FEATURED

ICYMI: Cyber skills gap, TalkTalk breach and hacking trading algorithms

ICYMI: Cyber skills gap, TalkTalk breach and hacking trading algorithms

The latest ICYMI columns looks at the top five stories on SC this week, from our exclusive on the cyber-security skills gap to the TalkTalk breach affecting four million customers.

LATEST NEWS

Response to Freak flaw slammed

Response to Freak flaw slammed

The response of Microsoft and cloud companies to the Freak vulnerability has been far too slow say commentators.

UK NCA praised after arresting 57 suspected hackers

UK NCA praised after arresting 57 suspected hackers

The National Crime Agency (NCA) this week arrested 57 suspected hackers in a widespread UK operation involving the Met Police and regional crime squads.

Crime-as-a-service gathers pace in digital age

Crime-as-a-service gathers pace in digital age

Europol's latest report into criminal behaviour shows the emergence of cyber-crime-as-a-service in virtual undergrounds.

UK bank ignored critical 2FA flaw months before Carbanak heist

UK bank ignored critical 2FA flaw months before Carbanak heist

A main UK bank ignored a serious two-factor-authentication (2FA) flaw months before 'Carbanak' criminals exploited a similar loophole to steal £millions from about 100 banks.

PRODUCT REVIEWS

BeyondTrust UVM20 Security Management Appliance

starstarstarstar½
The BeyondTrust UVM20 Security Management Appliance is the preconfigured hardware offering of Retina CS Enterprise Vulnerability Management.

Core Security Core Insight

starstarstarstarstar
Core Security’s Core Insight is the gold standard for penetration testing and vulnerability assessment.

Qualys Express Lite

starstarstarstarstar
Qualys Express Lite is a cloud-based vulnerability assessment tool intended for small businesses.

Upcoming Webcasts

Opinions

The second coming of DLP: Learning lessons from the past

The second coming of DLP: Learning lessons from the past

2015 could be the year of DLP, argues Guy Bunker.

Keep your friends close... but your insiders closer

Keep your friends close... but your insiders closer

A well-defined security programme focused around the company's most critical data, combining technology and education powered by metrics, will help businesses reduce insider risk levels says Neil Thacker.

The true cost of false positives

The true cost of false positives

Implement a structured response with automated systems to bring down the cost of chasing false positives says Brian Foster.

Director's Cut

SC Webcasts UK

Sign up to our newsletters

FOLLOW US