This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Features

The 5 most read articles this week: July 18-24

The 5 most read articles this week: July 18-24

Here are the five most popular SC articles, as seen by you the reader, in the week for July 18 to 24.

ICYMI: Questions on cyber warfare, start-up money and helping out charities

ICYMI: Questions on cyber warfare, start-up money and helping out charities

This week's In Case You Missed column considers the possibility of cyber warfare, the money reaching cyber security start-ups and how charity can start at home for InfoSec practitioners.

The 5 most read articles this week: July 11-17

The 5 most read articles this week: July 11-17

Here are the five most popular SC articles, as seen by you the reader, in the week for July 11 to 17.

Conference report: Intelligence services share secrets with private sector

Conference report: Intelligence services share secrets with private sector

UK Financial Cyber Security summit sees call for cross-border and sector info sharing; cyber expenditure plans and investment in exports revealed.

The 5 most read articles this week: July 4-11

The 5 most read articles this week: July 4-11

Here are the five most popular articles, as read by you the reader, in the week for July 4 to 11.

Digital signatures are now legal authentication

Digital signatures are now legal authentication

But where does this leave anyone whose electronic identity has been stolen as a result of a malware infection?

ICYMI: Microsoft takedown, policing cybercrime & eyes on Tor and Tails

ICYMI: Microsoft takedown, policing cybercrime & eyes on Tor and Tails

This week's In Case You Missed It (ICYMI) looks at Microsoft's action against cybercriminals, the cyber security skills gap and NSA spying on Tor users.

CASE STUDY: Women's Security Society

CASE STUDY: Women's Security Society

A conversation with Jane Wainwright, Co-founder Women's Security Society and now senior manager at PWC.

Securing the Olympics

Securing the Olympics

With a military background in insider threat, Jane Wainwright tackled threats from inside and out to secure London's 2012 Olympics.

EU Data Protection Regulation: Rocky road to compliance

EU Data Protection Regulation: Rocky road to compliance

The EU is inching ever closer to putting the much-anticipated EU General Data Protection Regulation on the statute books, and that could see many companies playing catch up.

Sign up to our newsletters