Jason Hart discusses how data manipulation will be the biggest threat to businesses and public figures in the future.
Jan Rochat, CTO of AET technologies, reminded an ISSE 2016 audience that the security boundaries of critical infrastructure are not quite as concrete at they seem
In the last year, 66.2 percent of financial services institutions have faced at least one cyber-attack.
Yahoo! has confirmed a major data breach of its systems, with the number of users affected standing at 500 million. It is currently suspected to be a state-sponsored attack, as it has similarities to other Russian attacks.
Scientific news service EurekAlert suffered a breach which saw the login details of thousands of journalists stolen. The company has now reformed the technology behind its website and is promising a brand new login system.
Conservatives within the Greater London Assembly have called for a higher standard of data security in the capital, with a Mayoral seal of approval for those that adhere to it.
Tony Anscombe discusses the biggest mistakes companies make when moving to the cloud and tips to reap the benefits
Two critical reports showed a lack of public trust in NHS security and confidentiality handling patient records causing the government to scrap plans for a unified doctor and hosptial patient database.
Ron Arden takes a data-centric approach to security where the focus is on protecting the data within a system, and not just the system itself
Nick Ioannou, head of IT for the Ratcliffe Groves Partnership, draws on his 26 years of experience in IT to claim using a combination of 26 different cloud based services means the company has IT power which could "compete with the big boys" in his industry.
British workers prefer putting their trust in a European Union (EU) state to store their data (40 percent) rather than their own country (38 percent) or those from outside the EU (22 percent).
While Microsoft's £18.6 bil ($26.2 billion) acquisition of data-rich LinkedIn will enhance business, the company has not yet said how it plans to protect the privacy of personal data of LinkedIn members.
Discussing 'Turning data into actionable intelligence', SC Magazine's latest roundtable saw a gathering of cyber-security practitioners to discuss threat intelligence.
The two year GDPR honeymoon period starts today - industry experts that spoke with SC are all urging business to, " take a hard look at how their data are shared and stored, focusing in particular on any cloud apps in use across the organisation."
The social media giant has taken a stand when it comes to intelligence agencies using the service to collect data.
Filipino voting records which were breached earlier this month have now been made public and searchable.
Almost half (47 percent) of IT leaders in EU-based businesses are unaware of the geographical location of critical and personal data.
Tencent, a major chinese web browser with millions of users around the world, has been found leaking data with which users can be identified, tracked and attacked.
A rash of ransomware attacks has hit Western hospitals in recent months, but could it happen to the NHS?
Three more hospitals have been hit with ransomware, in what seems to be an endless rash of hospital attacks.
Poland moves to unify cyber-security response and bolster its defences in the wake of Russian hybrid warfare against neighbouring Ukraine.
Privacy Shield's long awaited final draft will be done by the end of this month. SC talked to some of those in the industry who will fall under its dominion
Security researcher, CthulhuSec has released a data dump of thousands of internal files from America's largest police union handed to him by an unknown hacker.
Out of yet another leaky MongoDB database, star of the moment, Chris Vickery has discovered personal details which he thinks might lead back to a conservative religious organization in the US.
A recent FOI request by cloud solutions company Accellion has revealed an 'alarming' lack of cyber-security in the NHS' use of mobile devices.
Last Friday it was reported that British pub chain JD Wetherspoon suffered a data breach causing a leak of more than 650,000 customer details; now the hacker responsible explains how easy it was.
Mike Fey recalls the European Court of Justice invalidating the agreement between EU and US organisations on data transfer on 6 October.
ICYMI: Windows deprecating SHA-1; Apps leaking data; Safe Harbour II; Auto-rooting adware; Apple PayNovember 13, 2015
In Case You Missed It: the most popular articles from the past seven days. Windows accelerates SHA-1 deprecation, Too many apps leaking personal data, Safe Harbour 2 coming soon, Apps auto-rooting Android devices, and Bank warning to Apple Pay users.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Security Architect, Cardiff - to £70k Basic
Infosec People - Cardiff, Wales
Interim CISO (Chief Information Security Officer) - Cyber Security Director
CYBER EXECS - London (Central), London (Greater)
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report