LATEST HEADLINES
Waterholing campaign compromises four South Korean websites
Security researchers have come across a waterholing campaign that has compromised four South Korean websites by injecting fake login forms to steal user credentials.
Unprepared for unknown outcome. Brexit's impact on data and what needs to be done
Businesses need to take action to limit the risk of potential disruption if a no deal were to happen. Some may change their existing relationships with a trusted supply chain introducing greater risk to the business.
Update. DLA Piper insurance dispute - "nothing to do with war exclusion"
DLA Piper is in a dispute with its insurer, Hiscox. Initial reports citied a war exclusion clause as a reason for non-payment. However a Hiscox spokesperson has told SC " its nothing to do with war exclusion."
Android trojan exploits Accessibility Services for the disabled to autofill forms
A new mobile Android Trojan, dubbed Gustuff, uses Accessibility Services, intended to assist people with disabilities, to autofill banking apps among others.
OPINION
What skills are needed for effective crisis leadership?
Strong leadership to ensure resilience during a crisis has never been more important & must be a key aspect of any business looking to weather the currently turbulent economic, political & ecological climate.
How can IT teams make IAM and GDPR a perfect match?
A fully integrated data access governance (DAG) and IAM strategy can answer: Where is data stored? What's its value? What are the protection controls? Who has access? How are they using that access?
GDPR is more than a tick box exercise: 6 steps to ensure ongoing compliance
Becoming GDPR compliant is only half the battle here are the steps organisations should take to ensure ongoing compliance....
Rogue device mitigation or have we gone too far with BYOD?
People can and will use their own mobile devices for parts of their job, but does it make sense to allow uncontrolled peripheral devices & PC accessories to connect directly into the corporate infrastructure?
FEATURE
Book Review: CISO, defenders of the cyber-realm
Whether you are a CISO, want to become one, or employ/ought to employ one, reading this book will repay the time spent, providing both practical advice and wider social/commercial context of the role.
30 years on from the launch of both SC & the web
30 years ago, in 1989, the Berlin Wall came down, SC made its debut in the UK, and Sir Tim Berners-Lee was inventing the World Wide Web while at CERN, the European Particle Physics Laboratory.
Interview: Jonathan Goldberger, VP and GM for Unisys Security Solutions
"Microsegmentation is the means to a zero-trust security network because it is identity-driven and able to isolate threat actors on a network at a granular level. It protects an organisation's critical assets and minimises the impact of cyber-attacks."
BT Security MD Kevin Brown exclusive interview: massive growth in headcount planned
"We are not just in the security business because its a vibrant market and a great opportunity to grow BT's business, we are in the security business because we have to be in the security business," says Kevin Brown, recently-appointed managing director of BT Security.
VIDEOS
Barry Scott, CTO, EMEA, Centrify discusses the security vulnerabilities that young people bring to business.
Daniel Solis, CEO and founder at Blueliv, and Patryk Pilat, discuss recent research on credential theft.
[Video] Apricorn: EU GDPR - So What Do We Do Now?
Tony Morbin, Editor-in-Chief of SC Media UK interviews Jon Fielding, managing director, Apricorn, EMEA about new research from Apricorn highlighting exactly how massively ill-prepared companies are for last month’s deadline for enforcement of General Data Protection Regulation (GDPR) rules.
NTT Security Global Threat Intelligence Report 2018 Highlights
NTT Security released their annual Global Threat Intelligence Report (GTIR) for 2018, it stated that ransomware is up 350 percent from 2017 and spyware ranks first in volume of malware at 26 percent reflecting attackers' desire for long-term presence for information.
NTT Security Global Threat Intelligence Report 2018 Full
NTT Security released their annual Global Threat Intelligence Report (GTIR) for 2018, it stated that ransomware is up 350 percent from 2017 and spyware ranks first in volume of malware at 26 percent reflecting attackers' desire for long-term presence for information.
SC Media UK roundtable with Logpoint
Discussing 'the true value of actionable intelligence', SC Media UK's latest roundtable with Logpoint saw a gathering of senior cyber-security practitioners to discuss actionable threat intelligence. Eleven distinguished guests engaged in discussion on the topic at the event, sponsored by LogPoint at the Duck & Waffle restaurant in London's Heron Tower; the session was moderated by SC's editor-in-chief Tony Morbin.
PARTNER CONTENT
Director's cut: Centrify's CTO on new vulnerabitlities
Barry Scott, CTO, EMEA, Centrify discusses the security vulnerabilities that young people bring to business.
Promoted
SC roundtable: the true value of actionable intelligence
*SPONSORED CONTENT* Discussing 'the true value of actionable intelligence', SC Media UK's latest roundtable saw a gathering of senior cyber-security practitioners to discuss actionable threat intelligence.
Upcoming event
Webcast: Using Zero Trust to protect financial services networks
Is Zero Trust really achievable given the complexity in finance service organisations?
Brought to you in partnership with ForescoutVideo: Cyber intrusions: Why aren't organisations learning?
Why do cyber security breaches continue to dominate the news headlines?
Brought to you in partnership with CrowdStrike






