CSA, (ISC)² create new cloud certification

A new Certified Cloud Security Professional (CCSP) certification is aimed at certifying those with the advanced skills need to keep the cloud secure.

Potential breach brews at Costa Coffee Club

Costa Coffee has warned its loyalty club members of a potential breach and will reset all passwords as well as use a new format for passwords.

U.S. Defense Secretary Carter emphasizes culture change needed to hire fresh tech talent

During a speech at Stanford University this past week, U.S. Defense Secretary Ash Carter acknowledged the government's desire to hire young talent for cybersecurity work.

Former GCHQ director tapped for Standard Chartered's risk committee

Former GCHQ director Sir Iain Lobban will be joining London-based Standard Chartered bank to prevent cybercrime.

FEATURED: Cyber Security

Study: Conficker declared top threat of 2014, but N. America targeted mainly by AnglerEK

F-Secure Labs released a threat report for the last half of 2014 and found that North America wasn't receiving the brunt of Conficker attacks, as opposed to other parts of the world.

SC Awards 2015 Winners

Congratulations to the winners of this year's SC Awards. Winners received acknowledgement and placques at the annual SC Awards gala held in San Francisco on Tuesday. For the winners and finalists of the SC Awards 2015, take a look at our Book of the Night.

Product Reviews

RSA Authentication Manager

The RSA Authentication Manager is a dual-factor authentication system designed from the ground up for enterprise deployment.

SecureAuth IdP

SecureAuth IdP is an identity provider – with a unique approach to securing user access control.

Swivel Secure Swivel Appliance

The Swivel Appliance is a competitive solution for two-factor authentication methods for clients searching for a secure product.


Why cybersecurity is vital during the vendor selection process

Why cybersecurity is vital during the vendor selection process

You likely have a list of criteria to check through during the hiring process of a vendor, but if you haven't added cybersecurity standards to that list, you should.

Sign up to our newsletters