The latest ICYMI column looks at the week's biggest stories, including hacking into cars, Chinese cyber-espionage and the take-down of thousands of French websites.
CISOs are increasingly taking on greater management responsibilities - but are they as a result being divorced from their firm's true security maturity and the tools needed to avoid being breached?
This week's In Case You Missed It looks at the five biggest security news this week, including the sad passing of information security journalist - who helped found SC - Steve Gold.
This week's In Case You Missed It looks at the five most popular articles on SC, including news on Lizard Squad and old security predictions.
Late last year SC Magazine UK editor-in-chief Tony Morbin interviewed Alan Kessler, president and CEO, Vormetric, to get an industry insider view on issues in the commercial encryption market.
International uptake has been slow for the DNS security extension (DNSSEC) which authenticates URL queries. Tony Morbin spoke to Anne-Marie Eklund Löwinder to get a better understanding of the issues
Multiple connected 'Internet of Things' devices could be fuelling a corporate security nightmare suggests Kate O'Flaherty
Cyber-crime is as much a threat to ordinary Russians as anyone else, and the country is developing a strategy to cope - while seeking international cooperation too, as Eugene Gerden in St Petersburg reports
Tapping the insight of info security's thought leaders on advanced persistent threats, what they represent and how to protect against them.
Advanced persistent threat (APT) attacks are complex, multi-layered and designed to evade detection, leaving IT security teams in the dark and sensitive data at risk. Doug Drinkwater asks how to respond
These explorers' findings of critical vulnerabilities - from Heartbleed to Shellshock - have generated excitement, along with awareness, and made an indelible mark on security.
Blessed are the influencers for they will make a true difference - through policy, vision, drive, innovation and ideas - in the course of information security. What sets our selection apart is that they've held significant sway on the direction of IT security.
These professionals have done everything from cryptography to founding an influential security conference.
The following hitched up their digital wagons to blaze new trails in cybersecurity.
This week's ICYMI looks at the top five articles on SC, including new hacking allegations against the GCHQ and the return of Tor dark markets.
This week's In Case You Missed It looks at the five most popular articles on SC, including weak passwords exposed in the Sony Pictures breach and the return of the Poodle flaw.
The Metropolitan Police has become the latest law enforcement agency to complain that encryption makes it difficult to catch and prosecute criminals.
From childhood fascinations and unlikely epiphanies to unexpected opportunities and market surges, top security managers find inspiration in almost anything - and they're willing to seize opportunity and take responsibility to lead their teams.
This week's In Case You Missed It looks at the five most popular articles on SC, including the launch of a new cyber-security degree, new ATM malware and Sony's latest data breach.
Six months after launch and the UK's National Computer Emergency Response Team (CERT-UK) is seeing rising awareness of the group, the CiSP initiative and cyber-crime more generally.
This week's In Case You Missed It looks at the most popular articles on SC including news of CESG-accredited cyber-security courses, the Regin malware and the latest Sony hack.
This week's In Case You Missed It looks at the latest cyber-terrorism claims, former hackers in enterprises and issues to be dealt with in the supply chain.
CESG certified cyber security training launched today with eight companies and 12 courses accredited.
TLS bugs, the definition of an advanced persistent threat and new figures on NHS data breaches are the pick of the stories in the latest In Case You Missed It column.
Our latest In Case You Missed It (ICYMI) column looks at the take-down of Silk Road 2.0 and other dark markets on Tor, the new WireLurker malware and some good news for cash-happy InfoSec pros.
Europol's European Cybercrime Centre (EC3) is growing faster than expected. Doug Drinkwater visited its offices in The Hague, Netherlands, to find out how it is uniting law enforcement in the fight against cyber-criminals
2014 was the year that cyber-security hit the headlines, with data breaches, more government surveillance leaks, and celebrity exposures causing the UK public to lose faith in the web, reports Tony Morbin
In an interview with SC's Tony Morbin, the NCCU's Jamie Saunders explained how 'policing by consent' contends with the tidal wave of new criminal opportunities unleashed by digital technology and the connected world
This week's In Case You Missed Column looks at websites at risk from Drupal's SQL injection flaw, security features on Android and information security shortcomings in business.
This week's In Case You Missed It column looks at the Internet of Things, Apple's troubles in China and a strongly worded goodbye note by the outgoing head of GCHQ.
Control systems are visible on the internet and under attack from dedicated malware, but vendors are not providing adequate security.
Further data breaches, Heartbleed-type flaws and new revelations about government surveillance will likely continue in 2015 but, as Doug Drinkwater reports, it could also prove a pivotal year for data protection, law reform, the Internet of Things and the fight against terrorism
While biometric technology is becoming more sophisticated, it is still far from infallible. Kate O'Flaherty reports
This week's In Case You Missed It column looks at a new SSL flaw, attacks on smart meters, FBI's problem with phone encryption and the bank that is spending £310 million on cyber security.
This week's In Case You Missed It column looks at concerns around data trust and transparency, and the latest serious data breach at one of the biggest technology start-ups.
A new report which claims information security budgets have fallen has been called into question, but carries better news for security companies and security awareness training.
Your next new car is likely to connect - via the internet - to an assortment of applications and sensors in order to tap into valuable data. But questions are now being asked now on the potential privacy and security risks.
This week's In Case You Missed It column looks at the first attacks resulting from the Bash/Shellshock bug, claims of cyber Armageddon and unpredictable hackers.
This week's In Case You Missed It (ICYMI), China's industrial spying; US extra-territorial claims; SANS event; Card hacks increase; Malvertsing growth; staff data-theft criminal; Biometric smartphones up tenfold; Celebgate hits cloud; Kids, weakest link; Women's Security Society event; Kyle and Stan hit millions.
Enterprises are questioning their cloud strategy after Apple's iCloud service was implicated in the leak of nude celebrity photos. But should one bad Apple spoil the bunch?
You've accepted that you are going to be breached at some point. Tony Morbin looks at how this new perspective should be reflected in your response planning
Kate O'Flaherty reports how the security implications of wearable technology are becoming clearer as Google Glass infiltrates the corporate market
Cyber-warfare is so new that the 'ground-rules' are still being established. After the 2007 APT cyber-attack on Estonia, Nato created a cyber-defence centre and the Tallinn Manual ensued. Nazan Osman provides an overview of some of the CCDCOE's and manual's conclusions
NSA whistleblower Edward Snowden lifted the lid on government surveillance but, as Doug Drinkwater reports, his disclosures have also had a significant impact on how companies view rogue employees
From October 2014 many UK public sector information handling projects will require contractors to be Cyber Essentials certified. Tony Morbin looks at how the scheme works, its aims, implementation, shortcomings and potential next steps
Here are the five most popular articles, as read by you the reader, in the week for August 22 to 28.
This week's In Case You Missed It column looks at Sony PlayStation Network hack, the rise in security spending and surprising new claims on cyber security skills and encryption.
SCADA systems are essential to the smooth running of critical infrastructure but, as evidenced by the Stuxnet attack, they can be exploited through software and hardware vulnerabilities, and human error. But experts contest if they are really under threat.
This week's In Case You Missed It looks at rumours on a new NSA insider, hackable living rooms and if police are turning the tide on cyber-criminals.
Here are the five most popular articles, as read by you the reader, in the week for August 15 to 21.
While still a relatively immature industry, cyber insurance can reduce the costs of recovering from a breach, and, as Tony Morbin reports, it can also play a role in driving adoption of best practice, including de-facto standards in critical infrastructure.
Here are the five most popular articles, as read by you the reader, in the week for August 8 to 14.
This week's In Case You Missed It looks at data breach response, new concerns on EU privacy and claims that the internet is breaking 'under its own weight'.
During Black Hat Dell SecureWorks' threat reports included details on its research into the Lurk Downloader and hijacking attempts on large hosting companies' networks.
This week's In Case You Missed It (ICYMI) highlights from the Black Hat conference, and reaction to the 'biggest data breach ever'.
Here are the five most popular articles, as read by you, the reader, in the week for August 1 to 7.
Here are the five most popular articles, as read by you the reader, in the week for July 25 to 31.
This week's In Case You Missed It column considers early security questions on driverless cars, the hidden cost behind data breaches and new claims of industrial cyber espionage.
Here are the five most popular SC articles, as seen by you the reader, in the week for July 18 to 24.
This week's In Case You Missed column considers the possibility of cyber warfare, the money reaching cyber security start-ups and how charity can start at home for InfoSec practitioners.
Here are the five most popular SC articles, as seen by you the reader, in the week for July 11 to 17.
UK Financial Cyber Security summit sees call for cross-border and sector info sharing; cyber expenditure plans and investment in exports revealed.
Here are the five most popular articles, as read by you the reader, in the week for July 4 to 11.
But where does this leave anyone whose electronic identity has been stolen as a result of a malware infection?
This week's In Case You Missed It (ICYMI) looks at Microsoft's action against cybercriminals, the cyber security skills gap and NSA spying on Tor users.
A conversation with Jane Wainwright, Co-founder Women's Security Society and now senior manager at PWC.
With a military background in insider threat, Jane Wainwright tackled threats from inside and out to secure London's 2012 Olympics.
The EU is inching ever closer to putting the much-anticipated EU General Data Protection Regulation on the statute books, and that could see many companies playing catch up.
Why don't more women choose information security as a profession? What are the barriers, and what can be done to rectify the situation?
Revelations of government surveillance are fuelling a paranoia that isn't going to subside. So should firms be afraid of adopting cloud?
The latest In Case You Missed Column focuses on PayPal's two-factor authentication, the launch of Google Glass and new banking attacks.
Google Glass is now available in the UK for £1,000, but will the data-gathering wearable computing device face roadblocks because of privacy and security concerns?
This week's In Case You Missed It column looks at NSA friendships, concerns on the cloud and the latest flaw affecting Android users.
The IA14 Conference in London on Monday concluded with GCHQ director, Sir Iain Lobban, giving an insight into how GCHQ sees its role protecting and supporting UK citizens, industry and the economy.
A spate of DDoS attacks against cloud services Evernote and Feedly is the talk of this week's In Case You Missed It column.
Two researchers from Colombia University in the US have found that millions of internet-connected TVs could be taken over in a man-in the-middle attack.
The big news in this week's In Case You Missed It (ICYMI) column is the FBI-led Operation Tovar, which saw the disruption of the Gameover Zeus and CryptoLocker botnets.
eBay's data breach is the top news story in this week's In Case You Missed It (ICYMI) column.
This week's In Case You Missed It column looks at the state of anti-virus, ransomware going mobile and the EU's upcoming Data Protection Regulation.
In a roller coaster week which saw AOL report a data breach, Target appoint a CISO and all the madness around Infosecurity Europe, SC looks at all the major stories in our latest In Case You Missed It column.
With potential fines of up €100 million under EU Data Protection Reform, accidental data breaches have moved up the boardroom agenda. Tony Morbin reports on data concerns at Health Authorities in England and Wales, where despite differing systems, data leakage is also being addressed.
Large-scale cyber espionage is not new - it is the methods behind it which are becoming more complex and sophisticated, reports Kate O'Flaherty.
Bring your own device (BYOD) is in full swing, but most FTSE 100 and SMEs are only now realising that there's more to managing the deluge of personal smartphones and tablets coming into the office than brute force alone, reports Doug Drinkwater
This week's In Case You Missed It column looks at Vladimir Putin's Internet views, bigger and badder DDoS attacks, and further reaction to OpenSSL and Heartbleed.
As another week in information security zips by, we look at the top stories in our weekly In Case You Missed It (ICYMI) column.
There's an increasing demand for cyber security specialists in information security, but the challenge remains bringing the right graduates into the fold.
IT decision makers are leveraging Big Data security analytics tools to serve up more information on threats, reports Doug Drinkwater.
With Windows XP fast approaching its end-of-support deadline, many firms are going to be at risk of attack, reports Kate O'Flaherty.
The UK aims to be the safest place to do business online, but that aim is potentially undermined by cyber security skills shortages, says (ISC)²'s John Colley. Tony Morbin reports
PCI DSS 3.0 may be on the horizon, but a new study suggests that companies are not only slow in updating, but also approaching compliance in the wrong way.
Criminal investigators want changes made to European law so that they can fight international cyber crime faster and more efficiently.
Compliance, standards, a shortage in IT security skills and budgets are reasons behind the 'failure' of cyber security, experts conclude at French information security conference
The world's largest consumer electronics event boasts new gadgets, but concerns rise on the Internet of Things.
The latest PCI update offers improvements to ensure security in online transactions, says Tim Lansdale, head of payment security, WorldPay. Tony Morbin reports.
In a special one-off case study linking our themes of PCI compliance and security spend, Random Storm technical director and co-founder Andrew Mason describes to SC a case study that tackles both issues with the aid of league tables.
It may be a time of great change for the infosec industry, but advice on achieving the budgets needed to keep up with new threats remains remarkably consistent, reports Thomas Brewster.
Check Point VP says individual hacking actions are not always criminal
Malware writing has undergone many changes over the years - from hobbyists to a criminal business - with mobile and social now the hot targets, Rob Buckley reports.
From banking hacks and malicious mobile apps to insider leaks and a serious data breach each month, 2014 promises to a challenging year for CISOs.
Services abound for business continuity and disaster recovery in the cloud, but what's the right choice for your organisation? Alan Earls investigates the options.