This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X





SC Magazine UK's 2014 events

Slideshow of SC Magazine UK events

2014 SC Awards Europe Winners

The 2014 SC Awards Europe have finally come to a close. Here's a look at those who took home a big prize!

InfoSecurity Europe 2014 Day 1

Considered one of the top information security events is the world, InfoSecurity Europe 2014 brought together some of the brightest minds in the industry to ...

SC Awards Europe 2014: The first finalists announced

The first finalists have now been shortlisted for this year's SC Awards Europe 2014. Scroll down the page to see what awards are up for ...

SC Congress exceeds expectations

The ILEC Conference Centre in London played host to a raft of industry expert speakers and an audience of some 180 senior industry professionals at ...

SC Congress London 2014

Security professionals in the UK were introduced to the first-ever SC Congress London this week, featuring lively discussions and tutorials from industry experts. Here's a ...

SC Congress London: Bottom-up security awareness has C-level benefits

A stellar panel of infosec experts told a packed audience at SC Congress London on Thursday that security awareness can play an integral role in ...

2014 SC Awards Europe

It was a night that featured some of the most notable names in the security industry. Here's a look at some of the action on ...

Infosecurity Europe 2014 Day 2

The action continued on the second day of the 2014 Infosecurity Europe conference. Security expert Mikko Hypponen kicked off the event with a keynote discussing ...


Vendor Webcasts

Prepare for the Breach: Detect, Respond and Disrupt at the Moment of Compromise

Many organizations over invest in network security solutions—relying on traditional antivirus to secure their endpoints. Enterprises need to prepare for the inevitability of compromise by deploying emerging endpoint threat detection and response solutions to accelerate threat discovery, respond in seconds and intervene with on-going attacks.

Vendor Webcasts

Guidance on migration to SHA-2

Google has advised that Chrome will gradually sunset SHA-1 cryptography, which is used in the signing process of SSL certificates. Join Entrust for a complimentary webinar that discusses the impact of these changes and why you need to migrate to SHA-2 SSL certificates.

Vendor Webcasts

Feeling confident in today's mobile environment

Today we live in a world without boundaries, where we are always connected and therefore, always need to be secure. Mobile devices, including smartphones, laptops, and tablets connect people to their work 24 hours a day. With our increased connectedness comes increased risk.

Sign up to our newsletters