Most network security professionals agree that there's no such thing as a perfect system. But that's not what keeps them up at night.
A court tossed out a $1.2 million lawsuit filed by Norma Lozano against UCLA Health System after her medical information was accessed and distributed without authorization.
A Fayetteville, N.C., teenager is facing five felony charges for possessing nude photos of himself and one sent by his girlfriend.
Security researchers have discovered malicious adverts on the UK version of dating site Match.com.
Data Breach Blog
Emerging Products: Cloud Security, Part 2
In part two of our cloud security emerging products we see a little shift in product types. This time we see more emphasis on protecting the data. The bulk of these products and services address rather prosaic challenges in innovative ways. Click here.
Featured: Cyber Attacks
Anonymous has launched another online battle against members of the Islamic State group.
David F. Katz, partner, Nelson Mullins
Debate: Device manufacturers take a comprehensive approach to securing consumer products.
As mobile and cloud dominate the future of the enterprise, security and accountability are falling through the cracks.
The mobile malware threat is mostly based on hype, not facts.
Me and my job
Click here for more information.
Sign up to our newsletters
SC Magazine Articles
- Nearly 90 percent of Android devices vulnerable to endless reboot bug
- Women in IT Security: 10 Power Players
- Scanner identifies thousands of malicious Android apps on Google Play, other markets
- Report: Phishing costs average organization $3.7 million per year
- Women in IT Security: Women of influence