Davey Winder,
Mar 23, 2018
As UK police forces are revealed to have spent just £1.3 million on cyber-crime training in the last three years, security industry response is damning.

Executive Insight

Mar 23, 2018
One of the vulnerabilities that hackers have recently taken advantage of is insecure deserialisation. While insecure deserialisation is not the only method hackers use to install crypto mining malware, its use has significantly increased.




SC Webcasts

20/20 Webcast

Is it safe? How to embrace Cloud efficiency without compromising data security

How to develop an effective and efficient digitalisation strategy


Is it safe? How to embrace Cloud efficiency without compromising data security

“Digital transformation” means many things to different industries, and deploying a cloud environment hosting sensitive data can appear a daunting decision to take. However, the benefits of flexibility and scalability of a cloud-based IT environment can enable organisations to embrace a more efficient way of working, with better customer engagement and experience.

Tune into this webinar, in partnership with Thales and CenturyLink, and you will learn:

  • How to develop an effective and efficient digitalisation strategy
  • Why proactive security of data can protect your reputation, employees and customers
  • How best to protect data on a cloud platform and ensure it is as secure as possible
More Info

Sponsored by: Thales e-Security

20/20 Webcast

GDPR takes a village: Practical advice to help you achieve compliance

The GDPR compliance deadline signals a big shift for organisations handling data


GDPR takes a village: Practical advice to help you achieve compliance

The GDPR compliance deadline signals a big shift for organisations handling data. But it shouldn’t be about doing the bare minimum to avoid big fines. Instead, show customers your commitment by changing how your organisation uses and protects information.

Every employee has an important role to play but many don’t even realise it.

You need each person who handles, has access to, or may inadvertently see personal data to learn the basics of data protection so they can take appropriate steps when they encounter data in their work.

Join guests Enza Iannopollo, Analyst at Forrester Research and Doug Snow, VP of Customer Success, TITUS on April 20th at 2pm BST as we’ll discuss:

  • Why collaboration across the organisation is essential
  • The role of data discovery and classification to mitigate risk
  • The importance and benefits of building a culture of security
More Info

Sponsored by: Titus

20/20 Webcast

Zero Trust Security: Never trust, always verify!

It's time to get serious about cracking down on data breaches


Zero Trust Security: Never trust, always verify!

Organisations spent a combined £123 billion on cybersecurity in 2016 and 2017. During the same period, 66 percent of organisations experienced and average of five or more data breaches. A larger security budget simply won’t solve the cyber security problem. An entirely new approach is required — Zero Trust Security.

The benefits of Zero Trust Security are crucially important in this climate of ever increasing number and scope of security breaches. Zero Trust Security:

  • Covers the broadest range of attack surfaces, ranging from users, endpoints, and networks to resources
  • Enables organisations to increase business agility through the secure adoption of cloud and mobile solutions
  • Provides a framework to properly manage the risk of exposing sensitive apps and infrastructure to business partners
  • Creates satisfied, productive users by ensuring the proper controls are in place to address appropriate levels of risk without requiring a heavy-handed, maximum-control approach regardless of the risk posed 

Join Barry Scott, EMEA CTO to learn more about Zero Trust, what it means for your business and how you can put it into practice.

More Info

Sponsored by: Centrify



Carbon Black Cb Defense

Verdict: For a mix of threat analysis and incident response – where the core of the alert is malware-based – this one demands your attention. The Carbon Black experience is obvious.

Comodo Advanced Endpoint Protection

Verdict: This is a strong product under the covers but with a few warts for users. None of those are show-stoppers, though, and you would do well to take a close look at it.

SC Magazine Recommended

CrowdStrike Falcon

Verdict: This is a very sophisticated but rather specialised tool for the endpoint. If you are a large organisation or one with high-value information assets, this is well worth your time. For what it does, we know of no better tool available. We make this our cloud-based Recommended product.

SC Magazine Recommended

Cylance CylancePROTECT with CylanceOPTICS

Verdict: If you are using CylancePROTECT this is a no-brainer. If you are not, it’s a good reason to consider it. Because CylancePROTECT is one of our SC Lab Approved products, it already has our highest rating, but we are naming the OPTICS add-on Recommended for the value that it adds ...

SC Magazine Recommended

ESET Endpoint Security

Verdict: If you’re looking for a threat-focused endpoint tool at an attractive price point this is worth your attention. For its ease of use and deployment, we make this our on-premises Recommended tool.

Kaspersky Lab Endpoint Security for Business

Verdict: This is one of the strong players in this field. Although it shows, clearly, a legacy of anti-malware (to the point where it still refers to “anti-virus,” even though it really addresses all malicious software), this tool is a capable contender for endpoint security in general.

SC Magazine Best Buy

McAfee Endpoint Security

Verdict: An exceptional effort on behalf of the McAfee technical support team that provided the SC Lab with the opportunity to dedicate more time to testing the product package. Overall, an excellent product, but you’ll get the most out of it as part of the entire McAfee suite managed, as ours ...


Verdict: Don’t pass this one by if you are looking at anti-malware. In our view, it certainly ranks in the top five such products we’ve seen over the past couple of years.


SC Media eBook on Threat Intelligence

This eBook looks at how you can focus your threat intelligence feeds and tune your network hardware to provide the data you need.