KPMG survey: 4 out of 5 health execs say company data has been compromised

A KPMG Health Care and Cyber Security report found that four-fifths of execs said their data has been compromised in cyber attacks.

Linux Foundation publishes best practices for secure workstations

The Linux Foundation (LF) gave internet users a peek into its employees' security practices in a Github post this past week that details their various techniques for maintaining secure workstations.

iOS malware targets jailbroken devices, compromises 225K Apple accounts

KeyRaider malware is stealing valid Apple accounts, and the compromised credentials are being actively abused as part of another seemingly related threat.

Fraudsters using credentials harvested from massive breaches, study finds

Digital identities are being exploited on a routine basis by sophisticated cybercriminals, says a just released ThreatMetrix study.

Online exclusive

Emerging Products: Cloud Security, Part 2

In part two of our cloud security emerging products we see a little shift in product types. This time we see more emphasis on protecting the data. The bulk of these products and services address rather prosaic challenges in innovative ways. Click here.

Featured: Malware

Scanner identifies thousands of malicious Android apps on Google Play, other markets

A team of researchers created an app vetting scanner referred to as "MassVet," and used it to identify 127,429 malicious apps on 33 Android markets.

Women In IT Security Issue - Available Now

Product Reviews

Adallom Cloud Application Security Platform

This cloud access security broker supports a huge number of cloud applications and is simple to deploy and seamless to users.

Alert Logic Cloud Defender

This suite of tools from Alert Logic protects data in multiple locations, including on-premises.

Bitglass Enterprise Edition BEE

The heart of Bitglass Enterprise Edition (BEE) is digital rights management (DRM).


Opinions 10 Reasons You Need to Test, Not Guess

10 Reasons You Need to Test, Not Guess

How you are securing your sensitive information should not be a guessing game

Opinions To thine own self be true

To thine own self be true

Much needs to be done to convince boardrooms of the importance of information security.

Opinions IT only guards the front gate

IT only guards the front gate

It's time for a dramatic reimagining of how companies approach security.

Opinions Data exfiltration defense

Data exfiltration defense

A single solution won't stop data theft, says ADP's Roland Cloutier.

Me and my job

CSOs: We'd like to profile one of your IT team members
This section gives you an opportunity to call out one of your star team members, whose picture and responses would appear in SC Magazine.

Click here for more information.

Sign up to our newsletters