Security

Secure Data 2016: 'Its going to get louder'

Secure Data 2016: 'Its going to get louder'

By

While industry is starting to wake up to cyberthreats, is there too much noise to tell whats really threatening and whats benign?

Heightened payment security could hamper usability, says Visa

Heightened payment security could hamper usability, says Visa

By

The European Commission's European Banking Authority has detailed plans to heighten payment security, however payment provider worry this could greatly hamper usability.

Organised hacker groups pose threat to Russian banks

Organised hacker groups pose threat to Russian banks

By

The Russian government plans to ramp up its efforts in the fight against organised cyber criminal gangs within the country, but law enforcement still faces problems in getting the bad guys

Why security vendors should put their money where their mouth is

Why security vendors should put their money where their mouth is

Jeremiah Grossman says it's not uncommon to see security vendors claim they're the best vendor to protect you from cyber-threats. These claims are all well and good, but where is the evidence to back these figures up?

Security: from the basement to the boardroom

Security: from the basement to the boardroom

Justin Dolly discusses why security should be high on the agenda of the board and seen as a business enabler, not a drain on resources

Security spend to rise to $100 billion by 2020, says IDC

Security spend to rise to $100 billion by 2020, says IDC

By

IDC analysts are forecasting that by the year 2020, spending on security products will hit US$100 billion.

93% of UK orgs say security is critical to protecting their brand

By

Eighty-nine percent of UK organisations experience increased customer retention owing to their security practices.

Google looking to reshape web defences with strict Content Security Policies

Google looking to reshape web defences with strict Content Security Policies

By

Google has released a Content Security Policy Evaluator with the aim of assisting web developers avoid leaving their web applications open to XSS attacks.

Swift details measures to increase security of global banking payments network

Swift details measures to increase security of global banking payments network

By

Swift is rolling out a series of new security measures to prevent another Bangladesh bank heist

50% of European SMEs say data security is a major barrier

By

Security raises concerns with half of SMEs saying data security is the major barrier between their organisation and the digital workplace. Another 30 percent believe cost is the key issue.

UK orgs must adopt higher security requirements to pay staff

By

If UK businesses don't accommodate higher security requirements by 19 September, they could miss salary payments.

Are our data centres insecure?

Are our data centres insecure?

By

Vectra Networks is claiming that attackers are turning their attention to data centres. Are our data centres as secure as we think they are?

The top seven ways for UK business to protect themselves in today's cloud-enabled world

The top seven ways for UK business to protect themselves in today's cloud-enabled world

Steve Nice discusses where UK businesses are falling short on security, what's at stake for them, and what they need to do to protect themselves.

DNS tunneling threat drills into nearly half of networks tested

DNS tunneling threat drills into nearly half of networks tested

By

InfoBlox's new report showed nearly half of all networks tested to show signs of DNS tunnelling

A human-shaped approach to security

A human-shaped approach to security

Given the myriad of security solutions available today, Danny Ilic says the key challenge is to ensure customers accept new products and services and are comfortable using them.

Is security automation the solution for overworked cyber-security staff?

Is security automation the solution for overworked cyber-security staff?

Paul Cash discusses the use of automation technologies to improve security processes

Playing nicely with others is the key to security

Playing nicely with others is the key to security

Brian Chappell is passionate about the importance of integration to the security industry and explains why it has the power to help companies make quicker and better decisions.

Is Android as easy to secure as the latest AV-TEST results appear to suggest?

Is Android as easy to secure as the latest AV-TEST results appear to suggest?

By

An independent IT security research facility has reviewed Android, and despite constant charges of insecurity, found the mobile platform to be far from wanting ?

How a 'compliance mindset' can provide bad guys with short cuts if we're not careful

How a 'compliance mindset' can provide bad guys with short cuts if we're not careful

Jonathan Sander discusses why compliance is always a race to the bottom and how security as regulation takes executives off the front lines

HID Global releases mid-year updates for top security trends in 2016

HID Global releases mid-year updates for top security trends in 2016

By

A mid-year update to HID's top 2016 security trends has been released. During the first six month's of the year, HID stated continued progression in market adoption of mobile solutions and interest in the Internet of Things (IoT).

Tor used to secure IoT

By

The Guardian Project has integrated Tor security into the Internet of Things (IoT), creating a Tor Onion Service Configuration for the Home Assistant open source platform.

68% of Europeans want to use biometric authentication for payments

68% of Europeans want to use biometric authentication for payments

By

Over two thirds (68 percent) of consumers across Europe are interested in using biometrics when making a payment, especially when integrated with other security measures.

A push for data-centric security: What organisations must consider

A push for data-centric security: What organisations must consider

Ron Arden takes a data-centric approach to security where the focus is on protecting the data within a system, and not just the system itself

Two-thirds of used hard drives hold personally identifiable data

Two-thirds of used hard drives hold personally identifiable data

By

New research from the Blancco Technology Group shows personal data remaining on old eBay and Craigslist hard drives long after they go out of use

Updated: How will Brexit affect the cyber-security industry in UK and Europe?

Updated: How will Brexit affect the cyber-security industry in UK and Europe?

By

The British public has voted to leave the European Union by a margin of 52 to 48 percent. Are there any implications for people working in the cyber-security industry?

IBM & Ponemon study: Data breach costs rising, now £2.8 mil per incident

By

IBM Security today announced the results of a global study which found that the average cost of a data breach for companies surveyed has grown to £2.8 million, representing a 29 percent increase since 2013.

SWIFT to update cyber-security policies as third heist pulled on user

SWIFT to update cyber-security policies as third heist pulled on user

By

The SWIFT bank messaging cooperative has announced an update to its cyber-security policies as yet another bank has been hit.

DDoS researchers are among most DDoSed

DDoS researchers are among most DDoSed

By

NexusGuard's Q1 2016 report has found that one of the favorite targets of DDoS attackers are attack researchers

Cloud Expo Europe: Allied Irish Bank's road to a secure cloud

Cloud Expo Europe: Allied Irish Bank's road to a secure cloud

By

Speaking at Cloud Expo Europe, David Cahill, security strategy and architecture manager at the Allied Irish Bank, shared the bank's journey to securing the cloud in the organisation.

SC Webcasts UK

Sign up to our newsletters

FOLLOW US