LATEST NEWS

Security issues remain as bio implants gain acceptance

In a story seemingly straight out of a scfi novel, Kaspersky Labs implanted a 2mm sub-dermal microchip into the hand of one of its employees that can carry a plethora of personal data, and like all such devices, can be hacked.

Outdated websites deliver TeslaCrypt via Neutrino Exploit Kit: Heimdal

Heimdal Security reported an increase in malicious scripts infecting legitimate websites that then redirect the victim to the Neurtino exploit kit server that could potentially impact more than 400 million web users.

Scammers and schemers look to cash in on Ashley Madison breach

Blackmailers are seeking money in exchange for not releasing data, and scammers are offering services that supposedly remove Ashley Madison data.

HP pulls sponsorship of hacking contest over Wassenaar Arrangement

Hewlett-Packard pulled its sponsorship of the Pwn2Own hacking competition this year over confusion about the Wassenaar Arrangement and difficulty in meeting its standards.

Online exclusive

Emerging Products: Cloud Security, Part 2

In part two of our cloud security emerging products we see a little shift in product types. This time we see more emphasis on protecting the data. The bulk of these products and services address rather prosaic challenges in innovative ways. Click here.

Featured: Cyber Attacks

Anonymous group launches phase of cyber-attacks against IS

Anonymous has launched another online battle against members of the Islamic State group.

September issue now available

Product Reviews

CylancePROTECT

starstarstarstarstar
This product is the poster child for next-generation anti-malware.

DeviceLock Endpoint DLP Suite

starstarstarstarstar
The Swiss Army knife of endpoint security.

ESET Endpoint Security

starstarstarstarstar
ESET Endpoint Security is one of the products that does a lot of different functions.

Opinion

Opinions Me and my job: David F. Katz

Me and my job: David F. Katz

David F. Katz, partner, Nelson Mullins

Opinions

Debate: Device manufacturers take a comprehensive approach to securing consumer products.

Debate: Device manufacturers take a comprehensive approach to securing consumer products.

Opinions The accountability gap

The accountability gap

As mobile and cloud dominate the future of the enterprise, security and accountability are falling through the cracks.

Opinions "Dead apps"

"Dead apps"

The mobile malware threat is mostly based on hype, not facts.

Me and my job

CSOs: We'd like to profile one of your IT team members
This section gives you an opportunity to call out one of your star team members, whose picture and responses would appear in SC Magazine.

Click here for more information.



Sign up to our newsletters

RECENT COMMENTS

FOLLOW US