• Skip to Content
  • Skip to Main Navigation
  • Skip to Information Links
  • Skip to Site Search
  • Skip to Footer
  • Skip to Accessibility Information
  • Home Page

Information Links

Search

ScMagazine ScMagazine

  • SC UK
  • SC US

The Cyber-Security source

  • Register
  • Sign in
  • Bulletins
Advanced search
  • Home
  • News & features
      News & features
    • Analytics & Data
    • Attacks & Hacking
    • Crime & Threats
    • Regulation & Compliance
    • Security
    • Servers, cloud & infrastructure
    • Latest news
    • Latest features
    Show
  • Buyer's Guide
  • Opinion
  • Events
      Events
    • SC Congress London
    • Editorial round tables
    • SC Awards Europe
    • Cyber security events calendar
    Show
  • Expert Reports
  • Webinars

LATEST HEADLINES

Critical flaw in Magento e-commerce platform exposes 300,000 e-commerce sites to SQL injection

Critical flaw in Magento e-commerce platform exposes 300,000 e-commerce sites to SQL injection ...

Intel Visa tech can be used by hackers to read data from memory

Intel Visa tech can be used by hackers to read data from memory ...

ICO helps developers produce compliant data products via Sandbox service

ICO helps developers produce compliant data products via Sandbox service

Kitten loses its charm - Microsoft takeover of 99 Iranian websites

Kitten loses its charm - Microsoft takeover of 99 Iranian websites

Cisco issues 24 patches, two don't work

Cisco issues 24 patches, two don't work

Waterholing campaign compromises four South Korean websites
NEWS
Mar 29, 2019

Waterholing campaign compromises four South Korean websites

Security researchers have come across a waterholing campaign that has compromised four South Korean websites by injecting fake login forms to steal user credentials.

Unprepared for unknown outcome. Brexit's impact on data and what needs to be done
NEWS
Mar 28, 2019

Unprepared for unknown outcome. Brexit's impact on data and what needs to be done

Businesses need to take action to limit the risk of potential disruption if a no deal were to happen. Some may change their existing relationships with a trusted supply chain introducing greater risk to the business.

Update. DLA Piper insurance dispute - "nothing to do with war exclusion"
NEWS
Mar 28, 2019

Update. DLA Piper insurance dispute - "nothing to do with war exclusion"

DLA Piper is in a dispute with its insurer, Hiscox. Initial reports citied a war exclusion clause as a reason for non-payment. However a Hiscox spokesperson has told SC " its nothing to do with war exclusion."

Android trojan exploits Accessibility Services for the disabled to autofill forms
NEWS
Mar 28, 2019

Android trojan exploits Accessibility Services for the disabled to autofill forms

A new mobile Android Trojan, dubbed Gustuff, uses Accessibility Services, intended to assist people with disabilities, to autofill banking apps among others.

More News

OPINION

What skills are needed for effective crisis leadership?
OPINION
Mar 29, 2019

What skills are needed for effective crisis leadership?

Strong leadership to ensure resilience during a crisis has never been more important & must be a key aspect of any business looking to weather the currently turbulent economic, political & ecological climate.

How can IT teams make IAM and GDPR a perfect match?
OPINION
Mar 29, 2019

How can IT teams make IAM and GDPR a perfect match?

A fully integrated data access governance (DAG) and IAM strategy can answer: Where is data stored? What's its value? What are the protection controls? Who has access? How are they using that access?

GDPR is more than a tick box exercise: 6 steps to ensure ongoing compliance
OPINION
Mar 29, 2019

GDPR is more than a tick box exercise: 6 steps to ensure ongoing compliance

Becoming GDPR compliant is only half the battle here are the steps organisations should take to ensure ongoing compliance....

Rogue device mitigation or have we gone too far with BYOD?
OPINION
Mar 28, 2019

Rogue device mitigation or have we gone too far with BYOD?

People can and will use their own mobile devices for parts of their job, but does it make sense to allow uncontrolled peripheral devices & PC accessories to connect directly into the corporate infrastructure?

More Opinion

FEATURE

Book Review: CISO, defenders of the cyber-realm
FEATURES
Mar 06, 2019

Book Review: CISO, defenders of the cyber-realm

Whether you are a CISO, want to become one, or employ/ought to employ one, reading this book will repay the time spent, providing both practical advice and wider social/commercial context of the role.

30 years on from the launch of  both SC & the web
FEATURES
Mar 05, 2019

30 years on from the launch of both SC & the web

30 years ago, in 1989, the Berlin Wall came down, SC made its debut in the UK, and Sir Tim Berners-Lee was inventing the World Wide Web while at CERN, the European Particle Physics Laboratory.

Interview: Jonathan Goldberger, VP and GM for Unisys Security Solutions
FEATURES
Mar 04, 2019

Interview: Jonathan Goldberger, VP and GM for Unisys Security Solutions

"Microsegmentation is the means to a zero-trust security network because it is identity-driven and able to isolate threat actors on a network at a granular level. It protects an organisation's critical assets and minimises the impact of cyber-attacks."

BT Security MD Kevin Brown exclusive interview: massive growth in headcount planned
FEATURES
Feb 01, 2019

BT Security MD Kevin Brown exclusive interview: massive growth in headcount planned

"We are not just in the security business because its a vibrant market and a great opportunity to grow BT's business, we are in the security business because we have to be in the security business," says Kevin Brown, recently-appointed managing director of BT Security.

More Feature

VIDEOS

VIDEO
Jun, 2018

Barry Scott, CTO, EMEA, Centrify discusses the security vulnerabilities that young people bring to business.

VIDEO
Apr 26, 2018

Daniel Solis, CEO and founder at Blueliv, and Patryk Pilat, discuss recent research on credential theft.

VIDEO
Jun, 2018

[Video]  Apricorn: EU GDPR - So What Do We Do Now?

Tony Morbin, Editor-in-Chief of SC Media UK interviews Jon Fielding, managing director, Apricorn, EMEA about new research from Apricorn highlighting exactly how massively ill-prepared companies are for last month’s deadline for enforcement of General Data Protection Regulation (GDPR) rules.

VIDEO
Apr 26, 2018

NTT Security Global Threat Intelligence Report 2018 Highlights

NTT Security released their annual Global Threat Intelligence Report (GTIR) for 2018, it stated that ransomware is up 350 percent from 2017 and spyware ranks first in volume of malware at 26 percent reflecting attackers' desire for long-term presence for information.

VIDEO
Apr 26, 2018

NTT Security Global Threat Intelligence Report 2018 Full

NTT Security released their annual Global Threat Intelligence Report (GTIR) for 2018, it stated that ransomware is up 350 percent from 2017 and spyware ranks first in volume of malware at 26 percent reflecting attackers' desire for long-term presence for information.

VIDEO
May 15, 2018

SC Media UK roundtable with Logpoint

Discussing 'the true value of actionable intelligence', SC Media UK's latest roundtable with Logpoint saw a gathering of senior cyber-security practitioners to discuss actionable threat intelligence. Eleven distinguished guests engaged in discussion on the topic at the event, sponsored by LogPoint at the Duck & Waffle restaurant in London's Heron Tower; the session was moderated by SC's editor-in-chief Tony Morbin.

More Video

PARTNER CONTENT

Director's cut: Centrify's CTO on new vulnerabitlities
News
Mar 11, 2017

Director's cut: Centrify's CTO on new vulnerabitlities

Barry Scott, CTO, EMEA, Centrify discusses the security vulnerabilities that young people bring to business.

SC roundtable: the true value of actionable intelligence

Promoted

May 15, 2018

SC roundtable: the true value of actionable intelligence

*SPONSORED CONTENT* Discussing 'the true value of actionable intelligence', SC Media UK's latest roundtable saw a gathering of senior cyber-security practitioners to discuss actionable threat intelligence.

More partner content

Upcoming event


  • Webcast: Using Zero Trust to protect financial services networks

    April 11th, 11am

    Is Zero Trust really achievable given the complexity in finance service organisations?
    Brought to you in partnership with Forescout

    Sign up now

    Video: Cyber intrusions: Why aren't organisations learning?

    Catch up on-demand

    Why do cyber security breaches continue to dominate the news headlines?
    Brought to you in partnership with CrowdStrike

    Sign up now
Tweets by SCmagazineUK

THOUGHT PIECES

  • Tackling password reuse: how to build a stronger first line of defence for enterprise IT

  • The rogue hacker or the regulator - who poses the greatest threat?

  • Predicting the future cyber-risks to critical national infrastructure providers

  • The consequences of DDoS attacks are rising


View more
USER CENTRE
  • About Us
  • Contact Us
  • Accessibility
OTHER
  • Privacy Policy
  • Tems & Conditions
MORE SC SITES
  • SC Congress
  • SC Insight
  • SC Awards
Haymarket Media Group Ltd. Haymarket
  • About Us
  • Contact
  • Privacy Policy
  • Terms & Conditions