November 2013 Issue of SCMagazine UK
This month's issue includes features on advanced persistent threats, the shifting role of the CISO, and business continuity after an incident.
Mobile and cloud security, along with insider threats continued to dominate concerns over the past 12 months -impacted by the increased attention resulting from the ...
The FortiMail-200D from Fortinet features many email security features bundled into an easy-to-manage appliance. It includes anti-virus, anti-spam, onboard identity-based encryption, and content filtering and ...
McAfee Email Protection offers full-scale email security and content management in a single appliance with flexible deployment options.
A UK college provides its 'digital natives' with a secure environment that can be accessed anywhere from any device, reports Greg Masters.
The role of the chief information security officer is expanding to meet new challenges, says Paul Swarbrick, former CISO at NATS, as Karen Epper Hoffman ...
Advanced persistent threats are a real and present danger to all organisations big and small, and only the foolhardy would dismiss them as another hyped ...
Services abound for business continuity and disaster recovery in the cloud, but what's the right choice for your organisation? Alan Earls investigates the options.
Blaming cloud providers for giving in to the demands of US intelligence is a naive approach to a complex issue.
SC Webcasts UK
Sign up to our newsletters
SC Magazine UK Articles
- It's a trap! WhatsApp Gold 'premium' version lures users to malware
- Two-year GDPR honeymoon period starts today
- Surrey teenager charged under Computer Misuse Act over Mumsnet hack
- Cerber ransomware on sale in Russian darknet with new scripting features
- Netflix's VPN ban may result in stronger security for VPN customers
- Email error leaks hundreds of Northern Ireland prison officer details
- Don't connect your charging cell to a computer or you may get hacked!
- SC Roundtable: Turning data into actionable intelligence
- Wekby cyber-criminals use DNS tunnelling for command and control of malware
- ICYMI: WhatsApp trap; Cerber RaaS; LinkedIn loss; Screen lock; 2 yrs to GDPR