U.S. workers roll the dice by gambling on their company phone

Employees love to gamble with their employer's internet security by installing potentially vulnerable gambling apps on their company issued mobile devices, according to a report by Veracode.

Young hackers: Criminal or innovator?

Youthful mischief online can wreak havoc for offenders. Can IT security community leaders provide alternatives?

U.S. officials may impose sanctions against Russia, China for cyber attacks

Recent cyberattacks have left U.S. officials mulling economic sanctions as retaliation against Russia and China.

Baby monitor vulnerabilities bring IoT security issues into sharp focus

Research from Rapid7 uncovered vulnerabilities in video baby monitors that could provide a pathway to compromise other devices and networks that link to business resources.

Online exclusive

Emerging Products: Cloud Security, Part 2

In part two of our cloud security emerging products we see a little shift in product types. This time we see more emphasis on protecting the data. The bulk of these products and services address rather prosaic challenges in innovative ways. Click here.

Featured: Finance

Barclays first bank to accept bitcoin

After conducting London-based tests on bitcoin, Barclays will let people begin to make charitable contributions using the virtual currency.

September issue now available

Product Reviews


This product is the poster child for next-generation anti-malware.

DeviceLock Endpoint DLP Suite

The Swiss Army knife of endpoint security.

ESET Endpoint Security

ESET Endpoint Security is one of the products that does a lot of different functions.


Opinions Me and my job: David F. Katz

Me and my job: David F. Katz

David F. Katz, partner, Nelson Mullins


Debate: Device manufacturers take a comprehensive approach to securing consumer products.

Debate: Device manufacturers take a comprehensive approach to securing consumer products.

Opinions The accountability gap

The accountability gap

As mobile and cloud dominate the future of the enterprise, security and accountability are falling through the cracks.

Opinions "Dead apps"

"Dead apps"

The mobile malware threat is mostly based on hype, not facts.

Me and my job

CSOs: We'd like to profile one of your IT team members
This section gives you an opportunity to call out one of your star team members, whose picture and responses would appear in SC Magazine.

Click here for more information.

Sign up to our newsletters