LATEST NEWS

Potential breach brews at Costa Coffee Club

Costa Coffee has warned its loyalty club members of a potential breach and will reset all passwords as well as use a new format for passwords.

Former GCHQ director tapped for Standard Chartered's risk committee

Former GCHQ director Sir Iain Lobban will be joining London-based Standard Chartered bank to prevent cybercrime.

Stored XSS bug in WordPress, researchers advise to disable comments

A stored cross-site scripting (XSS) vulnerability impacting current WordPress versions has been identified by a researcher with Finnish IT company Klikki Oy.

Angler Exploit Kit pushed in xHamster malvertising campaign

The malicious advertisement was spotted on Friday and taken down by the end of Saturday, according to Malwarebytes Labs.

FEATURED: Cyber Security

Study: Conficker declared top threat of 2014, but N. America targeted mainly by AnglerEK

F-Secure Labs released a threat report for the last half of 2014 and found that North America wasn't receiving the brunt of Conficker attacks, as opposed to other parts of the world.

SC Awards 2015 Winners

Congratulations to the winners of this year's SC Awards. Winners received acknowledgement and placques at the annual SC Awards gala held in San Francisco on Tuesday. For the winners and finalists of the SC Awards 2015, take a look at our Book of the Night.




Product Reviews

RSA Authentication Manager

starstarstarstarstar
The RSA Authentication Manager is a dual-factor authentication system designed from the ground up for enterprise deployment.

SecureAuth IdP

starstarstarstarstar
SecureAuth IdP is an identity provider – with a unique approach to securing user access control.

Swivel Secure Swivel Appliance

starstarstarstarstar
The Swivel Appliance is a competitive solution for two-factor authentication methods for clients searching for a secure product.

OPINIONS

Why cybersecurity is vital during the vendor selection process

Why cybersecurity is vital during the vendor selection process

You likely have a list of criteria to check through during the hiring process of a vendor, but if you haven't added cybersecurity standards to that list, you should.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US