This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Latest News

CISOs offered new way to secure Android devices

CISOs offered new way to secure Android devices

US and German researchers have come up with a novel way to secure the notoriously flaw-ridden Android - a framework that allows corporate and other users to rapidly add security enhancements to Android devices without having to touch the firmware or operating system itself.

Rogue UK and US spies 'help safeguard Tor network'

Rogue UK and US spies 'help safeguard Tor network'

Extremists and paedophiles protected by 'white hat' hackers in GCHQ and NSA, says unconfirmed BBC report.

Cyber Security Challenge joins with GCHQ for security development programme

Cyber Security Challenge joins with GCHQ for security development programme

The Cyber Security Challenge is linking with GCHQ to develop counter-espionage and cyber security skills for the real world.

Features

ICYMI: NSA insiders, hacking living rooms & learning from Target

ICYMI: NSA insiders, hacking living rooms & learning from Target

This week's In Case You Missed It looks at rumours on a new NSA insider, hackable living rooms and if police are turning the tide on cyber-criminals.

The 5 most read articles this week: August 15 to 21

The 5 most read articles this week: August 15 to 21

Here are the five most popular articles, as read by you the reader, in the week for August 15 to 21.

Should you use cyber insurance to mitigate risk?

Should you use cyber insurance to mitigate risk?

While still a relatively immature industry, cyber insurance can reduce the costs of recovering from a breach, and, as Tony Morbin reports, it can also play a role in driving adoption of best practice, including de-facto standards in critical infrastructure.

Opinion

All your vulnerabilities belong to us: The rise of the exploit

All your vulnerabilities belong to us: The rise of the exploit

The growing impact of web exploits isn't just limited to the enterprise market and must be countered on an industry-scale, says Pedro Bustamante.

Is your organisation ready for the next generation of millennials?

Is your organisation ready for the next generation of millennials?

A different attitude to privacy and security among many new workplace entrants is a potential risk that has to be managed says Chris Sullivan.

Why we need a tighter framework for social engineering penetration testing

Why we need a tighter framework for social engineering penetration testing

Protect against real-world threats and test the most likely scenarios using relevant models, including low-tech, says Gavin Watson.

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more