This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Latest News

China may be targeting medical firms for IP data

China may be targeting medical firms for IP data

Very little companies can do to defend themselves against state-sponsored attacks, says Storm Guidance director Sarb Sembhi.

Video games company hit by 38-day DDoS attack

Video games company hit by 38-day DDoS attack

51,000-plus terabits of data thrown against client, says IP security firm

US Nuclear Regulatory Commission successfully hacked three times

US Nuclear Regulatory Commission successfully hacked three times

The US Nuclear Regulatory Commission (NRC), which houses detailed classified records about nuclear reactors, radioactive material storage and uranium processing plants, has been hacked three times over the past three years, according to a new report.

Targeted spear phishing campaign targets governments, law enforcement

Targeted spear phishing campaign targets governments, law enforcement

Kaspersky Lab claims to have identified a highly targeted spear phishing campaign that picks on high profile victims - including government, military, law enforcement agencies and embassies.

Malaysian investigators 'hacked' for confidential MH370 records

Malaysian investigators 'hacked' for confidential MH370 records

Around 30 computers at Malaysian law enforcement agencies looking into the disappearance of the MH370 airplane have reportedly been hacked, with perpetrators making off with confidential data on the aircraft.

Features

Should you use cyber insurance to mitigate risk?

Should you use cyber insurance to mitigate risk?

While still a relatively immature industry, cyber insurance can reduce the costs of recovering from a breach, and, as Tony Morbin reports, it can also play a role in driving adoption of best practice, including de-facto standards in critical infrastructure.

The 5 most read articles this week: August 8 to 14

The 5 most read articles this week: August 8 to 14

Here are the five most popular articles, as read by you the reader, in the week for August 8 to 14.

ICYMI: Data breach disclosure, European privacy & internet outages

ICYMI: Data breach disclosure, European privacy & internet outages

This week's In Case You Missed It looks at data breach response, new concerns on EU privacy and claims that the internet is breaking 'under its own weight'.

Opinion

All your vulnerabilities belong to us: The rise of the exploit

All your vulnerabilities belong to us: The rise of the exploit

The growing impact of web exploits isn't just limited to the enterprise market and must be countered on an industry-scale, says Pedro Bustamante.

Is your organisation ready for the next generation of millennials?

Is your organisation ready for the next generation of millennials?

A different attitude to privacy and security among many new workplace entrants is a potential risk that has to be managed says Chris Sullivan.

Why we need a tighter framework for social engineering penetration testing

Why we need a tighter framework for social engineering penetration testing

Protect against real-world threats and test the most likely scenarios using relevant models, including low-tech, says Gavin Watson.

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more