Roberto Valerio addresses the latest breach from the National Lottery and analyses how and why this type of fraud is on the rise
If cyber-crime wasn't considered a business risk before, it is certainly being pushed to the front and centre stage by large firms now, says Chris Dye who urges adoption of file-regeneration technology.
Kristine Olson-Chapman advises senior executives and IT security professionals on how to manage the challenges of cyber-security by using a risk-based approach
One of Europe's foremost specialists in securing the technology that controls critical infrastructure, Mark Carolan, believes information security pros should be worried about ICS in their infrastructure.
With GDPR imminent, it's crucial we tackle the biggest myths surrounding data regulation and cyber-security
Lillian Pang addresses some of the most common misconceptions surrounding the new GDPR legislation
When you undertake an acquisition, cyber-security must be a top integration priority. If left to fester, it will eventually catch you out says Ian Kayne.
Kevin Davis discusses how vital it is that organisations look to agility as a way of providing speed of change and embracing new technologies to facilitate customer needs
Jason Hart discusses how data manipulation will be the biggest threat to businesses and public figures in the future.
Kasey Cross discusses the importance of having the ability to see active attackers on your network at work
Duncan Hughes explains the best methods to use to effectively protect businesses and ensure networks can stand up to a DDoS attack
Avi Rosen explores how a common crime - and the mitigations against it - can be applied to the world of mobile security.
Gavin Millard says that while having a regulation such as the EU GDPR in place would have reduced the chance of a breach the size of Yahoo!, practicing good cyber-hygiene and timely disclosure have the best effects when dealing with any major breach that compromises personal data.
Graham Carberry provides insight into why Britain is one of the biggest targets of cyber-attack worldwide and the technological developments that come from innovative security businesses
John Ferron discusses the best way to embark on a digital transformation exercise that can deliver business efficiency and security.
Avi Freedman discusses the use of big data to cope with the increasingly large scale DDoS attacks.
Bogdan Botezatu discusses how defenders are using machine learning algorithms to help beat the malware and give themselves the best possible chance of evading and protecting against APTs.
Dik Vos explores how automation requires humanity and predictions on how the industry is set to change dramatically over the next ten years.
Sian John discusses why SMEs should care about having security measures to protect their business since if they fail to comply to with GDPR and other regulations, they can lose a lot of money
Jon Fielding discusses the need to manage information security at the data level and not simply at the network perimeter.
Marcell Gogan discusses the threat of privileged user access and how it often goes largely ignored
Sam Hutton says that as the rapidly growing menace of cyber-crime climbs the corporate agenda, it is increasingly recognised that the answers to such a severe threat lay in innovation.
Dave Schuette discusses the measures enterprises must adopt to ensure security in the age of mobility and BYOD
Jeremiah Grossman says it's not uncommon to see security vendors claim they're the best vendor to protect you from cyber-threats. These claims are all well and good, but where is the evidence to back these figures up?
Justin Dolly discusses why security should be high on the agenda of the board and seen as a business enabler, not a drain on resources
Annette Murphy explores how security professionals can prepare and protect their assets from Distributed Denial of Service (DDoS) attacks
Pascal Bergeot says being able to take remote control of users' PCs is crucial to managing modern and disparate work forces, but can you really be sure how safe you are?
Recent OpenSSL patches show why using containers to enhance vulnerability response plans is good idea
Tim Mackey explains the value of taking a container approach to vulnerability response plans
Phil Filleul discusses how banks can beat off cyber-criminals using a range of methods and explores how graph analytics can improve their defence and protection
Henrik Kiertzner asks how will the UK's departure from the European Union impact cyber-security?
Nic Scott discusses what IT decision makers can do to make their organisation immune from ransomware so they too can laugh at the scammers trying to take company files for a ride.
Cyber-crime growth is accelerating. Rob Wainwright reports how Europol's 2016 Internet Organised Crime Threat Assessment identifies an expanding cyber-criminal economy exploiting our increasingly Internet-enabled lives.
Rory Duncan argues that companies need to invest not only in detective and defensive controls, but also in the ability to take action when an attack is occurring
Bhupender Singh discusses how Big Data is adding a new paradigm to cyber-security
François Amigorena argues that multi-factor authentication impedes end users and slows them down in their jobs, and goes into detail about how context-aware security works in the background to secure users
Jeremy King discusses what businesses can do today to prioritise data security
YOUR business website has at least one severe vulnerability - giving hackers open access - what can you do?
Statistically your company website already has at least one severe flaw - and there could be many more, says Ian Muscat. Why are website vulnerabilities so frequent and on the rise? What should organisations be focusing on and how can they protect themselves in the future?
Michael Hack touches on what we need to know about the GDPR in regard to risk evaluation, personal information compliance, the right to be forgotten, disclosure days, training and technology, and the consequences
Andrew Sheldon discusses how there is considerable danger in allowing digital forensic triage to be carried out in haste or in ignorance
Dana Simberkoff discusses what organisations can learn from the Sage incident and how to stop insider threats in their tracks through policy creation and internal safeguards
With employees and endpoints the weak links in the cyber-security chain, David Angwin says organisations must break away from traditional protection and switch focus to preventing sophisticated attacks before it's too late.
Claire de Longeaux discusses how physical identities need to change, notably through a numerical evolution.
Ralph Echemendia discusses the best practices for ensuring security of customer data for a contact centre in the cloud
Kevin Bocek argues that by decrypting the kernel and inviting developers to root around in its OS, Apple will actually make users more secure as any vulnerabilities will instantly be brought to light.
Shai Morag discusses the importance of endpoint visibility for a large organisation, what stands in the way of organisations maturing their endpoint visibility and ways technology can help ascertain this essential missing piece of the incident response puzzle.
The theft of millions of password credentials can lead to automated attacks on other companies' sites. But Stephen Singam asks how can they be prepared to spot this risk?
Paul Donovan explains the security issues prevalent for today's multinationals, and how to instigate centralised policies to help manage security and compliance.
David Alexander discusses three ways in which the new EU e-Signature Regulation will affect wealth management companies.
Duncan Hughes explains how SSL decryption will increasingl be needed to ensure encrypted traffic does not become a facilitator for attackers.
Jason Hart says the best thing we can do to protect our business and personal lives from cyber-criminals looking to gain access to our information is to beat them to it with ethical hacking.
As data breaches become commonplace and organisations struggle to keep pace, Treavor Dearing explains why integration and collaboration among IT security vendors is emerging as the only viable solution to beat cyber-criminals once and for all.
Rui Biscaia discusses how companies can overcome the weaknesses in data loss programmes to make them relevant and effective again.
James Henry looks at the Yahoo! Incident within the context of other mega breaches to look at the trends and where security is failing.
Lawrence Jones explains how apprenticeships can help to develop the next generation of technical engineers and innovators.
Rob Sloan explains how the DNC hack was tied to Russian state hackers
Dr Joanna Świątkowska says that a comprehensive, multi-dimensional strategy in necessary for cyber-defence, and for Poland, the need for national defence is an opportunity to build an export business in cyber-security.
André Malinowski discusses his view on how Britain is too trusting of biometric security
Michael Marriott looks at how hackers are increasingly using tactics used by commercial organisations to raise their profile and publicise their 'business'.
Stephen Morrow discusses that automotive manufacturers have been focusing so much on adding functionality and usability to connected cars that they haven't properly considered the threats
While the result of the referendum in the UK to leave the EU was unexpected by commentators, Brexit isn't the disaster that some critics claim and for nimble companies, it provides some opportunities, says Jack Bedell-Pearce.
Andy Taylor discusses how CIOs can tackle the problems with IoT security and what precautions they could be taking.
Nic Scott discusses how the IP Bill will fundamentally change the relationship between UK citizens and the government.
Darran Rolls discusses proactive IAM techniques organisations can use to stay protected
Fortunato Guarino looks at the importance of having the necessary processes and technology in place for finding personally identifiable information (PII) anywhere on the company network
Travis McPeak lists the top five OpenStack questions often asked by users and technologists and provides responses to each
Steve Nice discusses where UK businesses are falling short on security, what's at stake for them, and what they need to do to protect themselves.
David Poole discusses how technology and the internet have transformed our payment process and the issues that come with these new developments.
Gavin Siggers explores six key steps to getting GDPR-ready to help businesses understand the impact of the GDPR on their information management processes.
Mark Kedgley looks at how cyber-security technology is marketed and the recurring disconnect between product investment and incremental improvements in information security effectiveness.
Andrew Dalglish explains the potential risk for UK businesses as a result of so many not being prepared for an attack, plus looks at common weaknesses in current cyber-security and how they might be overcome.
Lee Painter says a rise in security breaches due to abuse of access has put the spotlight on Identity and Access Management. So how might Artificial Intelligence shape its future?
Critical Infrastructure is now at risk. Transport, finance and utilities are all targets. Graham Mann looks at some key issues and how they can be tackled.
Protecting data is a significant task faced by security managers every day. Paul German discusses creating cyber-security strategies for government agencies.
Biometrics can actually weaken authentication security if not implemented correctly says Hitoshi Kokumai, who asks, what exactly does the NIST Authentication Guideline have to say on this issue?
Given the myriad of security solutions available today, Danny Ilic says the key challenge is to ensure customers accept new products and services and are comfortable using them.
Paul Cash discusses the use of automation technologies to improve security processes
David Mount discusses the need for access governance, the kind of return that can be expected on it, and delivering a return on governance
Kasey Cross explains the devastation an organisation undergoes when struck by ransomware and describes preventative measures that can be taken to avoid spread from a single machine to a network.
Alexandre Arbelet and Daniel Brown explain the role of artificial intelligence in enhancing cyber-security
Nik Whitfield says before you worry about whether you have enough people with the right skills, worry about how people who have the most skills are spending their time - and why.
Matt Little asks how do companies identify, react to and guard against thieves, snoops and idiots?
Brian Chappell is passionate about the importance of integration to the security industry and explains why it has the power to help companies make quicker and better decisions.
Brian Vecci discusses why ransomware is so dangerous and the three best ways that organisations can catch and stop it before its devastating effects take place.
Andrew Tang discusses the fact that the legislation won't technically apply to the UK once the GDPR is enforced in 2018 and what it will mean for UK security
Will Embrey argues that, to maximise its budget and resources, determining a company's network security strategy should fall on the shoulders of its CEO.
Andy Buchanan discusses why companies need to take practical steps to defend against the consistent threat of ransomware
Jonathan Sander discusses why compliance is always a race to the bottom and how security as regulation takes executives off the front lines
Andrew Rogoyski says new ideas are needed to further motivate the quest for cyber-skills
John Suffolk describes the challenge of combating supply chain risk in a globalised marketplace
Dave Larson offers advice for organisations wishing to protect themselves from the latest types of cyber-extortion
Lewis Henderson discusses the migration to Office 365 and how companies are holding off migrating due to risks highlighted in recent news
Tony Anscombe says biometric identification is becoming the security measure of choice for a growing number of companies.
Mike Pittenger discusses what he believes is the most dangerous code in your application, whether standalone or containerised
Nigel Hawthorn discusses the IT skills crisis and the five skills that will become vital to businesses operating in the cloud
Mark Nicholls delves into the world of red teaming and explains why more companies are adopting this no-holds-barred approach to testing network security
Finding the right partner is the key to making cloud use secure for your organisation says Kevin Patel.
Media and news websites represent some of the world's most trusted brands. Jason Steer explains why they can be security vulnerabilities for their readers — and what you can do to protect yourself.
Kevin Bocek looks at DevOps' rise in popularity and the frequently overlooked security headaches that accompany it, and considers with how these issues might be remedied by automation.
With the final Privacy Shield, the European Commission and US Government have concluded years of negotiation over transatlantic data flows. Cameron Kerry and Maarten Meulenbelt consider the implications.
Rick Orloff describes what the GDPR means for businesses including a range of statistics which uncovered the disparity between ITDMs and knowledge workers on security and policy issues
Toni Gidwani challenges Guccifer 2.0's claimed attribution for the Democratic National Committee (DNC) breach
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Microsoft update left Azure Linux virtual machines open to hacking
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- ICYMI: CEO Sacked; MS Zero-day; Passwords dropped; Ransomware wild, charging hack
- 9.2 million medical records for sale on darkweb
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry