This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

FEATURED

ICYMI: Driverless cars, cyber espionage & the hidden cost of data breaches

ICYMI: Driverless cars, cyber espionage & the hidden cost of data breaches

This week's In Case You Missed It column considers early security questions on driverless cars, the hidden cost behind data breaches and new claims of industrial cyber espionage.

MORE NEWS

Gameover Trojan 'surges' after police takedown

Gameover Trojan 'surges' after police takedown

What constitutes winning in the fight against malware, and what's the value of a takedown ask commentators in the wake of Gameover Zeus' bounceback.

Privacy fears as US court rules against Microsoft

Privacy fears as US court rules against Microsoft

A New York court has told Microsoft it must hand over customer data to the US Government even though it's held overseas - reigniting a privacy debate that has also dragged in the UK Government's controversial new 'DRIP' law.

Researcher develops BadUSB code to compromise USB sticks - and their computer hosts

Researcher develops BadUSB code to compromise USB sticks - and their computer hosts

Karsten Nohl also reveals how an enhanced security approach can beat his USB architecture compromise.

PRODUCT REVIEWS

MobileEther v2.0 by iboss

starstarstarstarstar
With employees mixing personal and business applications on their mobile devices, parameters for security must be imposed. This product is also considered very good value for money.

BlackBerry Enterprise Service 10 BES10

starstarstarstarstar
With employees mixing personal and business applications on their mobile devices, parameters for security must be imposed. The product-set offers value for money.

Mobile Enterprise Compliance and Security Server MECS v1.9.4.2 by M.A.D. Partners

starstarstarstarstar
With employees mixing personal and business applications on their mobile devices, parameters for security must be imposed. We find this product is very good value for money.

Virtual Events

Opinions

Security Partnerships: Engaging at the right level

Security Partnerships: Engaging at the right level

A holistic approach to security management is needed to bridge the gap between stategy and technology says Chris Yule.

Real threats start with humans, not technology

Real threats start with humans, not technology

When the two IPs meet (intellectual property and internet protocol) the value of the business becomes vulnerable says Dave King, with IT often just providing a sticking plaster to hide C-suite ignorance.

Securing the energy industry: is success a dead CERT?

Securing the energy industry: is success a dead CERT?

Industry needs a brighter collaborative approach to help bring it out of the dark ages says Alan Carter

Director's Cut

Sign up to our newsletters