Latest News

Hackers target hedge funds to manipulate trading algorithms

Hackers target hedge funds to manipulate trading algorithms

It's not just Ed Milliband that has hedge funds in his sights, there are others looking for rich pickings too.

SC Exclusive: Cyber-security fails to make the grade at university

SC Exclusive: Cyber-security fails to make the grade at university

The cyber-security skills gap is likely to continue, if not get worse, according to the numbers of people studying the subject at degree level.

Movers and makers: March - April 2015

Movers and makers: March - April 2015

Recent updates on the people and organisations that make up the information security industry

2 minutes on CISO: The blancing act?

2 minutes on CISO: The blancing act?

CISOs are increasingly being asked to take on greater management responsibilities, but are they subsequently being divorced from their firm's true security maturity?

Features

Case study: Securing the water supply

Case study: Securing the water supply

"IT security isn't just about technology, it's also people and processes," explains Michael Cock, group information technology manager at Sutton and East Surrey Water (SESW) as he describes to SC some of the policies, approaches and technology used to protect the drinking water of 670,000 residents and 284,000 properties

How do you solve a problem like mobile security?

How do you solve a problem like mobile security?

A growing variety of technologies, functionality and devices, often not chosen by the organisation, connecting to the corporate network from beyond the perimeter make mobile security tougher than ever, reports Doug Drinkwater from SC Magazine's recent roundtable

Fixing the UK's cyber-skills gap

Fixing the UK's cyber-skills gap

A KPMG survey found that over half of UK companies would seriously consider hiring ex-hackers or convicted criminals to plug their skills gap

Opinion

Are digital loss prevention and signature-based anti-virus living on borrowed time?

Are digital loss prevention and signature-based anti-virus living on borrowed time?

Should fingerprint-based data leakage protection be declared dead asks Peter Tyrrell, suggesting it just doesn't scale for the hyper-connected world.

Change management - security vulnerability or scapegoat?

Change management - security vulnerability or scapegoat?

IT security issues continue to hit critical services, but do we, the public, ever know for sure if they are due to error, system failure, or an attack?

2 minutes on CISO: The blancing act?

2 minutes on CISO: The blancing act?

CISOs are increasingly being asked to take on greater management responsibilities, but are they subsequently being divorced from their firm's true security maturity?