This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Features

Information security budgets on the decline?

Information security budgets on the decline?

A new report which claims information security budgets have fallen has been called into question, but carries better news for security companies and security awareness training.

ICYMI: Shellshock attacks, cyber Armageddon and unpredictable hackers

ICYMI: Shellshock attacks, cyber Armageddon and unpredictable hackers

This week's In Case You Missed It column looks at the first attacks resulting from the Bash/Shellshock bug, claims of cyber Armageddon and unpredictable hackers.

ICYMI

ICYMI

This week's In Case You Missed It (ICYMI), China's industrial spying; US extra-territorial claims; SANS event; Card hacks increase; Malvertsing growth; staff data-theft criminal; Biometric smartphones up tenfold; Celebgate hits cloud; Kids, weakest link; Women's Security Society event; Kyle and Stan hit millions.

Cloud computing hit by 'Celebgate'

Cloud computing hit by 'Celebgate'

Enterprises are questioning their cloud strategy after Apple's iCloud service was implicated in the leak of nude celebrity photos. But should one bad Apple spoil the bunch?

The worst happens. What next?

The worst happens. What next?

You've accepted that you are going to be breached at some point. Tony Morbin looks at how this new perspective should be reflected in your response planning

Google Glass: a ticking time bomb?

Google Glass: a ticking time bomb?

Kate O'Flaherty reports how the security implications of wearable technology are becoming clearer as Google Glass infiltrates the corporate market

What are the rules in cyber-warfare

What are the rules in cyber-warfare

Cyber-warfare is so new that the 'ground-rules' are still being established. After the 2007 APT cyber-attack on Estonia, Nato created a cyber-defence centre and the Tallinn Manual ensued. Nazan Osman provides an overview of some of the CCDCOE's and manual's conclusions

Snowden's forgotten legacy - highlighting insider threat

Snowden's forgotten legacy - highlighting insider threat

NSA whistleblower Edward Snowden lifted the lid on government surveillance but, as Doug Drinkwater reports, his disclosures have also had a significant impact on how companies view rogue employees

Cyber Essentials: benchmarking best practice

Cyber Essentials: benchmarking best practice

From October 2014 many UK public sector information handling projects will require contractors to be Cyber Essentials certified. Tony Morbin looks at how the scheme works, its aims, implementation, shortcomings and potential next steps

The 5 most read articles this week: August 22 to 28

The 5 most read articles this week: August 22 to 28

Here are the five most popular articles, as read by you the reader, in the week for August 22 to 28.

Sign up to our newsletters