FEATURED

ICYMI: Gov spies grab crypto keys, Masque attacks & interviewing Eugene

ICYMI: Gov spies grab crypto keys, Masque attacks & interviewing Eugene

The latest In Case You Missed It column looks at the biggest stories on SC this week, including the alleged NSA/GCHQ hack on Gemalto and our interview with Eugene Kaspersky.

LATEST NEWS

TalkTalk blames supplier for breach affecting 4m customers

TalkTalk blames supplier for breach affecting 4m customers

UK telephone and broadband provider TalkTalk has blamed an unidentified third-party for a data breach late last year, which saw hackers steal account numbers, addresses, phone numbers - and money - from up to four million customers.

Target breach costs £124 million - so far

Target breach costs £124 million - so far

The costs of the Target breach dwarf the costs of increased security or insurance.

Jetty web servers vulnerable to Heartbleed-style attacks

Jetty web servers vulnerable to Heartbleed-style attacks

A critical flaw found on open-source Jetty HTTP web servers could - if left unpatched - lead to hackers hijacking internet sessions and stealing sensitive data.

Banking Trojan 'Vawtrak' spotted in the wild

Banking Trojan 'Vawtrak' spotted in the wild

Banking Trojan 'Vawtrak' has been spotted in the wild, and it's 'much improved' compared to a year ago.

PRODUCT REVIEWS

Norse DarkWatch

Threat intelligence appliance that ties the Norse DarkMatter infrastructure to your network.

iSight Partners ThreatScape

Adds a lot of value to your security stack by applying threat intelligence. Provides a prodigious amount of extremely useful research, much of it from analysts around the globe.

SurfWatch CSuite

This is a very good threat intelligence tool where almost all of the threat sources and analytics are under the covers.

Upcoming Webcasts

Opinions

How does PCI DSS 3.0 affect you?

How does PCI DSS 3.0 affect you?

Suspicious activity now needs to be monitored in the entire processing chain, hence implementing PCI DSS 3.0 helps stop attacks before compromises occur says Ross Brewer.

Turning the tide on APTs and nation state attackers

Turning the tide on APTs and nation state attackers

Deal with APT intruders logically, not emotionally, and get the upper-hand - even if that means leaving them on the network says Mike Auty,

Ensuring mobile data remains secure

Ensuring mobile data remains secure

Containerisation - separating business and personal data and apps - is an effective way to ensure BYOD doesn't compromise corporate data security says David Brady.

Director's Cut

SC Webcasts UK

Sign up to our newsletters

FOLLOW US