Features

ICYMI: Hacking into cars, Chinese cyber-espionage and Siri's security flaw

ICYMI: Hacking into cars, Chinese cyber-espionage and Siri's security flaw

The latest ICYMI column looks at the week's biggest stories, including hacking into cars, Chinese cyber-espionage and the take-down of thousands of French websites.

CISOs: Out of step with their own security teams?

CISOs: Out of step with their own security teams?

CISOs are increasingly taking on greater management responsibilities - but are they as a result being divorced from their firm's true security maturity and the tools needed to avoid being breached?

ICYMI: A fond farewell to a security legend

ICYMI: A fond farewell to a security legend

This week's In Case You Missed It looks at the five biggest security news this week, including the sad passing of information security journalist - who helped found SC - Steve Gold.

ICYMI: Lizard Squad arrest, yearly predictions and new iCloud flaw

ICYMI: Lizard Squad arrest, yearly predictions and new iCloud flaw

This week's In Case You Missed It looks at the five most popular articles on SC, including news on Lizard Squad and old security predictions.

The perimeter's breached - encrypt everything!

The perimeter's breached - encrypt everything!

Late last year SC Magazine UK editor-in-chief Tony Morbin interviewed Alan Kessler, president and CEO, Vormetric, to get an industry insider view on issues in the commercial encryption market.

Keys to the internet

Keys to the internet

International uptake has been slow for the DNS security extension (DNSSEC) which authenticates URL queries. Tony Morbin spoke to Anne-Marie Eklund Löwinder to get a better understanding of the issues

Securing the Internet of Things

Securing the Internet of Things

Multiple connected 'Internet of Things' devices could be fuelling a corporate security nightmare suggests Kate O'Flaherty

Russia revamps its infosec strategy

Russia revamps its infosec strategy

Cyber-crime is as much a threat to ordinary Russians as anyone else, and the country is developing a strategy to cope - while seeking international cooperation too, as Eugene Gerden in St Petersburg reports

Discussing APT: an SC Magazine UK editorial roundtable

Discussing APT: an SC Magazine UK editorial roundtable

Tapping the insight of info security's thought leaders on advanced persistent threats, what they represent and how to protect against them.

APT attacks: Time to respond

APT attacks: Time to respond

Advanced persistent threat (APT) attacks are complex, multi-layered and designed to evade detection, leaving IT security teams in the dark and sensitive data at risk. Doug Drinkwater asks how to respond

SC eConference 17 Feb 2015

Sign up to our newsletters