This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Features

The 5 most read articles this week: August 22 to 28

The 5 most read articles this week: August 22 to 28

Here are the five most popular articles, as read by you the reader, in the week for August 22 to 28.

ICYMI: Sony PlayStation hack, security spending & 'unbreakable' encryption

ICYMI: Sony PlayStation hack, security spending & 'unbreakable' encryption

This week's In Case You Missed It column looks at Sony PlayStation Network hack, the rise in security spending and surprising new claims on cyber security skills and encryption.

SCADA systems: Riddled with vulnerabilities?

SCADA systems: Riddled with vulnerabilities?

SCADA systems are essential to the smooth running of critical infrastructure but, as evidenced by the Stuxnet attack, they can be exploited through software and hardware vulnerabilities, and human error. But experts contest if they are really under threat.

ICYMI: NSA insiders, hacking living rooms & learning from Target

ICYMI: NSA insiders, hacking living rooms & learning from Target

This week's In Case You Missed It looks at rumours on a new NSA insider, hackable living rooms and if police are turning the tide on cyber-criminals.

The 5 most read articles this week: August 15 to 21

The 5 most read articles this week: August 15 to 21

Here are the five most popular articles, as read by you the reader, in the week for August 15 to 21.

Should you use cyber insurance to mitigate risk?

Should you use cyber insurance to mitigate risk?

While still a relatively immature industry, cyber insurance can reduce the costs of recovering from a breach, and, as Tony Morbin reports, it can also play a role in driving adoption of best practice, including de-facto standards in critical infrastructure.

The 5 most read articles this week: August 8 to 14

The 5 most read articles this week: August 8 to 14

Here are the five most popular articles, as read by you the reader, in the week for August 8 to 14.

ICYMI: Data breach disclosure, European privacy & internet outages

ICYMI: Data breach disclosure, European privacy & internet outages

This week's In Case You Missed It looks at data breach response, new concerns on EU privacy and claims that the internet is breaking 'under its own weight'.

Black Hat reports: Lurk Downloader & cryptocurrency mining hijacker

Black Hat reports: Lurk Downloader & cryptocurrency mining hijacker

During Black Hat Dell SecureWorks' threat reports included details on its research into the Lurk Downloader and hijacking attempts on large hosting companies' networks.

ICYMI: Black Hat news, biggest breach ever & figures to take to the CEO

ICYMI: Black Hat news, biggest breach ever & figures to take to the CEO

This week's In Case You Missed It (ICYMI) highlights from the Black Hat conference, and reaction to the 'biggest data breach ever'.

Sign up to our newsletters