How secure is cloud - really?
Women in IT security: Pushing at an open door?
Debate: Anti-virus is dead
Find out how to detect sophisticated cyber attacks using network logging technologies (e.g. NetFlow and IPFIX). To see how you can use these technologies to create an audit trail of network activity, Register NOW!
SC Magazine's SC Congress returns to London on 3 March, 2015 with an all new programme! Here is your chance to catch a full day of hard-hitting information security news and solutions from leaders in their industries that you can implement for your company.
Intruders breach networks every day, often gaining access by pretending to be someone they’re not. How can they be stopped when more staff than ever before are using a range of devices that often don’t even come under the control of the IT department? Register now!
£354 for 20 PCs for one year (exc VAT)