FEATURED

ICYMI: Gov spies grab crypto keys, Masque attacks & interviewing Eugene

ICYMI: Gov spies grab crypto keys, Masque attacks & interviewing Eugene

The latest In Case You Missed It column looks at the biggest stories on SC this week, including the alleged NSA/GCHQ hack on Gemalto and our interview with Eugene Kaspersky.

LATEST NEWS

Hackers target hedge funds to manipulate trading algorithms

Hackers target hedge funds to manipulate trading algorithms

It's not just Ed Milliband that has hedge funds in his sights, there are others looking for rich pickings too.

TalkTalk blames supplier for breach affecting 4m customers

TalkTalk blames supplier for breach affecting 4m customers

UK telephone and broadband provider TalkTalk has blamed an unidentified third-party for a data breach late last year, which saw hackers steal account numbers, addresses, phone numbers - and money - from up to four million customers.

Target breach costs £124 million - so far

Target breach costs £124 million - so far

The costs of the Target breach dwarf the costs of increased security or insurance.

Jetty web servers vulnerable to Heartbleed-style attacks

Jetty web servers vulnerable to Heartbleed-style attacks

A critical flaw found on open-source Jetty HTTP web servers could - if left unpatched - lead to hackers hijacking internet sessions and stealing sensitive data.

PRODUCT REVIEWS

Norse DarkWatch

Threat intelligence appliance that ties the Norse DarkMatter infrastructure to your network.

iSight Partners ThreatScape

Adds a lot of value to your security stack by applying threat intelligence. Provides a prodigious amount of extremely useful research, much of it from analysts around the globe.

SurfWatch CSuite

This is a very good threat intelligence tool where almost all of the threat sources and analytics are under the covers.

Upcoming Webcasts

Opinions

Change management - security vulnerability or scapegoat?

Change management - security vulnerability or scapegoat?

IT security issues continue to hit critical services, but do we, the public, ever know for sure if they are due to error, system failure, or an attack?

How does PCI DSS 3.0 affect you?

How does PCI DSS 3.0 affect you?

Suspicious activity now needs to be monitored in the entire processing chain, hence implementing PCI DSS 3.0 helps stop attacks before compromises occur says Ross Brewer.

Turning the tide on APTs and nation state attackers

Turning the tide on APTs and nation state attackers

Deal with APT intruders logically, not emotionally, and get the upper-hand - even if that means leaving them on the network says Mike Auty,

Director's Cut

SC Webcasts UK

Sign up to our newsletters

FOLLOW US