Audit report finds sensitive data at risk for at least 73 Callif. agencies

Sensitive data of California residents including, social security numbers, health records, and income tax information vulnerable

License plate reader helps spot Virginia killer, but privacy issues remain

Virginia killer Vester Lee Flanagan II, a.k.a., Bryce Williams was tracked down Wednesday with the help of a license plate reader Wednesday, but larger issues surrounding security and individual freedom still worry privacy advocates.

Researchers uncover possible Iranian-backed phishing scam

Canadian researchers at Citizen Lab released a report today describing a phishing campaign being conducted against Iranian dissidents and how utilizing a two-factor authentication (2FA) tool helped foil most of the attacks.

Car industry bands together to thwart hacking threats

Automakers are banding together to help guard against and mitigate a new breed of cyberattack targeting on-board computer systems.

Online exclusive

Emerging Products: Cloud Security, Part 2

In part two of our cloud security emerging products we see a little shift in product types. This time we see more emphasis on protecting the data. The bulk of these products and services address rather prosaic challenges in innovative ways. Click here.

Featured: Vulnerability

Zero-Day, Angler kit exploits help drive up malvertising by 325%

Cyphort Labs's latest study on malvertising indicates a massive uptick with this form of attack has taken place over the last few years driven, in part, by the proliferation of zero-day and Angler kit exploits.

Women In IT Security Issue - Available Now

Product Reviews

Adallom Cloud Application Security Platform

This cloud access security broker supports a huge number of cloud applications and is simple to deploy and seamless to users.

Alert Logic Cloud Defender

This suite of tools from Alert Logic protects data in multiple locations, including on-premises.

Bitglass Enterprise Edition BEE

The heart of Bitglass Enterprise Edition (BEE) is digital rights management (DRM).


Opinions 10 Reasons You Need to Test, Not Guess

10 Reasons You Need to Test, Not Guess

How you are securing your sensitive information should not be a guessing game

Opinions To thine own self be true

To thine own self be true

Much needs to be done to convince boardrooms of the importance of information security.

Opinions IT only guards the front gate

IT only guards the front gate

It's time for a dramatic reimagining of how companies approach security.

Opinions Data exfiltration defense

Data exfiltration defense

A single solution won't stop data theft, says ADP's Roland Cloutier.

Me and my job

CSOs: We'd like to profile one of your IT team members
This section gives you an opportunity to call out one of your star team members, whose picture and responses would appear in SC Magazine.

Click here for more information.

Sign up to our newsletters