News
Tony Morbin,
Nov 23, 2017
Learning by doing. If you don't have - and practice - a breach recovery plan, then a simulation exercise can demonstrate why you should have one, identify your weak spots, and encourage you to take action to plug the holes.

Executive Insight

Opinion
Nov 23, 2017
Driving the Autumn Budget - speed of introduction causes concerns over safety of autonomous vehicles, including terrorist take-over, plus where responsibility lays - user, manufacterer (hardware/software) and regulator.

SC Webcasts

20/20 Webcast

Taking charge of the GDPR

The EU General Data Protection Regulation (GDPR) deadline is 25 May, 2018. If you think you’re immune from its impact, think again.

x

Taking charge of the GDPR

The EU General Data Protection Regulation (GDPR) deadline is 25 May, 2018. If you think you’re immune from its impact, think again. In a Ponemon study, 65% of businesses are concerned about potential fines and 74% say complying with the GDPR will negatively impact their organisation1. Whether you’re ready or not, attend this webinar to find out best practices, pitfalls, and how companies like yours can achieve some quick wins in their long-term compliance strategy.

In this webinar, you will learn:

  • What’s different with the current regulations 

  • How secure digital workspaces can help

  • Scenarios organisations may encounter

1. The Need for a New IT Security Architecture: Global Study from Citrix and The Ponemon Institute

More Info

Sponsored by: Citrix

Vendor Webcast

We can’t “hold on a sec”

A DevSecOps culture is a must to maintain speed, agility and innovation while simultaneously meeting regulations and staying ahead of attacks. Learn how to bake...

x

We can’t “hold on a sec”

DevSecOps means everyone is responsible for security and compliance from Day 1.

A DevSecOps culture is a must to maintain speed, agility and innovation while simultaneously meeting regulations and staying ahead of attacks. Learn how to bake it into your technology’s DNA from Day 1.

Ultimately, the challenge is to deal with imminent cloud-based attacks, whilst having visibility into processes in order to safeguard user and corporate information. This is easiest, and most scalable, under the mantra of DevSecOps. Do it from Day 1, and you won’t regret it on Day 1,000.

In this session, George will share best practice of how companies have achieved this, as well as the benefits they have realised -- and potential catastrophes they have avoided.  Some of the key takeaways will include:

  • How DevSecOps is changing how organisations approach security and compliance
  • A practitioners' guide to Securing the Cloud and Demystifying GDPR
  • How to successfully implement and maintain a DevSecOps culture
More Info

Sponsored by: Sumo Logic

Vendor Webcast

Identifying the Unknown: Spotting Malicious Activity When Everything Else Fails

It is no exaggeration that enterprises can run on average 25 security products concurrently, as it is the case with financial services organisations, according...

x

Identifying the Unknown: Spotting Malicious Activity When Everything Else Fails

It is no exaggeration that enterprises can run on average 25 security products concurrently, as it is the case with financial services organisations, according to research firm Ovum. And yet sometimes, 25 products can be as good as zero.

Organisations can suffer from a false sense of security thinking they’re better protected than organisations running fewer security products. But in fact, it could be quite the opposite. Much like the law of diminishing returns, the more products, the more alerts, and the more alerts, the higher your chances are of wasting time investigating the same threat more than once—keeping you from focusing on other, more critical threats.

Join Golan Ben-Oni, Global Chief Information Officer at IDT Corporation, and Gil Barak, Co-Founder and Chief Technology Officer at Secdo, as they show you how alerts can be streamlined to simplify threat hunting and find what would have otherwise been overlooked by other tools. Attendees will learn:

  • What is threat-level visibility and how it gives you a far more granular view into potential threats than user-level or kernel-level access to endpoint activity ever could
  • What steps can be taken to automate and simplify alert analysis to eliminate time spent chasing down redundant alerts and false positives
  • How to optimise your security workflow following an incident
More Info

Sponsored by: Secdo

Director's Cut

Features

PRODUCT REVIEWS

Carbon Black Cb Defense

Verdict: For a mix of threat analysis and incident response – where the core of the alert is malware-based – this one demands your attention. The Carbon Black experience is obvious.

Comodo Advanced Endpoint Protection

Verdict: This is a strong product under the covers but with a few warts for users. None of those are show-stoppers, though, and you would do well to take a close look at it.

SC Magazine Recommended

CrowdStrike Falcon

Verdict: This is a very sophisticated but rather specialised tool for the endpoint. If you are a large organisation or one with high-value information assets, this is well worth your time. For what it does, we know of no better tool available. We make this our cloud-based Recommended product.

SC Magazine Recommended

Cylance CylancePROTECT with CylanceOPTICS

Verdict: If you are using CylancePROTECT this is a no-brainer. If you are not, it’s a good reason to consider it. Because CylancePROTECT is one of our SC Lab Approved products, it already has our highest rating, but we are naming the OPTICS add-on Recommended for the value that it adds ...

SC Magazine Recommended

ESET Endpoint Security

Verdict: If you’re looking for a threat-focused endpoint tool at an attractive price point this is worth your attention. For its ease of use and deployment, we make this our on-premises Recommended tool.

Kaspersky Lab Endpoint Security for Business

Verdict: This is one of the strong players in this field. Although it shows, clearly, a legacy of anti-malware (to the point where it still refers to “anti-virus,” even though it really addresses all malicious software), this tool is a capable contender for endpoint security in general.

SC Magazine Best Buy

McAfee Endpoint Security

Verdict: An exceptional effort on behalf of the McAfee technical support team that provided the SC Lab with the opportunity to dedicate more time to testing the product package. Overall, an excellent product, but you’ll get the most out of it as part of the entire McAfee suite managed, as ours ...

Nyotron PARANOID

Verdict: Don’t pass this one by if you are looking at anti-malware. In our view, it certainly ranks in the top five such products we’ve seen over the past couple of years.

Whitepapers

SC Media eBook on Threat Intelligence

This eBook looks at how you can focus your threat intelligence feeds and tune your network hardware to provide the data you need.

SC Media eBook on Internet of Things

IoT devices need not even be connected directly to the internet to become corporate vulnerabilities.

SC Media eBook on DDoS

Today’s attackers can corral millions of systems infected with malware to launch focused botnet attacks that can easily bring down targeted servers.

SC Media eBook on Insider Threat

Not all threats are malicious. Well-intentioned employees represent a risk vector just as severe as others.

GET SC MEDIA UK DELIVERED TO YOUR INBOX