Drupal released a security update to patch an access bypass vulnerability in Drupal Core, which could allow an attacker to take control of an affected website.
Malicious actors may use unique "identifying tokens" to circumvent anonymisation protections on Bluetooth Low Energy devices
Cisco released security updates for multiple products, some of which contain vulnerabilities that, if exploited would allow an attacker to take control of an affected system.
Mirai malware has branched out into more than 60 known variants since it first wreaked havoc in 2016
Out-of-band console tech acting as a centralised conduit to manage secure access to security appliances across an environment, offers one route forward to developing reliable, resilient & secure networks.
Data security must provide both flexibility & access to enterprise data so that organisations know who has access to what data, what data is where, and when and what data leaves their organisation
To prevent attacks caused by human error, SMBs must first identify factors that can lead to a data breach, such as over-worked employees, lack of cyber-security education & awareness across departments.
Before adding another point solution provider, another risk score, another data source, have you made an honest assessment and exhausted the data you already have? Test the lift of new providers using AI.
Change is happening, but more needs to be done to ensure women are visible and getting the opportunities they deserve
Winners of the SC Awards Europe 2019: Dr Stefan Lüders, CSO at CERN won CISO of the year, Palo Alto Networks wins best security company of the year, Lisa Ventura of the UK Cyber Security Association ....
Neurodiversity - a route to fill the cyber-security skills shortage or a necessary alternate perspective?
Neurodiversity describes those on the autistic spectrum as well as people with ADHD, dyslexia and dyspraxia. Increasing diversity offers different ways of thinking to stay one step ahead of cyber-attacks.
Whether you are a CISO, want to become one, or employ/ought to employ one, reading this book will repay the time spent, providing both practical advice and wider social/commercial context of the role.
Tripwire's Tim Erlin discusses what's new and what's not new but still important in vulnerability management.
The SC Europe awards are the industry's most prestigious - recognising excellence, technology and innovation in an ever-changing cyber security industry. So what does it take to win one?
The SC Europe awards celebrate the companies, products and people that stand out - for all the right reasons - in the cybersecurity crowd. We find out what endeared the judges to Exabeam this year
SC Media spoke to AlgoSec to discuss today's cloud and hybrid networks, how organisations can use microsegmentation to protect themselves and where AlgoSec sits in this security ecosystem.
(Sponsored by CrowdStrike) Why do cybersecurity breaches continue to dominate the news headlines? Is the security industry losing the battle?
Discussing 'the true value of actionable intelligence', SC Media UK's latest roundtable saw a gathering of senior cyber-security practitioners to discuss actionable threat intelligence.
Barry Scott, CTO, EMEA, Centrify discusses the security vulnerabilities that young people bring to business.
Open banking can best be thought of as a series of reforms that have been changing the way banks handle the financial information of consumers.