FEATURED

ICYMI: BT outage; Euro CNI vulnerable; 4 rail attacks; Polish telecom hack: ransomware uses cloud

ICYMI: BT outage; Euro CNI vulnerable; 4 rail attacks; Polish telecom hack: ransomware uses cloud

The latest In Case You Missed It (ICYMI) looks at BT outage; Euro CNI vulnerable; 4 rail attacks; Polish telco breached; ransomware uses cloud

LATEST NEWS

BlackBerry & Apple rumble: CEO calls helping law enforcement 'civic duty'

BlackBerry & Apple rumble: CEO calls helping law enforcement 'civic duty'

Cooperating with law enforcement is "our basic civic responsibility," BlackBerry CEO John Chen told reporters at a media Q&A at the BlackBerry Security Summit in New York.

WordPress Summer of Pwnage: 64 holes in 21 days

WordPress Summer of Pwnage: 64 holes in 21 days

As the Pwnage summer heat rages on, hackers find 64 holes in popular publishing platform, WordPress

Pokemon Go 'a western cyber-espionage tool'?

Pokemon Go 'a western cyber-espionage tool'?

Cyber-security experts in Russia are concerned about the data collecting abilities of apps such as Pokemon Go, even speculating whether they were specifically created by western security services as cyber-espionage tools

Opinions

The five tips for a safer Cloud

The five tips for a safer Cloud

Tony Anscombe discusses the biggest mistakes companies make when moving to the cloud and tips to reap the benefits

Poking around with Pokémon: why app developers need to address permission abuse

Poking around with Pokémon: why app developers need to address permission abuse

Ken Munro discusses why Pokémon Go is symptomatic of a wider problem - permissions abuse by mobile apps - and the implications of this for the user and app developer

How to protect against compromised credentials — without affecting employee productivity

How to protect against compromised credentials — without affecting employee productivity

François Amigorena explains why compromised credentials are a major cyber-threat to organisations and how cumbersome security wastes time, whereas contextual awareness allows greater security automatically.

PRODUCT REVIEWS

VMware AirWatch Enterprise Mobility Management

starstarstarstarstar
This product is well thought-out and has a lot of good functionality.

IBM MaaS360

starstarstarstar
Security is excellent and the policy capabilities are what you should expect in a product of this type.

Citrix XenMobile

starstarstarstarstar
Of the products we reviewed, Citrix XenMobile was the easiest to deploy, use and provision.

Upcoming Webcasts

Director's Cut

SC Webcasts UK

Sign up to our newsletters

FOLLOW US