This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Latest News

Card and banking fraud back on the rise again

Card and banking fraud back on the rise again

Banking and card fraud back on the rise again says the FFA UK as crime increasingly moves online.

Apple unveils iOS 8.0 - security from the ground upwards

Apple unveils iOS 8.0 - security from the ground upwards

iOS 8.0 - 1.1GB large, but with Apple providing lots of security patches and upgrades...

eBay downplays significance of `old school' XSS attack on its auction portal

eBay downplays significance of `old school' XSS attack on its auction portal

eBay vulnerable to XSS attack enabling re-direction of users says BBC.

Most European businesses don't trust cloud services

Recent research suggests European business are very concerned about the security and transparency of cloud services, which they blame for increased data breaches.

Features

ICYMI

ICYMI

This week's In Case You Missed It (ICYMI), China's industrial spying; US extra-territorial claims; SANS event; Card hacks increase; Malvertsing growth; staff data-theft criminal; Biometric smartphones up tenfold; Celebgate hits cloud; Kids, weakest link; Women's Security Society event; Kyle and Stan hit millions.

Cloud computing hit by 'Celebgate'

Cloud computing hit by 'Celebgate'

Enterprises are questioning their cloud strategy after Apple's iCloud service was implicated in the leak of nude celebrity photos. But should one bad Apple spoil the bunch?

The worst happens. What next?

The worst happens. What next?

You've accepted that you are going to be breached at some point. Tony Morbin looks at how this new perspective should be reflected in your response planning

Opinion

The (grim) reality of password security

The (grim) reality of password security

There are security vulnerabilities when using passwords, but Tyler Moffitt says that there are steps that you can and should take to make sure your data less easy to access.

The new rise of biometrics

The new rise of biometrics

Biometric id options need appropriate mobile computing support to ensure that they too are not compromised says Jon Geater.

Cyber risk management: A boardroom issue

Cyber risk management: A boardroom issue

Having comprehensive cyber risk policies that are not followed can be as detrimental as not having a policy at all says Peter Given.Good who advises that good risk-insurance will demand appropriate procedures are both in place and implemented.

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more