Data breach incident management and recovery
-
News
08 Jan 2026
Personal data of thousands stolen in attack on London councils
The West London council at the centre of a major cyber incident has now started the process of informing residents that their personal data was compromised in the attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
05 Jan 2026
UK government to spend £210m on public sector cyber resilience
The UK government unveils a £120m Cyber Action Plan to help reinforce and promote IT security resilience across the country's public services Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Jul 2011
Securitytube.net releases WLAN security megaprimer
The Hacker News (THN) has reported that the latest SecurityTube.net release includes a 4.2Gb DVD containing over 40+ HD quality videos of their WLAN Security Megaprimer. Continue Reading
By- Stephen Gillies, editor
-
News
05 Jul 2011
ICO issues warning over NHS Data Protection Act breaches
Following five more NHS Data Protection Act violations, the Information Commissioner’s Office will redouble efforts to help NHS improve security. Continue Reading
By -
Tip
21 Jun 2011
Top incident response steps: Incident response team responsibilities
Do you know the proper incident response steps to handle a breach? Expert Davy Winder covers how to manage incident response team responsibilities. Continue Reading
By -
News
01 Jun 2011
World IPv6 Day coming June 8 - what should you be doing?
On 8 June, 2011, a number of large networks will offer their content over IPv6 for a 24-hour “test flight”. Continue Reading
By- Stephen Gillies, Editor
-
News
08 Apr 2011
After breach at RSA, two-factor authentication options abound
Companies specialising in two-factor authentication hope to boost business following the breach of RSA's SecurID, and many plan to capitalise with new products at Infosecurity Europe. Continue Reading
By -
Tip
07 Jan 2011
10 security incident management best practices
Here’s a quick tip on the security incident management processes an organization should adopt to combat the current dynamic threat scenario. Continue Reading
By- Dinesh Bareja
-
News
01 Dec 2010
Phishing attack on Facebook leverages iframes
Popular social networking site, Facebook being used for phishing attacks and open redirects, claims Websense Security Labs. Continue Reading
By- SearchSecurity.IN Staff
-
News
11 Feb 2008
penetration testing tutorial day one the basics
TechTarget ANZ expert Ed Eliff explains botnets and offers advice on how to make sure your machines do not get get caught up in one. Continue Reading
By- Ed Eliff, Contributor
-
Tip
15 Aug 2007
How to test Snort
VARs should test Snort to ensure the open source IDS is detecting malicious activity. Continue Reading
