FEATURED

ICYMI: Tor rivals, Windows 10 and the cost of an APT

ICYMI: Tor rivals, Windows 10 and the cost of an APT

The latest ICYMI column looks at the biggest stories on SC this week, including a 'faster Tor', the security implications of Windows 10 and the actual cost of a real APT.

LATEST NEWS

SANS cyber-fair puts cyber-experts on the market

SANS cyber-fair puts cyber-experts on the market

The SANS Cyber Academy will hold a recruitment fair in the autumn to showcase 40 top cyber-security graduates.

Critical Bind vulnerability could snuff out large parts of internet

Critical Bind vulnerability could snuff out large parts of internet

A single packet could leave the internet in a bind, warn experts.

Modular Potao malware used to spy on targets in Ukraine, Russia

Modular Potao malware used to spy on targets in Ukraine, Russia

Researchers with ESET have been monitoring Potao malware since it was first identified in 2011.

PRODUCT REVIEWS

Varonis DatAdvantage and Data Classification

starstarstarstarstar
Varonis DatAdvantage and the Data Classification Framework work to identify where any and all of your sensitive and proprietary information lies.

Identity Finder Sensitive Data Manager

starstarstarstarstar
Identity Finder Sensitive Data Manager takes a robust approach to data leakage prevention, offering maximum security across almost any networked device.

Code Green Networks TrueDLP

starstarstarstar½
Code Green Network's TrueDLP product is an extremely effective solution to data leak protection.

Upcoming Webcasts

Opinions

Ping of Death: How an adorable sounding DDoS attack can wreak havoc

Ping of Death: How an adorable sounding DDoS attack can wreak havoc

Small doses of poison can add up to a lethal cocktail of DDoS in what is being called the ping of death, says Sophie Davidson.

Innovation versus infosecurity

Innovation versus infosecurity

Innovation and security should not be mutually exclusive but unfortunately they often are seen that way, says James Henry.

Cloud security for the 'everywhere enterprise'

Cloud security for the 'everywhere enterprise'

As mobility introduces changes in workplace dynamics, Charles Milton looks at how to shift power in favour of the CISO while securing the borderless enterprise.

Director's Cut

SC Webcasts UK

Sign up to our newsletters

FOLLOW US