March 2011 Issue of SCMagazine UK
SC Magazine Mar/Apr 2011
The WikiLeaks publication of confidential US dimplomatic cables is still causing ructions, but is it more embarrassing than dangerous? Derek Parkinson looks at the security ...
In an increasingly complex security world, virtualisation promises much - if you build in security from the get-go, says Rob Buckley.
Coverity's technical director doesn't believe in surprises. The company has a triage process for resolving defects, in timely fashion, to help develop secure applications. It ...
There is a growing need for email archiving, but our survey, in association with Symantec.cloud, reveals a neglectful attitude of 'out of sight, out of ...
Not all government and business secrets should be made available to the public by whistleblower sites
All corporate and government data, however obtained, is not fair game. We need to draw a line somewhere...
The risk posed by cyber threats means IT security professionals should be represented on corporate boards
Playing out a cyber crisis ahead of time will help information security priorities inform the corporate response.
It is not enough now just to deface a website, you need to totally compromise the victim and publish the results.
Security awareness is a delicate thing, not something to be forced. It takes skill in selling the awareness message in such a way that people ...
You may be in control of all within the perimeter of corporate security, but when data leaves that safe haven, information rights management is essential, ...
Cloud computing is a boon, but its vectors need to be kept on a short leash, says Mushegh Hakhinian, security architect at IntraLinks.
Businesses looking for a web content security solution are faced with many choices, but M86’s Secure Web Gateways have unique capabilities.
UK-based Winfrasoft has traditionally offered a wide range of Microsoft-powered security appliances, but aims to go further by providing more sophisticated hardware platforms and superior ...
Many businesses still consider anti-spam appliances too complex to deploy, but the Pro 2000 from UK-based CronLab claims a ten-minute installation.
Cyberoam’s UTM appliances have a keen focus on identity-based security and its latest CR750ia brings this technology to mid-sized businesses.
SC Webcasts UK
Sign up to our newsletters
SC Magazine UK Articles
- European Parliament approves GDPR
- Have retailers secured themselves against the Insider threat before you head to the checkout?
- The BYOD explosion: How much of a threat do personal devices really pose to your network?
- Ensure that your employment contracts are fit for purpose for cyber-security
- Cyber-crime as a business rampant, new study
- Europol and F-Secure sign MoU to share cyber-crime info
- Action Fraud warns of new wave of Lizard Squad DDoS attacks
- US judge compels woman to provide fingerprint to open Apple iPhone
- UMICH researchers remotely pick locks of Samsung SmartThing connected home systems
- Meeting the new vulnerability disclosure challenge