Event News Coverage
The Bring Your Own Device (BYOD) trend is already entrenched in many businesses, but some IT departments are trying to regain control - and security - by opting for Choose Your Own Device (CYOD) instead.
Latest Event News
What should businesses be doing to ensure that contractors and other third-parties are aware of the risks in security? That was one of the key questions during a panel discussion at Infosecurity 2014 in London on Thursday.
Red teaming is a relatively new type of extended pen testing used to raise the security and governance bar in major corporates, most notably financial service organisations such as banks.
Thieves and employees take assets off the network to avoid tracking
Digital forensics speed up the digital battle against Al Qaeda indentifying what needs to be translated.
If it is to truly enable businesses, security needs to look now at implications of future developments and explain them to the board in financial terms, suggests the Infosec panel on Monday.
The action continued on the second day of the 2014 Infosecurity Europe conference. Security expert Mikko Hypponen kicked off the event with a keynote discussing whistleblowing, while the showroom floor was buzzing with attendees learning about the latest solutions. Here's a look at day two of the big event in London's Earls Court Exhibition Centre.
SC Webcasts UK
Sign up to our newsletters
SC Magazine UK Articles
- Social engineering: hacker tricks that make recipients click
- Security researcher blasts United Airlines' bug bounty programme
- Video: Young and gifted codebreakers compete in cyber-security masterclass final
- Five last minute retail risk mitigations for Black Friday weekend
- Anonymous' Twitter war hits stumbling block
- ISSE Berlin: Germany to promote 'digital sovereignty'
- Purchasing cyber-insurance without a proven security system will leave businesses out of pocket
- Sophisticated Apple Phishing Email making the rounds
- ISSE Berlin: Safe Harbour II initial agreement expected
- 2015 worst year in history for Mac malware
- ICYMI: Madison extortion, Cyber-sec challenge, United bug-bounty, French intelligence, and Anonymous/ISIS spat
- Magspoof: the device that can spoof Amex cards
- Plusnet still giving out plaintext passwords
- Win32/CompromisedCert.D is now certifiably Dell-stroyed
- CryptoWall 4.0 now deploying through the Nuke EK