LATEST NEWS

U.S. officials may impose sanctions against Russia, China for cyber attacks

Recent cyberattacks have left U.S. officials mulling economic sanctions as retaliation against Russia and China.

Baby monitor vulnerabilities bring IoT security issues into sharp focus

Research from Rapid7 uncovered vulnerabilities in video baby monitors that could provide a pathway to compromise other devices and networks that link to business resources.

The creator of PGP doesn't use PGP, spurring discussion

The creator of PGP, Phil Zimmerman, said he doesn't use PGP because it isn't compatible with his MacBook, and the security community began talking about what this means for broader encryption efforts.

Fortinet addresses four vulnerabilities in FortiClient

Fortinet has released a firmware update for its endpoint security solution FortiClient in order to address four vulnerabilities reported by Core Security.

Online exclusive

Emerging Products: Cloud Security, Part 2

In part two of our cloud security emerging products we see a little shift in product types. This time we see more emphasis on protecting the data. The bulk of these products and services address rather prosaic challenges in innovative ways. Click here.

Featured: Finance

Barclays first bank to accept bitcoin

After conducting London-based tests on bitcoin, Barclays will let people begin to make charitable contributions using the virtual currency.

September issue now available

Product Reviews

CylancePROTECT

starstarstarstarstar
This product is the poster child for next-generation anti-malware.

DeviceLock Endpoint DLP Suite

starstarstarstarstar
The Swiss Army knife of endpoint security.

ESET Endpoint Security

starstarstarstarstar
ESET Endpoint Security is one of the products that does a lot of different functions.

Opinion

Opinions Me and my job: David F. Katz

Me and my job: David F. Katz

David F. Katz, partner, Nelson Mullins

Opinions

Debate: Device manufacturers take a comprehensive approach to securing consumer products.

Debate: Device manufacturers take a comprehensive approach to securing consumer products.

Opinions The accountability gap

The accountability gap

As mobile and cloud dominate the future of the enterprise, security and accountability are falling through the cracks.

Opinions "Dead apps"

"Dead apps"

The mobile malware threat is mostly based on hype, not facts.

Me and my job

CSOs: We'd like to profile one of your IT team members
This section gives you an opportunity to call out one of your star team members, whose picture and responses would appear in SC Magazine.

Click here for more information.



Sign up to our newsletters

RECENT COMMENTS

FOLLOW US