• Skip to Content
  • Skip to Main Navigation
  • Skip to Information Links
  • Skip to Site Search
  • Skip to Footer
  • Skip to Accessibility Information
  • Home Page

Information Links

Search

SC Media UK SC Media UK

  • SC UK
  • SC US

The Cyber-Security source

  • Register
  • Sign in
  • Bulletins
Advanced search
  • Home
  • News & features
      News & features
    • Analytics & Data
    • Attacks & Hacking
    • Crime & Threats
    • Regulation & Compliance
    • Security
    • Servers, cloud & infrastructure
    • Latest news
    • Latest features
    Show
  • Buyer's Guide
  • Opinion
  • Events
      Events
    • SC Congress London
    • Editorial round tables
    • SC Awards Europe
    • Cyber security events calendar
    Show
  • Expert Reports
  • Webinars

LATEST HEADLINES

Getting bigger all the time: The top 10 data breach penalties

Getting bigger all the time: The top 10 data breach penalties

Serious cyber-defence in Israel, alongside alien alerts

Serious cyber-defence in Israel, alongside alien alerts

3 in 4 paid compensation for supplier error IF service level agreements cover data use

3 in 4 paid compensation for supplier error IF service level agreements cover ...

Malware volume drops, crytptojacking down 78%, stealthy attacks on web apps double

Malware volume drops, crytptojacking down 78%, stealthy attacks on web apps double

There’s business sense in avoiding takeovers, CyberArk CEO tells SC

There’s business sense in avoiding takeovers, CyberArk CEO tells SC

What is eIDAS and how does it differ from GDPR?

Promoted

Jan 24, 2020

What is eIDAS and how does it differ from GDPR?

SC Media UK editor Tony Morbin interviewed Chris Bailey, VP Strategy and Business Development at Entrust Datacard, to discuss the legal framework and the new security standards for all electronic transactions.

Cleaning up by taking advantage of lax physical security
NEWS
35 hours ago

Cleaning up by taking advantage of lax physical security

Using cleaners to gain physical access and insert USBs into computers, criminal gangs are reverting to old school techniques - and they still work, police head tells delegates.

Windows 10 UAC bypass used by Trickbot to deliver payload
NEWS
40 hours ago

Windows 10 UAC bypass used by Trickbot to deliver payload

The hackers behind Trickbot have added a new Windows 10 UAC bypass to the malware to in order to execute code without the victim knowing.

Infographic: How do you keep remote workers safe?
NEWS
46 hours ago

Infographic: How do you keep remote workers safe?

This infographic provided by CurrentWare shows key reasons why remote workers are so vulnerable to cyber-security threats and provides actionable tips to help accommodate remote workers safely.

More News

OPINION

SME series: Six major reasons for your organisation's endpoint security problems
OPINION
21 hours ago

SME series: Six major reasons for your organisation's endpoint security problems

It is one thing to invest in something, and it is another to do it right. So, are you doing it right when it comes to endpoint security? Here we consider the six major reasons for problems in this area.

Adaptive authentication and the future of MFA
OPINION
21 hours ago

Adaptive authentication and the future of MFA

Adaptive MFA can cut threats by 99.9%. By implementing risk-based authentication companies can determine the baseline login requirements for a given user or set of users on the network

A practical guide to Gartner's view of SASE as the future of network security
OPINION
24 hours ago

A practical guide to Gartner's view of SASE as the future of network security

Secure Access Service Edge architectures shift staff from data centres and managing security boxes: vendors asking customers to wait for their timeframe to transition are dispatching dangerous advice.

2019 was the worst year for data breaches; what needs to change
OPINION
45 hours ago

2019 was the worst year for data breaches; what needs to change

Employee monitoring and endpoint data loss prevention software is a starting point to prevent accidental and malicious data exposure, plus equipping employees to spot and respond to threats.

More Opinion

FEATURE

The biggest data breaches of 2019
FEATURES
Jan 23, 2020

The biggest data breaches of 2019

Kumar Ritesh, chairman and CEO at CYFIRMA, discusses the rising tide of data breaches in 2019, as SC Media UK collates the top 10 data breaches disclosed last year

SC Media UK salary survey 2020: Awareness-trainers among big winners
FEATURES
Jan 15, 2020

SC Media UK salary survey 2020: Awareness-trainers among big winners

Salaries are changing in the cyber-security industry, but are women closing the gender gap, and what skills are most in demand? Which roles have peaked and which are rising?

2020 visions - predictions for the cyber-security industry in the year ahead
FEATURES
Jan 06, 2020

2020 visions - predictions for the cyber-security industry in the year ahead

From the expected to surprising, our 200+ predictions cover Brexit, cyber-treaties to IOT regulation, the negative impact of cyber insurance and the downsides of 5G, plus AI deepfake ransomware & much more.

SC's Cyber Security top 50 companies: Explosive growth as threats grow exponentially
FEATURES
Dec 13, 2019

SC's Cyber Security top 50 companies: Explosive growth as threats grow exponentially

SC Media UK ranks the top 50 pure-play, listed cyber-security companies and sees Splunk take top spot following 42 percent growth in revenues over the past year.

More Feature

PARTNER CONTENT

What is eIDAS and how does it differ from GDPR?

Promoted

Jan 24, 2020

What is eIDAS and how does it differ from GDPR?

SC Media UK editor Tony Morbin interviewed Chris Bailey, VP Strategy and Business Development at Entrust Datacard, to discuss the legal framework and the new security standards for all electronic transactions.

How to secure open banking APIs

Promoted

Dec 19, 2019

How to secure open banking APIs

SC Media UK editor in chief Tony Morbin sat down with WWT's Vinnit Patel and F5's Paul Dignan to discuss how you can achieve full API lifecycle management

5 cybersecurity predictions for 2020

Promoted

Dec 09, 2019

5 cybersecurity predictions for 2020

It's been a tough year for the cyber-security industry with an ever-increasing number of online threats and breaches. But if you get yourself prepared you can minimise your risk. Here's what to look out for in the threat landscape in the New Year

SC roundtable: How do you remain in charge while automating processes?

Promoted

Dec 02, 2019

SC roundtable: How do you remain in charge while automating processes?

SC Media UK's latest roundtable gathered senior cyber-security practitioners to discuss the issues and challenges organisations face by embracing automation and the many opportunities it offers

How to make your CEO listen: CISOs share strategies

Promoted

Oct 31, 2019

How to make your CEO listen: CISOs share strategies

Creating a robust line of command when it comes to cyber security isn't as straightforward as it should be. By picking the right model and communicating in the right way, you can win the board round...

SC roundtable: How to explain digital risk to the board and justify ROI

Promoted

Oct 14, 2019

SC roundtable: How to explain digital risk to the board and justify ROI

With recent GDPR fines hitting organisations for millions of pounds, can cyber-security professionals use this level of awareness to drive investment? SC Media UK's latest roundtable gathered senior cyber-security practitioners to discuss.

Digital Risk in the third degree

Promoted

Oct 02, 2019

Digital Risk in the third degree

Understanding the threats and the risks beyond the 'castle moat' are essential, if your business is to succeed in the digital age - here's why

NTT comes together to drive global innovation

Promoted

Sep 30, 2019

NTT comes together to drive global innovation

Global technology services company helps cities and societies worldwide transform as it brings together the combined capabilities of 28 companies from over 70 countries - and appoints Paolo Masselli as CEO for UK & Ireland

Digital Risk - time to get serious

Promoted

Aug 30, 2019

Digital Risk - time to get serious

Most organisations will now have cyber-security measures in place, yet it is just one element of the comprehensive strategy that is required to effectively manage digital risk. Here we outline the key elements of Digital Risk Protection, and why this should be a priority for your organisation

Cybersecurity risk radar: how mature are you?

Promoted

Jul 23, 2019

Cybersecurity risk radar: how mature are you?

Take part in SC and Skurio's poll to inform industry research and be entered into a prize draw to win a £500 Amazon voucher

Why boardrooms need to worry about Digital Risk

Promoted

Aug 01, 2019

Why boardrooms need to worry about Digital Risk

As the digital world explodes, vulnerabilities increase. Technology designed to make life more convenient, quick and even secure, often opens up unimagined areas of attack. That's why Digital Risk needs to become part of your vocabulary...

The secrets behind our SC award success: Ping Identity

Promoted

Aug 12, 2019

The secrets behind our SC award success: Ping Identity

The SC Europe awards celebrate those that stand out from the cybersecurity crowd. We find out why Ping Identity were one of those that stood out.

The story behind our SC awards win: Duo Security

Promoted

Jun 26, 2019

The story behind our SC awards win: Duo Security

The SC Europe awards are the industry's most prestigious - recognising excellence, technology and innovation in an ever-changing cyber security industry. So what does it take to win one?

The secrets behind our SC award success: Exabeam

Promoted

Jun 26, 2019

The secrets behind our SC award success: Exabeam

The SC Europe awards celebrate the companies, products and people that stand out - for all the right reasons - in the cybersecurity crowd. We find out what endeared the judges to Exabeam this year

How is security management changing in today's cloud and hybrid networks?

Promoted

Jun 26, 2019

How is security management changing in today's cloud and hybrid networks?

SC Media spoke to AlgoSec to discuss today's cloud and hybrid networks, how organisations can use microsegmentation to protect themselves and where AlgoSec sits in this security ecosystem.

Best practice in effective vulnerability management

Promoted

Jul 15, 2019

Best practice in effective vulnerability management

Tripwire's Tim Erlin discusses what's new and what's not new but still important in vulnerability management.

More partner content

Deeper insights

  • Interview: Cyber intrusions: Why aren't organisations learning?

Tweets by SCmagazineUK

View more
USER CENTRE
  • About Us
  • Contact Us
  • Accessibility
OTHER
  • Privacy Policy
  • Tems & Conditions
MORE SC SITES
  • SC Congress
  • SC Insight
  • SC Awards
Haymarket Media Group Ltd. Haymarket
  • About Us
  • Contact
  • Privacy Policy
  • Terms & Conditions