Risk

Never stop learning - the need for a risk-based approach to cyber-security

Never stop learning - the need for a risk-based approach to cyber-security

Kristine Olson-Chapman advises senior executives and IT security professionals on how to manage the challenges of cyber-security by using a risk-based approach

New study reveals that numerous UK businesses are unprepared for a cyber-attack

New study reveals that numerous UK businesses are unprepared for a cyber-attack

Andrew Dalglish explains the potential risk for UK businesses as a result of so many not being prepared for an attack, plus looks at common weaknesses in current cyber-security and how they might be overcome.

Millions of nodes detected that shouldn't be exposed to public network

By

Major risk of hack attacks against databases are possible due to millions of systems on the internet that offer services which should not be exposed to the public.

75% of UK consumers won't do biz with a company that has been hacked

By

Three quarters of UK consumers would stop doing business or cancel memberships with an organisation if it was hacked.

80% of retailers take payment card details by phone in unsecure ways

By

Over a third of people have heard friends, colleagues and even strangers sharing their full credit and debit card details in public while on the phone.

Number one risk to the broader economy is cyber-risk

By

Cyber-risk remains the number one overall concern of the financial industry to the broader economy.

Short term gain, long term pain: Avoiding IoT security shortcuts

Short term gain, long term pain: Avoiding IoT security shortcuts

In the rush to be first to market many organisations overlook basic IoT security principles, putting users at risk. Thomas Fischer urges, take time to build robust security protocols into products, rather than trying to retroft them.

Cyber-attack among World Economic Forum's top global risks

Cyber-attack among World Economic Forum's top global risks

By

The World Economic Forum's annual Global Risk report lists cyber-attacks as one of the biggest dangers in an ever more connected world.

Industry Innovators: Risk and policy management

By

Collecting data needs to be diverse allowing data collection directly off of network devices and from questionnaires and other "soft" sources.

NIST publishes guide to whitelisting

By

The US National Institute of Standards and Technology (NIST) has published a guide to whitelisting, aimed at helping organisations implement an important defensive security technology - application whitelisting.

SCNY Congress panel: Mind the gap! IT security

SCNY Congress panel: Mind the gap! IT security

By

The SC Congress NY conference took place yesterday, 20 October.

Should you use cyber insurance to mitigate risk?

Should you use cyber insurance to mitigate risk?

By

While still a relatively immature industry, cyber insurance can reduce the costs of recovering from a breach, and, as Tony Morbin reports, it can also play a role in driving adoption of best practice, including de-facto standards in critical infrastructure.

How secure is cloud - really?

How secure is cloud - really?

Revelations of government surveillance are fuelling a paranoia that isn't going to subside. So should firms be afraid of adopting cloud?

SC Webcasts UK

Sign up to our newsletters

FOLLOW US