Mirai malware has branched out into more than 60 known variants since it first wreaked havoc in 2016
Cisco released security updates for multiple products, some of which contain vulnerabilities that, if exploited would allow an attacker to take control of an affected system.
ElectionGuard assigns an encryption-enabled verification mechanism that distributes unique tracking codes to voters, which they can use to independently confirm that their votes were counted and not altered
Phishing campaigns gain strength by moving from forging mail to compromising legitimate accounts
To prevent attacks caused by human error, SMBs must first identify factors that can lead to a data breach, such as over-worked employees, lack of cyber-security education & awareness across departments.
Before adding another point solution provider, another risk score, another data source, have you made an honest assessment and exhausted the data you already have? Test the lift of new providers using AI.
Intelligent, automated, cloud delivered endpoint protection can help provide the visibility to explore patterns, trends or clues and identify weak points and and improve endpoint hygiene.
Data masking creates virtual, sanitised copies of real data - anonymised and desensitised - while ensuring it remains meaningful to those in DevOps who need it to improve security and accelerate innovation.
Change is happening, but more needs to be done to ensure women are visible and getting the opportunities they deserve
Winners of the SC Awards Europe 2019: Dr Stefan Lüders, CSO at CERN won CISO of the year, Palo Alto Networks wins best security company of the year, Lisa Ventura of the UK Cyber Security Association ....
Neurodiversity - a route to fill the cyber-security skills shortage or a necessary alternate perspective?
Neurodiversity describes those on the autistic spectrum as well as people with ADHD, dyslexia and dyspraxia. Increasing diversity offers different ways of thinking to stay one step ahead of cyber-attacks.
Whether you are a CISO, want to become one, or employ/ought to employ one, reading this book will repay the time spent, providing both practical advice and wider social/commercial context of the role.
Tripwire's Tim Erlin discusses what's new and what's not new but still important in vulnerability management.
The SC Europe awards are the industry's most prestigious - recognising excellence, technology and innovation in an ever-changing cyber security industry. So what does it take to win one?
The SC Europe awards celebrate the companies, products and people that stand out - for all the right reasons - in the cybersecurity crowd. We find out what endeared the judges to Exabeam this year
SC Media spoke to AlgoSec to discuss today's cloud and hybrid networks, how organisations can use microsegmentation to protect themselves and where AlgoSec sits in this security ecosystem.
(Sponsored by CrowdStrike) Why do cybersecurity breaches continue to dominate the news headlines? Is the security industry losing the battle?
Discussing 'the true value of actionable intelligence', SC Media UK's latest roundtable saw a gathering of senior cyber-security practitioners to discuss actionable threat intelligence.
Barry Scott, CTO, EMEA, Centrify discusses the security vulnerabilities that young people bring to business.
Open banking can best be thought of as a series of reforms that have been changing the way banks handle the financial information of consumers.