LATEST NEWS

Study: Conficker declared top threat of 2014, but N. America targeted mainly by AnglerEK

F-Secure Labs released a threat report for the last half of 2014 and found that North America wasn't receiving the brunt of Conficker attacks, as opposed to other parts of the world.

RSA 2015: In the healthcare industry, security must innovate with business

Legislation, mobility and personalization are forces driving healthcare in the U.S., Frank Kim said at RSA Conference 2015.

RSA 2015: Unintended use of aircraft systems next challenge for counterterrorism community

The counterterrorism, security and aviation communities must contemplate how unintended use of aircraft systems or networks could have a downstream impact.

Microsoft expands bug bounty program to include Project Spartan

Microsoft announced plans on Wednesday to on expand its bug bounty program to include Project Spartan, the company's new browser, and Azure, the company's cloud platform.

FEATURED: Cyber Security

An SEC commissioner's chief of staff and shareholder advocacy expert discussed complex disclosure expectations among investors.

SC Awards 2015 Winners

Congratulations to the winners of this year's SC Awards. Winners received acknowledgement and placques at the annual SC Awards gala held in San Francisco on Tuesday. For the winners and finalists of the SC Awards 2015, take a look at our Book of the Night.




Product Reviews

Cyphercor LoginTC

starstarstarstar½
LoginTC from Cyphercor is a cloud-based solution that uses a mobile device or a desktop for authentication. It has easy-to-use iOS, Android and Chrome desktop applications to approve logins to a variety of products.

Entrust IdentityGuard

starstarstarstar½
Entrust IdentityGuard is a dual-factor authentication server, app, smart card manager, biometrics server and general jack-of-all-trades when it comes to dual-factor authentication.

PistolStar PortalGuard

starstarstarstarstar
PortalGuard is a multifactor authentication, web-based single sign-on (SSO) through internet information services (IIS) and self-service password reset server and application rolled into one.

OPINIONS

Why cybersecurity is vital during the vendor selection process

Why cybersecurity is vital during the vendor selection process

You likely have a list of criteria to check through during the hiring process of a vendor, but if you haven't added cybersecurity standards to that list, you should.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US