This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Latest News

Movers and makers: September-October

Movers and makers: September-October

The latest news on the people and companies at the forefront of information security.

THREAT OF THE MONTH: SVPENG

THREAT OF THE MONTH: SVPENG

Etay Maor dissects SVPENG - what it is and how to prevent it.

NEWS BRIEFS: September - October

NEWS BRIEFS: September - October

Six Masters degree courses in cyber security to be certified by GCHQ, the highly controversial Data Retention and Investigatory Powers bill is passed and more security news.

1 in 5 corporate networks host child sex abuse content

1 in 5 corporate networks host child sex abuse content

One in five companies have someone who has downloaded child sex abuse images at work. But in just 3.5 per cent of cases this has led to a criminal investigation and in 69 percent of the incidents nothing happened.

UK's Racing Post leaks 677,000 customer names and passwords

UK's Racing Post leaks 677,000 customer names and passwords

SQL injection to blame for Racing Post incursion

Features

The worst happens. What next?

The worst happens. What next?

You've accepted that you are going to be breached at some point. Tony Morbin looks at how this new perspective should be reflected in your response planning

Google Glass: a ticking time bomb?

Google Glass: a ticking time bomb?

Kate O'Flaherty reports how the security implications of wearable technology are becoming clearer as Google Glass infiltrates the corporate market

What are the rules in cyber-warfare

What are the rules in cyber-warfare

Cyber-warfare is so new that the 'ground-rules' are still being established. After the 2007 APT cyber-attack on Estonia, Nato created a cyber-defence centre and the Tallinn Manual ensued. Nazan Osman provides an overview of some of the CCDCOE's and manual's conclusions

Opinion

How do you stop an Energetic Bear?

How do you stop an Energetic Bear?

Companies must think like a hacker and commit to penetration testing to protect themselves from data breaches, says Chema Alonso.

Is your app secure? Probably not

Is your app secure? Probably not

App vulnerabilities need to be thought about holistically, so the network and database in which they reside also need to be considered says Josh Shaul.

All your vulnerabilities belong to us: The rise of the exploit

All your vulnerabilities belong to us: The rise of the exploit

The growing impact of web exploits isn't just limited to the enterprise market and must be countered on an industry-scale, says Pedro Bustamante.

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more