About 200,000 domains are newly registered every day, of which 70 percent are used for a wide range of nefarious activities
Azure Blob Storage and Web Sites misused by scammers to create a semi-targeted and rather convincing credential harvesting page tailored to the user's organisation to fool users
Companies focused on compliance tended to struggle to patch all high-risk vulnerabilities across their organisation and tended to be slower in patching high-risk vulnerabilities. Those performing better used....
Paige Thompson, the person behind the massive Capital One data breach that exposed more than 100 million records will request a bail before a federal judge on 23 August
Just one in ten only allow corporately provisioned and approved BYOD IT devices & many firms still do not have sufficient data security measures in place. These steps can reduce the risk of a significant breach....
Use of deepfake videos in spear-phishing and impersonation attacks is just one of several ways in which AI can be employed for criminal gain. AI could enable malware to change its behaviour and characteristics
With the final months of Windows 7 support ticking down, the time is now for organisations to take control and effectively manage their enterprise migrations to Windows 10.
Registry breaches, domain hijacking, phishing or the use of malware illustrate the need for organisations to implement the correct security procedures to protect their DNS and safeguard their organisation.
Olympic Park accelerates growth for UK cybersec ventures - provides connected base for internationals
Lorca and Plexal provide a collaborative campus to rapidly scale up 72 cybersec companies with £13.5 million government investment.
Digital transformation knocks cyber-security off its perch, staff incentives not working, the skills gap impacts maturity & business' ability to quantify security risk, says Brennan P Baybeck, ISACA board chair.
Change is happening, but more needs to be done to ensure women are visible and getting the opportunities they deserve
Winners of the SC Awards Europe 2019: Dr Stefan Lüders, CSO at CERN won CISO of the year, Palo Alto Networks wins best security company of the year, Lisa Ventura of the UK Cyber Security Association ....
Take part in SC and Skurio's poll to inform industry research and be entered into a prize draw to win a £500 Amazon voucher
As the digital world explodes, vulnerabilities increase. Technology designed to make life more convenient, quick and even secure, often opens up unimagined areas of attack. That's why Digital Risk needs to become part of your vocabulary...
The SC Europe awards celebrate those that stand out from the cybersecurity crowd. We find out why Ping Identity were one of those that stood out.
Tripwire's Tim Erlin discusses what's new and what's not new but still important in vulnerability management.
The SC Europe awards are the industry's most prestigious - recognising excellence, technology and innovation in an ever-changing cyber security industry. So what does it take to win one?
The SC Europe awards celebrate the companies, products and people that stand out - for all the right reasons - in the cybersecurity crowd. We find out what endeared the judges to Exabeam this year
SC Media spoke to AlgoSec to discuss today's cloud and hybrid networks, how organisations can use microsegmentation to protect themselves and where AlgoSec sits in this security ecosystem.
(Sponsored by CrowdStrike) Why do cybersecurity breaches continue to dominate the news headlines? Is the security industry losing the battle?
Discussing 'the true value of actionable intelligence', SC Media UK's latest roundtable saw a gathering of senior cyber-security practitioners to discuss actionable threat intelligence.
Barry Scott, CTO, EMEA, Centrify discusses the security vulnerabilities that young people bring to business.
Open banking can best be thought of as a series of reforms that have been changing the way banks handle the financial information of consumers.