April 2016 Issue of SCMagazine UK

April 2016 Issue of SCMagazine UK

Cyber-attacks are getting larger, faster, and more diverse, making them increasingly complex to identify and mitigate. But at the same time, businesses are collecting vast amounts of security data - far too much for a human to analyse and turn into something useful.

Spring 2016 digital edition

Group Test

Actionable intelligence and active breach detection

Active breach detection and cyber deception are not only emerging product types, they also come at a time when breach activity never has been worse, ...

Attivo BOTsink

This is a high interaction honeypot on steroids.


This product – with its objective of defeating persistent malware – is a fit for active breach detection.

Fidelis XPS

There really is little, if anything, that XPS cannot do in the digital forensics detection, analysis, prevention and response arena.

GuardiCore Data Centre Security Suite

The GuardiCore suite exhibits characteristics of both active breach detection and threat deception plus a whole lot more.

Rapid7 UserInsight

Rapid7 has been in the vulnerability game for a long time and now have gotten into the active detection game.


Movers & Makers: Spring 2016

Recent updates on the people and organisations that make up the information security industry

2 Minutes On: DROWNing in SSL2 connection requests - the web's latest large-scale vulnerability

One of the latest large scale web vulnerabilities, dubbed DROWN (Decrypting RSA with Obsolete and Weakened Encryption), again targets SSL.


Domestic spying internationally: Three years after Snowden

Nearly three years on and the world still finds itself tackling the consequences of the Snowden disclosures reports Max Metzger

Using big data to uncover Deviant Behaviour

Cyber-attacks are getting larger, faster and more diverse, making them increasingly complex to identify and mitigate. But at the same time, as Kate O'Flaherty reports, ...

Encryption delivers quantum of solace

Data creation and transmission is growing exponentially, with 2.8 zettabytes of data created in 2012, forecast to reach 40 zettabytes (ZB) by 2020 (IDC), and ...

Is Privacy at Risk?

Privacy is dependent on security while security is dependent on confidentiality, a special case of privacy. This is as true today, in the information age, ...

ID & access: Halt, who goes there?

Evolving ID and access management options have gone from central control of a rigid boundary to multiple ID options, distributed assets, IoT machine ID and ...


Last Word: GDPR could help Europe take the lead for breach notification

Companies operating in Europe have until 2018 to comply with compulsory breach notification under the EU GDPR or face heavy fines, but Gant Redmon says ...