information warfare, identity-theft and cyber-fraud.

Video nasty as Blu-ray malware routes identified

Video nasty as Blu-ray malware routes identified

Blu-Ray vulnerabilities exploited to create 'take-over' disc that also keeps the movie running.

PRODUCT REVIEWS

BeyondTrust UVM20 Security Management Appliance

starstarstarstar½
The BeyondTrust UVM20 Security Management Appliance is the preconfigured hardware offering of Retina CS Enterprise Vulnerability Management.

Core Security Core Insight

starstarstarstarstar
Core Security’s Core Insight is the gold standard for penetration testing and vulnerability assessment.

Qualys Express Lite

starstarstarstarstar
Qualys Express Lite is a cloud-based vulnerability assessment tool intended for small businesses.

Upcoming Webcasts

Opinions

Wiping the flaws: Why it's time to get smarter about patch management

Wiping the flaws: Why it's time to get smarter about patch management

Monolithic operating systems will attract attackers, and speed to market will trump security, so expect patches and be intelligent about how vulnerabilities are fixed says Raimund Genes.

Are digital loss prevention and signature-based anti-virus living on borrowed time?

Are digital loss prevention and signature-based anti-virus living on borrowed time?

Should fingerprint-based data leakage protection be declared dead asks Peter Tyrrell, suggesting it just doesn't scale for the hyper-connected world.

Change management - security vulnerability or scapegoat?

Change management - security vulnerability or scapegoat?

IT security issues continue to hit critical services, but do we, the public, ever know for sure if they are due to error, system failure, or an attack?

Director's Cut

SC Webcasts UK

Sign up to our newsletters

FOLLOW US