Industry predictions for cyber-security are unlikely to achieve a consensus, but they do provide plenty of insights and recurring themes that serve as indicators of future trends, as the following edited forecasts reported by Tony Morbin demonstrate
There's no denying that cloud adoption is growing at a tremendous pace, along with a subsequent expansion of the threat landscape. Keeping mountains of data from numerous organisations on a third-party's servers might be a scary prospect for the security minded. But, Max Metzger asks, should we be worried?
Most companies are not ready or able to comply with the proposed new Data Protection Regulations, reports Roi Perez, while ignoring them is not an option given the prospect of heavy fines of up to €20 million
Data now resides on multiple devices in many locations. But, Kate O'Flaherty asks, is it out of control?
The latest In Case You Missed It (ICYMI) looks at Apple OS X vulnerability ranking; Banks still using SSL; GDPR agreed; Dutch oppose encryption backoors; Baltics boost national IT security
ICYMI: Madison extortion, Cyber-sec challenge, United bug-bounty, French intelligence, and Anonymous/ISIS spat
The latest In Case You Missed It (ICYMI) looks at suspected Madison extorortionists, Cyber-Sec challenge finals, bug-bounty criticism, French intelligence & Anonymous' ISIS twitter battle.
The latest In Case You Missed It (ICYMI) looks at possible Ashley Madison extortion campaign, analysing the TalkTalk attack, contactless card theft, opinion on the Experian hack and Marks & Spencer not a hack.
The latest In Case You Missed It (ICYMI) looks at Yahoo scraping passwords; Japanese airports hack; French CyberSec policy; SC in contactless theft; Dridex back
This week's In Case You Missed It (ICYMI): Aviation risk warning; netgear patch delay; vulnerability disclosure -legal threats; android SMS malware variants; SSL weakness exploited for phishing.
Ransomware is an attack unlike any other. Chances are you know about it pretty quickly after you've been infected but there is little you can do once you've been hit if you aren't prepared. Tom Reeve reports
Constant innovation by hackers is seeing a surge in attacks. The onus now falls on the industry, government and law enforcement to try and find a solution, reports Kate O'Flaherty
Banks and financial services are the number one target for hackers and nation-states, but as Doug Drinkwater reports, the industry is fighting to stay ahead of the threats with new tools, training, and increasing collaboration
Adrian Leppard, commissioner of the City of London Police, explains to SC's Tony Morbin that crime prevention's mission in cyber-fraud is to help industry protect its information assets - but that international crime and encryption remain major challenges for law enforcement
ICYMI: hospital in email breach; crashing Chrome; Symantec purges; ICO more free; Apple apps snapped
In this week's In Case You Missed It (ICYMI): NHS hospital email breached; crash Google Chrome in 16 chars; Symantec dismisses staff over certs; ICO moved from MOJ to Culture; Apple apps infected with malware.
In this week's In Case You Missed It (ICYMI): GCHQ advises on passwords; Jihadi cabinet attack 'avoidable'; CERT UK aids Dridex targets; Data jurisdiction dispute; Multi-vendor ATM malware
In this week's In Case You Missed It (ICYMI): IBM warning over masterful Shifu, Carphone Warehouse attack was a wake-up call, KeyRaider targets jailbroken iPhones, pre-empt the EU and safeguard data now, and thousands of vulnerable Android apps found with new scanner.
ICYMI: Adblock threatens OSX; Thomson customers exposed; AM leaker 'a woman'; AM police call on white hat help; Malaysia cyber alert
In this week's In Case You Missed It (ICYMI): Adblock Plus weakens Mac OSX ? Thomson breach exposes hundreds; Madison insider a woman says McAfee - police call for 'white hat' help; Cyber-attack alert in Malaysia.
ICYMI: Big data leaking; Salesforce vulnerability; suppressed car hack; sound authentication and critical IE fix
In this week's In Case You Missed It (ICYMI): Big data leaking; Salesforce vulnerability patched; suppressed car hack; ambient sound authentication and critical IE fix.
Second authentication tier is proximity of user's phone to login device
The latest ICYMI column looks at the biggest stories on SC this week, including non-jailbroken Apple hack; carphone Warehouse breach; Firefox patch and more.
This week's 'In Case You Missed It' column looks at the five most-read articles on SC this week, from hacking of Windows 10 and exploits on patched Macs to bank attacks and DDoS.
The latest ICYMI column looks at the biggest stories on SC this week, including a 'faster Tor', the security implications of Windows 10 and the actual cost of a real APT.
This week's ICYMI column looks at the most-read stories on SC this week, including our investigation on VFS Global, the UK government's attitude towards encryption and the continuing fall-out from the Ashley Madison hack.
This week's 'In Case You Missed It' column looks at the five most-read articles on SC this week, from the intricacies of ransomware and the supposed death of Adobe Flash to hacking a professional cycling team.
This week's ICYMI column looks at Tor sniffing, old-school router attacks and the fallout from the Hacking Team data breach.
This week's In Case You Missed It looks at Toshiba's 'unbreakable' quantum encryption; FBI Ransomware alerts; VPN IPv6 vulnerability; 97% of malicious mobile malware targets Android; 1/3 UK companies hit by ransomware.
Winners of the SC Magazine Awards in Europe
"We have seen real benefits throughout the organisation as a result of our usage of Switch," says Sarah Roberts, head of ICT at NWFRS
The lack of women in information security is a constant topic of conversation and debate but, as Doug Drinkwater reports, changes are afoot
CBEST has its critics - and defenders - as the industry grapples with how best to ensure critical infrastructure deploys best practice, as Tom Reeve reports
Attacks on critical national infrastructure are a growing concern, not just the banking and civil infrastructure, but also control systems used in the physical delivery of services. This is set to become even more of a problem as SCADA systems become internet enabled, reports Kate O'Flaherty
Cyber-security has become a boardroom issue, but too few boards give the topic the time or resources required, our experts agreed at a recent SC Magazine Roundtable. Opinions were split over how to respond
ICYMI: Lot airline DDoS attack; Samsung keyboard vulnerability, poor VoIP server security; LinkedIn bug bounty programme, Verify programme has severe privacy/security problems.
In Case You Missed It: German government and renewable power sector breaches, new regs due, and VoIP attacks rise
This week's In Case You Missed It looks at major German government breach, turbines attacked, nuclear talks targeted, EU Data law looms larger and finally VoIP due an upgrade.
This week's In Case You Missed It looks at Yemen's cyber-army, Google's latest efforts with online privacy and finally some good news for women in security.
The latest In Case You Missed It (ICYMI) looks at concerns over new UK law, the full list of SC Award winners and how the US tried and failed to hack North Korea.
Congratulations to all the winners at the SC Awards Europe 2015 announced last night - full list of winners published.
This week's ICYMI column looks at a tea shop data breach, analysis on the Venom flaw and concerns over 'burnt-out' security professionals.
The latest ICYMI column looks at the latest WordPress XSS flaw, costly data breaches and the return of the controversial "Snooper's Charter".
This week's In Case You Missed It (ICYMI) column looks at the latest Lenovo flaw, Edward Snowden's standing in the UK, trust in cyber-insurance and a new version of TorrentLocker.
The top stories on SC over the last week include Barclays poaching staff from Europol, anti-virus concerns and some useful advice for getting information security right.
The public sector is being asked to deliver its services digitally, with availability and reliability just as important as security, as our experts agreed at a recent SC Magazine Roundtable
Now in its 20th year, the event's theme is "Intelligent Security: Protect. Detect. Respond. Recover."
SC Magazine's salary survey shows that in response to the current skills shortages, the money is rolling in for information security professionals.
Kate O'Flaherty reports how distributed denial of service attacks are growing in size and scale, making it important to know what to do before, during and after an attack
Rapid expansion of the cyber-security sector has meant that government agencies and international professional organisations don't meet all of the industry's changing demands and it has often had to provide its own support infrastructure
This week's ICYMI column looks at the top stories on SC from the last week, from the breach blame game and Anonymous hackers to the discovery and patching of critical SSL and Magento flaws.
This week's In Case You Missed It column looks the top stories on SC from the past week, including an online battle between Anonymous and ISIS, a takeover of a French TV network and demystifying claims of 'advanced' cyber-attacks.
The latest ICYMI looks at data-scraping Chrome extensions, Facebook privacy and common cyber-security failings.
In this latest In Case You Missed It column, we look at the top stories on SC this week, including the discovery of a new OpenSSL bug and super-stealthy denial of service attack.
Mobiles and the cloud may have subverted the idea of perimeter protection, but some 20 years after launching FireWall-1, Check Point founder Gil Shwed tells SC that there's still a security role for the Firewall.
This week's In Case You Missed It column looks at the top five articles on SC this week, including new Facebook flaws, 'Freak' attacks and the trade-offs with 'smart' cities.
This week's ICYMI column looks at the top five stories on SC this week, including a Facebook log-in hijacking tool, the Rowhammer flaw and the future of the CISO.
Bristol has launched a 'smart cities' project that will see a software-defined network facilitate machine-to-machine learning for a future of driverless cars, assisted living and real-time healthcare. But where does that leave citizens' privacy?
"IT security isn't just about technology, it's also people and processes," explains Michael Cock, group information technology manager at Sutton and East Surrey Water (SESW) as he describes to SC some of the policies, approaches and technology used to protect the drinking water of 670,000 residents and 284,000 properties
A growing variety of technologies, functionality and devices, often not chosen by the organisation, connecting to the corporate network from beyond the perimeter make mobile security tougher than ever, reports Doug Drinkwater from SC Magazine's recent roundtable
A KPMG survey found that over half of UK companies would seriously consider hiring ex-hackers or convicted criminals to plug their skills gap
Pooling of technology and people across agencies and member countries - as well as partnering with industry - is central to NATO's cyber-defence strategy, as Ian West explains to SC's Tony Morbin
Advances in technology and declining prices are fuelling an expanding market in hiring hackers - in some cases for defence, but increasingly, for criminal activities.
The latest In Case You Missed It column looks at the biggest stories on SC this week, including the alleged NSA/GCHQ hack on Gemalto and our interview with Eugene Kaspersky.
It's been a busy few weeks for Kaspersky Lab, the anti-virus vendor behind the discovery of Equation and Carbanak groups. SC interviewed CEO Eugene Kaspersky on the disclosures, the company's direction, anti-virus and cyber-insurance.
This week's ICYMI looks at the top stories on SC this week, including new reports on UK data breaches and the Carabanak cyber-crime gang.
The multi-facited Carbanak cyber-raid on global financial institutions appears to be the biggest ever bank robbery by a single cyber-crime group.
This week's ICYMI column reviews the top stories on SC last week, from an espionage group targeting Apple iOS devices to Internet of Things flaws and privacy concerns around Outlook.
The retail industry is a common target for hackers, mainly because that's where the money is. But as Sophos security expert James Lyne demonstrates, their defences are all too often easily exploitable.
In its week's ICYMI, we look at the top news articles on SC the last week including EU data protection laws, Skype hackers and the re-launch of Pirate Bay.
The latest ICYMI column looks at the biggest stories on SC this week, including worrying news on EU data protection laws, claims of iPhone spyware and new Flash Player zero-days.
The latest ICYMI column looks at the week's biggest stories, including hacking into cars, Chinese cyber-espionage and the take-down of thousands of French websites.
CISOs are increasingly taking on greater management responsibilities - but are they as a result being divorced from their firm's true security maturity and the tools needed to avoid being breached?
This week's In Case You Missed It looks at the five biggest security news this week, including the sad passing of information security journalist - who helped found SC - Steve Gold.
This week's In Case You Missed It looks at the five most popular articles on SC, including news on Lizard Squad and old security predictions.
Late last year SC Magazine UK editor-in-chief Tony Morbin interviewed Alan Kessler, president and CEO, Vormetric, to get an industry insider view on issues in the commercial encryption market.
International uptake has been slow for the DNS security extension (DNSSEC) which authenticates URL queries. Tony Morbin spoke to Anne-Marie Eklund Löwinder to get a better understanding of the issues
Multiple connected 'Internet of Things' devices could be fuelling a corporate security nightmare suggests Kate O'Flaherty
Cyber-crime is as much a threat to ordinary Russians as anyone else, and the country is developing a strategy to cope - while seeking international cooperation too, as Eugene Gerden in St Petersburg reports
Tapping the insight of info security's thought leaders on advanced persistent threats, what they represent and how to protect against them.
Advanced persistent threat (APT) attacks are complex, multi-layered and designed to evade detection, leaving IT security teams in the dark and sensitive data at risk. Doug Drinkwater asks how to respond
These explorers' findings of critical vulnerabilities - from Heartbleed to Shellshock - have generated excitement, along with awareness, and made an indelible mark on security.
Blessed are the influencers for they will make a true difference - through policy, vision, drive, innovation and ideas - in the course of information security. What sets our selection apart is that they've held significant sway on the direction of IT security.
These professionals have done everything from cryptography to founding an influential security conference.
The following hitched up their digital wagons to blaze new trails in cybersecurity.
This week's ICYMI looks at the top five articles on SC, including new hacking allegations against the GCHQ and the return of Tor dark markets.
This week's In Case You Missed It looks at the five most popular articles on SC, including weak passwords exposed in the Sony Pictures breach and the return of the Poodle flaw.
The Metropolitan Police has become the latest law enforcement agency to complain that encryption makes it difficult to catch and prosecute criminals.
From childhood fascinations and unlikely epiphanies to unexpected opportunities and market surges, top security managers find inspiration in almost anything - and they're willing to seize opportunity and take responsibility to lead their teams.
This week's In Case You Missed It looks at the five most popular articles on SC, including the launch of a new cyber-security degree, new ATM malware and Sony's latest data breach.
Six months after launch and the UK's National Computer Emergency Response Team (CERT-UK) is seeing rising awareness of the group, the CiSP initiative and cyber-crime more generally.
This week's In Case You Missed It looks at the most popular articles on SC including news of CESG-accredited cyber-security courses, the Regin malware and the latest Sony hack.
This week's In Case You Missed It looks at the latest cyber-terrorism claims, former hackers in enterprises and issues to be dealt with in the supply chain.
CESG certified cyber security training launched today with eight companies and 12 courses accredited.
TLS bugs, the definition of an advanced persistent threat and new figures on NHS data breaches are the pick of the stories in the latest In Case You Missed It column.
Our latest In Case You Missed It (ICYMI) column looks at the take-down of Silk Road 2.0 and other dark markets on Tor, the new WireLurker malware and some good news for cash-happy InfoSec pros.
Europol's European Cybercrime Centre (EC3) is growing faster than expected. Doug Drinkwater visited its offices in The Hague, Netherlands, to find out how it is uniting law enforcement in the fight against cyber-criminals
2014 was the year that cyber-security hit the headlines, with data breaches, more government surveillance leaks, and celebrity exposures causing the UK public to lose faith in the web, reports Tony Morbin
In an interview with SC's Tony Morbin, the NCCU's Jamie Saunders explained how 'policing by consent' contends with the tidal wave of new criminal opportunities unleashed by digital technology and the connected world
This week's In Case You Missed Column looks at websites at risk from Drupal's SQL injection flaw, security features on Android and information security shortcomings in business.
This week's In Case You Missed It column looks at the Internet of Things, Apple's troubles in China and a strongly worded goodbye note by the outgoing head of GCHQ.
Control systems are visible on the internet and under attack from dedicated malware, but vendors are not providing adequate security.
Further data breaches, Heartbleed-type flaws and new revelations about government surveillance will likely continue in 2015 but, as Doug Drinkwater reports, it could also prove a pivotal year for data protection, law reform, the Internet of Things and the fight against terrorism
While biometric technology is becoming more sophisticated, it is still far from infallible. Kate O'Flaherty reports