This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

EVENTS

SC Magazine UK's 2014 events

Slideshow of SC Magazine UK events

2014 SC Awards Europe Winners

The 2014 SC Awards Europe have finally come to a close. Here's a look at those who took home a big prize!

InfoSecurity Europe 2014 Day 1

Considered one of the top information security events is the world, InfoSecurity Europe 2014 brought together some of the brightest minds in the industry to ...

SC Awards Europe 2014: The first finalists announced

The first finalists have now been shortlisted for this year's SC Awards Europe 2014. Scroll down the page to see what awards are up for ...

SC Congress exceeds expectations

The ILEC Conference Centre in London played host to a raft of industry expert speakers and an audience of some 180 senior industry professionals at ...

SC Congress London 2014

Security professionals in the UK were introduced to the first-ever SC Congress London this week, featuring lively discussions and tutorials from industry experts. Here's a ...

SC Congress London: Bottom-up security awareness has C-level benefits

A stellar panel of infosec experts told a packed audience at SC Congress London on Thursday that security awareness can play an integral role in ...

2014 SC Awards Europe

It was a night that featured some of the most notable names in the security industry. Here's a look at some of the action on ...

Infosecurity Europe 2014 Day 2

The action continued on the second day of the 2014 Infosecurity Europe conference. Security expert Mikko Hypponen kicked off the event with a keynote discussing ...

Webcasts

Vendor Webcasts

Hunting Attackers with Network Audit Trails

Find out how to detect sophisticated cyber attacks using network logging technologies (e.g. NetFlow and IPFIX). See how you can use these technologies to create an audit trail of network activity.

Vendor Webcasts

A Malicious Insider's Guide to Compromising Encrypted Networks

IT administrators and external contractors are trusted insiders with privileged access rights that often times have the broadest access to organization's critical business information, which is usually transmitted in encrypted form. This blinds forensic teams from knowing what exactly they are actually doing, posing a potential threat.

Vendor Webcasts

Applications Matter; So Should Application Security

Join Matt Schofield and Jason Smith to understand how NTT Com Security and F5 Networks are applying both process and technology to help customers create and maintain an application security strategy designed not to obstruct the business.

Sign up to our newsletters