This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

EVENTS

SC Magazine UK's 2014 events

Slideshow of SC Magazine UK events

2014 SC Awards Europe Winners

The 2014 SC Awards Europe have finally come to a close. Here's a look at those who took home a big prize!

InfoSecurity Europe 2014 Day 1

Considered one of the top information security events is the world, InfoSecurity Europe 2014 brought together some of the brightest minds in the industry to ...

SC Awards Europe 2014: The first finalists announced

The first finalists have now been shortlisted for this year's SC Awards Europe 2014. Scroll down the page to see what awards are up for ...

SC Congress exceeds expectations

The ILEC Conference Centre in London played host to a raft of industry expert speakers and an audience of some 180 senior industry professionals at ...

SC Congress London 2014

Security professionals in the UK were introduced to the first-ever SC Congress London this week, featuring lively discussions and tutorials from industry experts. Here's a ...

SC Congress London: Bottom-up security awareness has C-level benefits

A stellar panel of infosec experts told a packed audience at SC Congress London on Thursday that security awareness can play an integral role in ...

2014 SC Awards Europe

It was a night that featured some of the most notable names in the security industry. Here's a look at some of the action on ...

Infosecurity Europe 2014 Day 2

The action continued on the second day of the 2014 Infosecurity Europe conference. Security expert Mikko Hypponen kicked off the event with a keynote discussing ...

Webcasts

Vendor Webcasts

Hiding in Plain Sight - What's Really Happening on Your Network

Palo Alto Networks invites you to join us for this exclusive webinar where we will analyze the intertwined relationship between cyber attacks and applications based on recent data collected from over 1,499 networks in Europe, the Middle East, South Africa, Russia and the Baltics.

Vendor Webcasts

Defending Against the Rogue: Technology Solutions to Address unwanted Users, Devices and Applications

Securing your network against unwanted and unknown threats has become mission critical. Many organisations, however are in the dark as to what is on their network - making it impossible to control access and mitigate risk.

Vendor Webcasts

Cybersecurity - Best Practices for Protecting Identities and Assets

Cybersecurity, or more accurately cybersecurity breaches, have been in the headlines for months now. Headlines aside, threats are increasing in number while also becoming more sophisticated. Join us for this webinar to learn more about about the types of threats that exist and how you can defend against them.

Sign up to our newsletters