Why is there a lack of women in IT security?
Debate: Congress should mandate that the payment card industry adopt safer technology.
Given the recent headline-grabbing breaches, in this month's debate information security professionals discuss whether or not money is safe online.
Experts debate whether the financial industry has a leg up in terms of their cybersecurity strategy when compared to other industries.
Experts debate whether or not organizations should consider hiring hackers with a criminal past.
Chris Weber, co-founder, Casaba Security, and Geoffrey Vaughan, security consultant, Security Compass, go head to head on the use of password managers in the enterprise.
Experts debate whether data in the cloud is more secure than data that's housed on an organization's premises.
While distributed denial-of-service attacks continue to plague organizations around the world, in this month's debate experts discuss whether they should be a top of mind concern for security pros.
In this month's debate, experts discuss the possible issues that the Internet of Things presents for the industry.
In this month's debate, experts discuss whether more guidance on security career opportunities for youths will alleviate the skills gap.
In this month's debate, experts discuss whether the biometrics on Apple's iPhone 5s will evolve the security of personal devices.
In this month's debate, we received a number of responses to our debate topic this month, which covers the NSA's attempts to crack encryption methods.
In this month's debate, experts discuss whether the Computer Fraud and Abuse Act is out of date, and if punishments are disproportionate to offenses.
A number of experts weighed in on this month's debate concerning a statement from DefCon founder Jeff Moss that feds should stay away from DefCon.
Debate: Security training is effective in preventing workers from clicking on malicious links and attachments.August 01, 2013
In this month's debate, two experts discuss whether security training is an effective strategy in the workplace.
Experts in this month's debate discuss Java. Is it time to stop using the popular software?
Experts from SilverSky and Adobe Systems debate on whether or not software developers are incentivized to improve security.
In this month's debate, experts discuss if advanced malware is still a persistent challenge after administrator rights are removed.
In this month's debate, two experts discuss whether or not China is the top cyber threat to the United States.
Debate: The FTC should have the right to penalize companies for poor data security/privacy practices.March 01, 2013
This month's featured debate informs whether the FTC should have the right to penalize companies for poor data security/privacy practices.
This month's debate covers Hacktivist group Anonymous. Will they take a backseat to more extremist groups in 2013?
Comprehensive cyber security legislation (or a presidential executive order) will happen in 2013.
Debate: A White House order on cyber security would be a step in the right direction for safeguarding networks.
Debate: Flame, Stuxnet and other APTs are hype, but you should still be extremely worried.
Debate: In light of recent breaches, passwords remain a useful method for authentication.
Featured Debate: HTML5 is eroding website security.
Debate» Sharing security data is the best way to raise the cost of entry and lower ROI for criminals and spies.
Debate: Identifying the culprits behind Koobface will diminish the gang's activity.
Debate: Anti-virus is essential.
The attack du jour, APTs, or advanced persistent threats, are real threats.
Debate: M&A activity in the cyber security arena will significantly increase in 2012.
Debate: The Stuxnet authors are behind the Duqu trojan.
Debate: The recent arrests of cybercriminals will drive others to think twice before launching attacks.November 01, 2011
Edy Almer, vice president of marketing and business development at Safend debates Rich Baich, principal at Deloitte & Touche.
Operation Shady RAT, a cyberespionage offensive chronicled by McAfee, is a botnet.
Two security experts duke it out over whether organizations should invest in user awareness training.
Debate: Increased penalties for violations of the Computer Fraud and Abuse Act should be enacted into law.August 01, 2011
Debate: Increased penalties for violations of the Computer Fraud and Abuse Act should be enacted into law.
The federal breach notification law, proposed by President Obama, should replace existing state laws.
The U.S. government was justified to take control of Coreflood bot servers.
Debate: Mobile app stores should test and certify before making apps available to customers.
Two sides weigh in on whether so-called do-not-track applications, which monitor consumers' online behavior, should be regulated.
Two sides weigh in on whether the federal government should become involved in the distribution of certifications for security professionals.
Organizations will be better able to handle data breaches in 2011.
Free anti-virus software is as effective in protecting users as a paid solution.
Encryption is better equipped than tokenization to secure data in the cloud.
Hefty prison time for hackers, such as Heartland intruder Albert Gonzalez, is an effective deterrent.July 01, 2010
Users reject security advice because it requires too much effort for too little reward.
This debate pits Don Erickson director, government relations, Security Industry Association (SIA) against Lee Tien, senior staff attorney, Electronic Frontier Foundation (EFF).
Sign up to our newsletters
SC Magazine Articles
- 'MEDJACK' tactic allows cyber criminals to enter healthcare networks undetected
- Samsung devices, including Galaxy S6, vulnerable to remote code execution
- Dridex banking malware spreading through new spam campaign
- U.S., China agree to cybersecurity code of conduct
- Suspicious activity on LastPass network, data compromised
- Former Georgia-Pacific sysadmin charged with damaging protected computers
- Harvard University announces network intrusion, possible data exposure
- Saboteurs leverage RIPv1 for DDoS reflection attacks
- More than 440K new Android malware strains found in Q1, study finds
- Apple releases OS X 10.10.4 and iOS 8.4, numerous bugs addressed