FEATURED

Vendors hiding open-source security flaws in commercial software

Vendors hiding open-source security flaws in commercial software

The use of open source components in commercial software is more common than even vendors are aware of and it's leaving customers open to unpatched flaws.

LATEST NEWS

272 million email account credentials found on the dark web

272 million email account credentials found on the dark web

Hold Security has bought hundreds of millions of email credentials off the dark web for less than £1

Michigan electrical utility company hit with ransomware attack

Michigan electrical utility company hit with ransomware attack

The Michigan Board of Water and Light has been beset with a ransomware infection.

Localised "designer" malware campaigns all the rage, says Sophos

Localised "designer" malware campaigns all the rage, says Sophos

Criminal outfits are increasingly distributing "designer" spam and malware, customised to optimally target victims in specific geographic regions, according to new research from Sophos' research division, SophosLabs.

PRODUCT REVIEWS

AlienVault Unified Security Management Platform

starstarstarstarstar
AlienVault, the company with the cool logo, has really outdone themselves with the Unified Security Management Platform (USM).

CorreLog SIEM Correlation Server

starstarstarstar¾
This one leads two lives: a SIEM in its own right or a tool that can work alongside other, perhaps larger, SIEMs.

EventTracker Security Centre

starstarstarstarstar
Excellent value and wide-ranging capabilities perhaps unexpected in such a modestly priced package.

Upcoming Webcasts

Opinions

Training the Mastermind (board-game) generation

Training the Mastermind (board-game) generation

Mike Loginov and Viv MacDonald explore the importance of management awareness of cyber-security in an organisation

A successful move to a global cashless society requires a comprehensive information security strategy

A successful move to a global cashless society requires a comprehensive information security strategy

With electronic payments rapidly becoming the new way to transact, the idea of a cashless society is becoming a bigger reality, leading to demands for stronger authentication - without slowing transactions - says David Poole.

Meeting the new vulnerability disclosure challenge

Meeting the new vulnerability disclosure challenge

Michael Fimin considers the impact new EU General Data Protection Regulation (GDPR) laws will have on current vulnerability disclosure practices and recommends a number of best practices to help organisations measure up to the challenge.

Director's Cut

SC Webcasts UK

Sign up to our newsletters

FOLLOW US