This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Latest News

Home Depot card data breach undetected for four months

Home Depot card data breach undetected for four months

The Home Depot card data breach may have continued for longer than the Target attack late last year, according to new reports.

Microsoft closes Trustworthy Computing as part of layoff strategy

Microsoft closes Trustworthy Computing as part of layoff strategy

In a surprise move, Microsoft has effectively closed its Trustworthy Computing (TwC) Group as part of the loss of 2,100 jobs in a restructuring plan announced late last week.

Jihadists didn't increase security due to NSA leaks

More celebrity pictures revealed: Apple and FBI investigating

More celebrity pictures revealed: Apple and FBI investigating

Celebgate 2: a depressing weekend for some celebrities as more hacked pictures leaked from iCloud.

Average intrusion prevention product 94% effective

Features

ICYMI

ICYMI

This week's In Case You Missed It (ICYMI), China's industrial spying; US extra-territorial claims; SANS event; Card hacks increase; Malvertsing growth; staff data-theft criminal; Biometric smartphones up tenfold; Celebgate hits cloud; Kids, weakest link; Women's Security Society event; Kyle and Stan hit millions.

Cloud computing hit by 'Celebgate'

Cloud computing hit by 'Celebgate'

Enterprises are questioning their cloud strategy after Apple's iCloud service was implicated in the leak of nude celebrity photos. But should one bad Apple spoil the bunch?

The worst happens. What next?

The worst happens. What next?

You've accepted that you are going to be breached at some point. Tony Morbin looks at how this new perspective should be reflected in your response planning

Opinion

The (grim) reality of password security

The (grim) reality of password security

There are security vulnerabilities when using passwords, but Tyler Moffitt says that there are steps that you can and should take to make sure your data less easy to access.

The new rise of biometrics

The new rise of biometrics

Biometric id options need appropriate mobile computing support to ensure that they too are not compromised says Jon Geater.

Cyber risk management: A boardroom issue

Cyber risk management: A boardroom issue

Having comprehensive cyber risk policies that are not followed can be as detrimental as not having a policy at all says Peter Given.Good who advises that good risk-insurance will demand appropriate procedures are both in place and implemented.

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more