FEATURED

ICYMI: Brexit, SWIFT heists, Office 365 phishing, CCTV botnets and more Brexit

ICYMI: Brexit, SWIFT heists, Office 365 phishing, CCTV botnets and more Brexit

This week's In Case You Missed it looks at Brexit, Cerber Ransomware, CCTV botnets and yet another heist on a SWIFT affiliate

LATEST NEWS

LizardStresser botnets using webcams, IoT gadgets to launch DDoS attacks

LizardStresser botnets using webcams, IoT gadgets to launch DDoS attacks

Lizard Squad's LizardStresser botnet rising in popularity as hackers and cyber-criminals increasingly look to it as a way of assimilating IoT devices for later DDoS attacks

IRM boss says government is to blame for cyber-skills gap

IRM boss says government is to blame for cyber-skills gap

IRM CEO Charles White says the reason there is a cyber-skills gap in the UK is due to the onerous security checks imposed by government and its inability to introduce more appropriate procedures.

Euros open space for security oversights

Euros open space for security oversights

The immensely popular European Football Championships may not be seen so favourably by your company's IT security team

Flaws in Android full disk encryption revealed

Flaws in Android full disk encryption revealed

An Israeli university student has found flaws in Android, which would allow a brute force attack to crack the full disk encryption

PRODUCT REVIEWS

Skybox Security Security Suite

starstarstarstarstar
Many of Security Suite's modules interact in such a manner that the overall management of vulnerabilities – particularly analytics – is enhanced significantly.

Tenable Nessus Manager/Cloud

starstarstarstarstar
This has next-generation capabilities.

Tripwire IP360

starstarstarstarstar
The IP360 is a feature-rich vulnerability management system with a pure-play vulnerability assessment personality.

Upcoming Webcasts

Opinions

A push for data-centric security: What organisations must consider

A push for data-centric security: What organisations must consider

Ron Arden takes a data-centric approach to security where the focus is on protecting the data within a system, and not just the system itself

The five pillars of Network Access Control (NAC) needed to enforce BYOD

The five pillars of Network Access Control (NAC) needed to enforce BYOD

Paul Donovan outlines the main questions to ask when choosing a NAC solution to work alongside a BYOD policy while protecting the network

Email is dead ... Long live malicious email

Email is dead ... Long live malicious email

email is one of the main routes for delivering malware into the enterprise, but despite frequent reports of its demise, it appears here to stay, so companies had better tailor their security posture accordingly says Carl Leonard.

Director's Cut

SC Webcasts UK

Sign up to our newsletters

FOLLOW US