A question of balance between security solutions and the people who use it

Most network security professionals agree that there's no such thing as a perfect system. But that's not what keeps them up at night.

Court tosses suit against UCLA health system over exposed patient data

A court tossed out a $1.2 million lawsuit filed by Norma Lozano against UCLA Health System after her medical information was accessed and distributed without authorization.

Fayetteville, N.C., teen faces five felony charges for sexting

A Fayetteville, N.C., teenager is facing five felony charges for possessing nude photos of himself and one sent by his girlfriend.

Malware attacks hit UK site

Security researchers have discovered malicious adverts on the UK version of dating site

Online exclusive

Emerging Products: Cloud Security, Part 2

In part two of our cloud security emerging products we see a little shift in product types. This time we see more emphasis on protecting the data. The bulk of these products and services address rather prosaic challenges in innovative ways. Click here.

Featured: Cyber Attacks

Anonymous group launches phase of cyber-attacks against IS

Anonymous has launched another online battle against members of the Islamic State group.

September issue now available

Product Reviews


This product is the poster child for next-generation anti-malware.

DeviceLock Endpoint DLP Suite

The Swiss Army knife of endpoint security.

ESET Endpoint Security

ESET Endpoint Security is one of the products that does a lot of different functions.


Opinions Me and my job: David F. Katz

Me and my job: David F. Katz

David F. Katz, partner, Nelson Mullins


Debate: Device manufacturers take a comprehensive approach to securing consumer products.

Debate: Device manufacturers take a comprehensive approach to securing consumer products.

Opinions The accountability gap

The accountability gap

As mobile and cloud dominate the future of the enterprise, security and accountability are falling through the cracks.

Opinions "Dead apps"

"Dead apps"

The mobile malware threat is mostly based on hype, not facts.

Me and my job

CSOs: We'd like to profile one of your IT team members
This section gives you an opportunity to call out one of your star team members, whose picture and responses would appear in SC Magazine.

Click here for more information.

Sign up to our newsletters