There is no question about the acceleration of data migrating to the cloud. But which cloud? All clouds: a mix of Infrastructure-, Platform- and Software-as-a-Service cloud models are being deployed by almost every organization.
id you know that forty-six percent of IT knows or suspects employees are using their individual, non-IT approved cloud accounts to store corporate data?
The FTC Chairwoman cites 50 cases the commission has settled, including recent agreements with Fandango and Credit Karma.
After some experience with the European EMV "chip-and-PIN" card system while on vacation, the city of New York's CISO learned something about security: Don't take it for granted.
Dan Kaplan, executive editor of SC Magazine, sits with Yogen Edholm, CEO of Accellion Inc., to discuss mobility in the workplace in this insightful In Focus video.
Perhaps Facebook users are beginning to expect more consideration from their friends on social networks.
When it comes to the causes of data breaches in health care, these are four scenarios that could have easily been prevented.
With data proliferating at astonishing rates, organizations are tearing into it, hoping to derive new business value, which, according to Zions CSO Preston Wood, includes better security decision making.
The Personal Data Protection and Breach Accountability Act of 2011 would require businesses with data of more than 10,000 customers to implement privacy and security programs.
With the April 18 tax deadline looming, security isn't top-of-mind for the employees in your finance, audit and operations departments.
Data breaches cost organizations $7.2 million on average in 2010, up seven percent from $6.8 million the previous year, according to a new study.
Organizations must consider security at the network, application, host and data layers to most effectively protect against threats.
There was broad general support for establishing high standards of data security at a public forum convened by the Office of the Privacy Commissioner, but most respondents do not feel that the government should take the lead.
Microsoft late Friday issued a security advisory confirming the existence of an unpatched vulnerability that affects web applications built on ASP.NET.
Should violations of corporate computer use policy be a federal crime, asks Charles Jeter, ESET cybercrime investigator.
The effects of last year's regulatory changes have already begun to surface, reports Angela Moscaritolo.
Sign up to our newsletters
SC Magazine Articles
- 'MEDJACK' tactic allows cyber criminals to enter healthcare networks undetected
- Samsung devices, including Galaxy S6, vulnerable to remote code execution
- Dridex banking malware spreading through new spam campaign
- U.S., China agree to cybersecurity code of conduct
- Suspicious activity on LastPass network, data compromised
- Former Georgia-Pacific sysadmin charged with damaging protected computers
- Harvard University announces network intrusion, possible data exposure
- Saboteurs leverage RIPv1 for DDoS reflection attacks
- More than 440K new Android malware strains found in Q1, study finds
- Apple releases OS X 10.10.4 and iOS 8.4, numerous bugs addressed