SC MAGAZINE UK EVENTS

  


 

A LOOK AT SC EVENTS

SC Magazine UK's 2014 events

Slideshow of SC Magazine UK events

2014 SC Awards Europe Winners

The 2014 SC Awards Europe have finally come to a close. Here's a look at those who took home a big prize!

InfoSecurity Europe 2014 Day 1

Considered one of the top information security events is the world, InfoSecurity Europe 2014 brought together some of the brightest minds in the industry to ...

SC Awards Europe 2014: The first finalists announced

The first finalists have now been shortlisted for this year's SC Awards Europe 2014. Scroll down the page to see what awards are up for ...

SC Congress exceeds expectations

The ILEC Conference Centre in London played host to a raft of industry expert speakers and an audience of some 180 senior industry professionals at ...

SC Congress London 2014

Security professionals in the UK were introduced to the first-ever SC Congress London this week, featuring lively discussions and tutorials from industry experts. Here's a ...

SC Congress London: Bottom-up security awareness has C-level benefits

A stellar panel of infosec experts told a packed audience at SC Congress London on Thursday that security awareness can play an integral role in ...

2014 SC Awards Europe

It was a night that featured some of the most notable names in the security industry. Here's a look at some of the action on ...

Infosecurity Europe 2014 Day 2

The action continued on the second day of the 2014 Infosecurity Europe conference. Security expert Mikko Hypponen kicked off the event with a keynote discussing ...

Webcasts

Vendor Webcasts

What mobile policy suits your organisation?

When should you ban personal mobile use? Is Choose your own device appropriate, or can you safely harness the cost savings of Bring Your Own Device? What about wearable technology? Is the issue the device, or the framework within which devices are used? Can security be moved to the data itself to minimise the impact of the access device? It depends what you want to protect and why. We look at the options and selection criteria.

Vendor Webcasts

Moving Beyond Proxies

Proxy deployments today have outlived their usefulness and practicality. They have joined a long list of legacy products, providing limited security functionality against today's advanced threats.

Vendor Webcasts

Safeguarding the data when going mobile

Data security - at rest, on the device, on the server, or in transit - and the access to data on the network via mobile device, and potentially "Malicious mobile apps." We focus on the challenges and practical solutions.

Sign up to our newsletters