Most Recent Articles by Alan Earls
Even when you've got a breach or an insider gone bad, there are still ways to limit the damage and protect data, reports Alan Earls.
Wearable devices efficiently monitor user activity, but also open new targets for malware authors, reports Alan Earls.
Hardware makers and solutions providers seek to find the right formula for protecting devices - and data, reports Alan Earls.
Targeted events help stake out space for women in the security field, reports Alan Earls.
Adherence to HIPAA, the national law that aims to protect patient information, is about to get trickier, reports Alan Earls.
More Articles by Alan Earls
Sign up to our newsletters
SC Magazine Articles
- Popular adult website XTube compromised, delivers malware
- Android vulnerability leaves apps open to malicious overwriting
- One in three of the top million websites are 'risky,' researchers find
- Orgs predict $53M risk, on average, from crypto key, digital cert attacks
- Hanjuan Exploit Kit leveraged in malvertising campaign
- Report: 71 percent of orgs were successfully attacked in 2014
- Self-deleting malware targets home routers to gather information
- 'PoSeidon' point-of-sale malware targets payment card information
- Amedisys notifies nearly 7,000 individuals of potential breach
- Report: More than 15,000 vulnerabilities in nearly 4,000 applications reported in 2014
- The best defense is a good offense: The importance of securing your endpoints
- British Airways says rewards accounts hacked, locked down
- Documents on NSA's zero-day policy provide little insight, EFF says
- GitHub on DDoS alert, efforts to curb its largest attack continue
- Shadow data: The monster that isn't just under your bed