Features

Crafty downloads: they had you at 'free'

Crafty downloads: they had you at 'free'

Security researchers from Google have published the results of a year-long investigation into the practice of pay-per-install software bundling - and they aren't impressed.

AI in cyber-security - are we trying to run before we can crawl?

AI in cyber-security - are we trying to run before we can crawl?

Intelligent and automated systems are currently being touted as the next step in cyber-security to help combat the 'always-on' cyber-criminal, but are they right for us? And are we prepared for them?

ICYMI: EU CPNI directive; Euro 2016; Health hit; Expertise absent; Travel risk

ICYMI: EU CPNI directive; Euro 2016; Health hit; Expertise absent; Travel risk

The latest In Case You Missed It (ICYMI) looks at EU cyber-directive; Sports targeted; Health most breached; Orgs lack expertise; Travellers at risk

The SC Awards Europe 2016

The SC Awards Europe 2016

Hundreds of guests gathered on Tuesday 7th of June at the stunning Old Billingsgate

The changing role of the CISO

The changing role of the CISO

Demand is high, supply is low and requirements are changing. Tony Morbin asks - so where are we now with the role of the CISO?

The inside man: Decoding the threat from within

The inside man: Decoding the threat from within

While the biggest threat these days might be your employees, does that danger really mean distrusting your own team, asks Max Metzger, and what actions should you take?

Cyber-security awareness: A battle between the rational and impulsive brains

Cyber-security awareness: A battle between the rational and impulsive brains

SC's Roi Perez looks at how we tackle the biggest vulnerability in our IT infrastructures - the people

Bringing something new to the table

Bringing something new to the table

The figures are still abysmal. So Kate O'Flaherty asks what can the information security industry do to encourage more women to join the sector?

Human Factors (Security | Insecurity) on your mind

Human Factors (Security | Insecurity) on your mind

When designing security systems, it is vital to factor the human into the equation, otherwise, as Tom Reeve explains, you end up with confused users and vulnerable systems

2 Minutes On: SWIFT - Global banking under attack

2 Minutes On: SWIFT - Global banking under attack

Brussels-based SWIFT (Society for Worldwide Interbank Financial Telecommunication), which allows 3,000 member financial institutions worldwide to send and receive information about financial transactions in a secure, standardised and reliable environment, has recently been implicated in a spate of malware-based attacks.

SC Webcasts UK

Sign up to our newsletters

FOLLOW US