Features

ICYMI: OpenSSL bugs, stealthy DoS attacks and stealing Bitcoins

ICYMI: OpenSSL bugs, stealthy DoS attacks and stealing Bitcoins

In this latest In Case You Missed It column, we look at the top stories on SC this week, including the discovery of a new OpenSSL bug and super-stealthy denial of service attack.

Firewalls 20 years on: Gil Shwed interview

Firewalls 20 years on: Gil Shwed interview

Mobiles and the cloud may have subverted the idea of perimeter protection, but some 20 years after launching FireWall-1, Check Point founder Gil Shwed tells SC that there's still a security role for the Firewall.

ICYMI: Freak flaws, 'smart' city questions and UK data breaches

ICYMI: Freak flaws, 'smart' city questions and UK data breaches

This week's In Case You Missed It column looks at the top five articles on SC this week, including new Facebook flaws, 'Freak' attacks and the trade-offs with 'smart' cities.

ICYMI: Facebook hijack, Rowhammer bug and Star Trek CISOs

ICYMI: Facebook hijack, Rowhammer bug and Star Trek CISOs

This week's ICYMI column looks at the top five stories on SC this week, including a Facebook log-in hijacking tool, the Rowhammer flaw and the future of the CISO.

Bristol launches 'smart' city amid privacy doubts

Bristol launches 'smart' city amid privacy doubts

Bristol has launched a 'smart cities' project that will see a software-defined network facilitate machine-to-machine learning for a future of driverless cars, assisted living and real-time healthcare. But where does that leave citizens' privacy?

Case study: Securing the water supply

Case study: Securing the water supply

"IT security isn't just about technology, it's also people and processes," explains Michael Cock, group information technology manager at Sutton and East Surrey Water (SESW) as he describes to SC some of the policies, approaches and technology used to protect the drinking water of 670,000 residents and 284,000 properties

How do you solve a problem like mobile security?

How do you solve a problem like mobile security?

A growing variety of technologies, functionality and devices, often not chosen by the organisation, connecting to the corporate network from beyond the perimeter make mobile security tougher than ever, reports Doug Drinkwater from SC Magazine's recent roundtable

Fixing the UK's cyber-skills gap

Fixing the UK's cyber-skills gap

A KPMG survey found that over half of UK companies would seriously consider hiring ex-hackers or convicted criminals to plug their skills gap

NATO: Defending against the known unknowns

NATO: Defending against the known unknowns

Pooling of technology and people across agencies and member countries - as well as partnering with industry - is central to NATO's cyber-defence strategy, as Ian West explains to SC's Tony Morbin

Hackers for hire

Hackers for hire

Advances in technology and declining prices are fuelling an expanding market in hiring hackers - in some cases for defence, but increasingly, for criminal activities.

SC Webcasts UK

Sign up to our newsletters

FOLLOW US