Norman Shaw looks at the causes of data breaches, what it costs and what the market needs to consider in order to protect itself.
Alexander Pope said, "To err is human; to forgive, divine." Could he have been thinking of the infamous Bank of England email leak when he said that, asks Rainer Gawlick.
The problem with targeted attacks, of course, is that they are designed to stay hidden, as we learned from a recent hacking case, says Kev Pearce.
German chancellor Angela Merkel inadvertently helped spread Trojan malware in the German Parliament (Bundestag), which is now facing a new wave of cyber-attacks. But there remain more questions than answers when it comes to the full scope of the compromise, and the people behind it.
LastPass hacked, it's time to change your master password
New research from think-tank the Centre for Economics and Business Research (CEBR) suggests that the true cost of cyber-crime to business in the UK is as high as £34 billion per year.
Two leading security companies say that the April hack of French TV station TV5 Monde was likely the work of Russia's state-sponsored APT28 group, rather than ISIS supporters Cyber Caliphate.
The US Army was forced to close down its official website yesterday after it was defaced by the Syrian Electronic Army. The news came as US President Barack Obama promised Washington will become more 'aggressive' in defending itself against cyber-attacks.
A government-commissioned report, carried out by PwC, has found that data breaches are rolling in thick and fast for UK firms - and the costs are mounting up.
This week's ICYMI looks at an embarrassing data breach at Adult Friend Finder, new problems with Android, and how you can track devices with Bluetooth Low Energy (BLE).
Prevention and threat detection tools can only go so far, and should be used as part of a layered approach to data security, says Paul Hampton.
In a year already characterised by huge data breaches at healthcare organisations and at major government entities, it's no surprise that victims' personal information is a hot commodity.
Despite the objective of releasing greater business value from information, most businesses prioritise locking it down, says Sue Trombley
This week's ICYMI column looks at a tea shop data breach, analysis on the Venom flaw and concerns over 'burnt-out' security professionals.
A famous cartoon once said, "On the internet, no one knows you're a dog". But millions of users of online dating site Adult Friend Finder may discover that far more is known about them than they would care to admit.
The ICO has called for a more 'practical' approach to data protection regulation in light of advancing technology, limited resources and the incoming EU Data Generation Protection Regulation - and this might result in more 'tellings off' and less fines.
The directors of Bettys & Taylors of Harrogate have pledged to harden security on the Bettys.co.uk website and keep customers informed, after details of 122,000 customers were lost in a data breach.
A new report into the ethics of security professionals reveals some eye-opening findings on hidden data breaches, and how incidents are being used to push for bigger budgets.
March's landmark ruling by the London Court of Appeal that just three UK persons could sue Google over cookie privacy violation has far reaching consequences as far as breach compensation is concerned.
The latest ICYMI column looks at the latest WordPress XSS flaw, costly data breaches and the return of the controversial "Snooper's Charter".
New research suggests that the rapid digitisation of consumer's lives, combined with increasing cyber-crime activity, will push data breach losses up to US$ 2.1 trillion (£1.34 trillion) globally by 2019.
Geofencing can restrict access to devices or applications while inside a company's perimeter, making it impossible for devices outside the perimeter to access the network explains Roman Foeckl
SC Webcasts UK
Sign up to our newsletters
SC Magazine UK Articles
- FBI offers $4.2m in bounties to catch cybercriminals
- Plex video sharing customers left at risk after hack attack
- ICYMI: Quantum encryption; FBI ransomware alerts; Ipv6 VPN services; Android mobiles; Ransomware
- Old-school router attack wreaking havoc to networks
- Leaked document reveals internal Bitstamp Bitcoin raid investigation