Features

ICYMI: Facebook flaw; Verizon report; 5 Cisco alerts; TalkTalk arrest; Crime up

ICYMI: Facebook flaw; Verizon report; 5 Cisco alerts; TalkTalk arrest; Crime up

The latest In Case You Missed It (ICYMI) looks at Facebook backdoor; Verizon findings; Cisco vulnerabilities; 6th TalkTalk arrest; cyber-crime rampant

ICYMI: Buffalo stampede; Airport attack?; Ransomware plus; Patching halted; Short URLs

ICYMI: Buffalo stampede; Airport attack?; Ransomware plus; Patching halted; Short URLs

The latest In Case You Missed It (ICYMI) looks at Malware targeting malware; Was airport attacked?; Ransomware, malvertising & phishing; Quicktime unfixed; Short urls a risk

ID & access: Halt, who goes there?

ID & access: Halt, who goes there?

Evolving ID and access management options have gone from central control of a rigid boundary to multiple ID options, distributed assets, IoT machine ID and variable authentication reports Danny Bradbury*

Is Privacy at Risk?

Is Privacy at Risk?

Privacy is dependent on security while security is dependent on confidentiality, a special case of privacy. This is as true today, in the information age, as it has always been, and we can hardly consider one without the other, writes Tom Reeve

Encryption delivers quantum of solace

Encryption delivers quantum of solace

Data creation and transmission is growing exponentially, with 2.8 zettabytes of data created in 2012, forecast to reach 40 zettabytes (ZB) by 2020 (IDC), and currently encryption offers the best option to secure all that data says Roi Perez

Using big data to uncover Deviant Behaviour

Using big data to uncover Deviant Behaviour

Cyber-attacks are getting larger, faster and more diverse, making them increasingly complex to identify and mitigate. But at the same time, as Kate O'Flaherty reports, businesses are collecting vast amounts of security data - far too much for a human to analyse and turn into something useful

Domestic spying internationally: Three years after Snowden

Domestic spying internationally: Three years after Snowden

Nearly three years on and the world still finds itself tackling the consequences of the Snowden disclosures reports Max Metzger

2 Minutes On: DROWNing in SSL2 connection requests - the web's latest large-scale vulnerability

2 Minutes On: DROWNing in SSL2 connection requests - the web's latest large-scale vulnerability

One of the latest large scale web vulnerabilities, dubbed DROWN (Decrypting RSA with Obsolete and Weakened Encryption), again targets SSL.

Movers & Makers: Spring 2016

Movers & Makers: Spring 2016

Recent updates on the people and organisations that make up the information security industry

ICYMI: Morrisons breach; Worldpay card data; power attack losses; Russian EU targets; criminal capability

ICYMI: Morrisons breach; Worldpay card data; power attack losses; Russian EU targets; criminal capability

The latest In Case You Missed It (ICYMI) looks at Morrisons lawsuit; Wordpay vulnerabilities; Critical scenario costs; EU Banks targeted; Cyber-crime capabilities.

SC Webcasts UK

Sign up to our newsletters

FOLLOW US