-
Cybergeddon unlikely, say experts
Cybergeddon, a complete takedown of the internet, is within the power of some nation states, but unlikely, say security industry experts
-
Public sector leads on social media use, says KPMG
The private sector’s failure to adapt to the demands of social media poses a threat to the bottom line and reputation
-
Zero-day exploit for Yahoo Mail goes on sale
Hacker sells $700 zero-day exploit for Yahoo Mail that allows attacker to use cross-site scripting vulnerability to steal cookies and hijack accounts
-
Google among firms hit in Pakistan hack
Technology firms including Google, Apple, eBay and Yahoo were among almost 300 companies whose websites were hit by Pakistan hack attack
-
IT in Europe: Taking control of smartphones
Explore key strategies for mitigating the ever-growing risks of your mobile devices before it’s too late!
Special Presentation
-
2012 Royal Holloway information security thesis series
Topics include the risks of multi-tenancy cloud computing, defences against XSS, and theories for designing a secure contactless payment system.
-
Learning Guide
Privacy and electronic communications regulations: Guide to EU cookie compliance
Get advice for implementing PECR regulations requiring website owners to request users’ permission to place a tracking cookie.
-
Magazine
IT in Europe: e-zine
Regain control of BYODExplore how mobile device management (MDM) technology can help control the onslaught of employee-owned devices in the enterprise and enable you to enforce mobile security policies.
-
Journey to the cloud: three perspectives
Given the phone hacking scandal, it’s unusual to find News Corp and the Metropolitan Police in the same room these days, but it happened this week when representatives from both organisations, plus one from the BBC, shared a platform to discuss their plans for the cloud. The three people were on a pa...
-
More blog posts
-
DON'T MISS
Report on UK cybercrime statistics reveals culprits and responders
Cybercrime is on the rise in UK businesses, but companies are doing little to protect themselves against it. This must-read resource uncovers what you can do to limit the effects of cybercrime and other forms of online fraud.
ACCESS HERE! -
RECOMMENDED
Project collaboration tools: Web security policy for B2B collaboration
Project collaboration tools are easy for users to set up. Securing them, however, takes a bit more time and effort.
Access this complimentary resource now and gain expert insight into securing your collaboration tools today.
ACCESS THIS POPULAR TIP HERE