The best way to mitigate security vulnerabilities on your web server is to configure that server in the most reliable way. Join us for our SSL Best Practices webinar and learn to stop threats from the start. This complimentary webinar will explore server configuration and server enhancement.
To effectively combat threats to the enterprise, security teams must understand their organization's adversaries and the attack tools, techniques, and processes (TTPs) they are wont to weaponize.
ON DEMAND WEBCASTS
Mark Twain once said, "The report of my death was an exaggeration." Can the same be said for the password? According to a recent survey commissioned by SecureAuth and distributed on the company's behalf to the readers of SC Magazine, the go-to source for IT security professionals, it looks like the password is far from dead. While the exclusive use of the password is on the decline, the use of passwords in conjunction with other security technologies is alive and well - and expected to continue for many years.
The EU Parliament and Council recently agreed on the text for the General Data Protection Regulation (GDPR). It is expected to pass through the Civil Liberties Committee and be put into law by Parliament early in 2016.
Join us as we explore some of the latest security challenges and discuss the building blocks of developing a resilient security defense system to help you effectively combat evolving IT threats as they emerge.
A fundamental new approach is needed to detect and investigate threats inside the network. Darktrace leads the way with an approach based on advanced mathematics and machine learning developed at Cambridge University, and supported by government intelligence experts.
Entrust Datacard's Jason Soroko takes a look at mobile identity, system architecture, threats and best security practices for mobile application development
Sign up to our newsletters
SC Magazine UK Articles
- Robin Who? Dridex botnet replaced with antivirus software
- Google begins protecting against ads of dubious origin
- Clean house to keep WordPress infection from coming back again and again
- Thunderstrike 2 creators join their one-time target Apple
- Report notes shift from individual cyber-crims to skilled adversaries