Experts debate whether or not organizations should consider hiring hackers with a criminal past.
Chris Weber, co-founder, Casaba Security, and Geoffrey Vaughan, security consultant, Security Compass, go head to head on the use of password managers in the enterprise.
Experts debate whether data in the cloud is more secure than data that's housed on an organization's premises.
While distributed denial-of-service attacks continue to plague organizations around the world, in this month's debate experts discuss whether they should be a top of mind concern for security pros.
In this month's debate, experts discuss the possible issues that the Internet of Things presents for the industry.
In this month's debate, experts discuss whether more guidance on security career opportunities for youths will alleviate the skills gap.
In this month's debate, experts discuss whether the biometrics on Apple's iPhone 5s will evolve the security of personal devices.
In this month's debate, we received a number of responses to our debate topic this month, which covers the NSA's attempts to crack encryption methods.
In this month's debate, experts discuss whether the Computer Fraud and Abuse Act is out of date, and if punishments are disproportionate to offenses.
A number of experts weighed in on this month's debate concerning a statement from DefCon founder Jeff Moss that feds should stay away from DefCon.
Debate: Security training is effective in preventing workers from clicking on malicious links and attachments.August 01, 2013
In this month's debate, two experts discuss whether security training is an effective strategy in the workplace.
Experts in this month's debate discuss Java. Is it time to stop using the popular software?
Experts from SilverSky and Adobe Systems debate on whether or not software developers are incentivized to improve security.
In this month's debate, experts discuss if advanced malware is still a persistent challenge after administrator rights are removed.
In this month's debate, two experts discuss whether or not China is the top cyber threat to the United States.
Debate: The FTC should have the right to penalize companies for poor data security/privacy practices.March 01, 2013
This month's featured debate informs whether the FTC should have the right to penalize companies for poor data security/privacy practices.
This month's debate covers Hacktivist group Anonymous. Will they take a backseat to more extremist groups in 2013?
Comprehensive cyber security legislation (or a presidential executive order) will happen in 2013.
Debate: A White House order on cyber security would be a step in the right direction for safeguarding networks.
Debate: Flame, Stuxnet and other APTs are hype, but you should still be extremely worried.
Debate: In light of recent breaches, passwords remain a useful method for authentication.
Featured Debate: HTML5 is eroding website security.
Debate» Sharing security data is the best way to raise the cost of entry and lower ROI for criminals and spies.
Debate: Identifying the culprits behind Koobface will diminish the gang's activity.
Debate: Anti-virus is essential.
The attack du jour, APTs, or advanced persistent threats, are real threats.
Debate: M&A activity in the cyber security arena will significantly increase in 2012.
Debate: The Stuxnet authors are behind the Duqu trojan.
Debate: The recent arrests of cybercriminals will drive others to think twice before launching attacks.November 01, 2011
Edy Almer, vice president of marketing and business development at Safend debates Rich Baich, principal at Deloitte & Touche.
Operation Shady RAT, a cyberespionage offensive chronicled by McAfee, is a botnet.
Two security experts duke it out over whether organizations should invest in user awareness training.
Debate: Increased penalties for violations of the Computer Fraud and Abuse Act should be enacted into law.August 01, 2011
Debate: Increased penalties for violations of the Computer Fraud and Abuse Act should be enacted into law.
The federal breach notification law, proposed by President Obama, should replace existing state laws.
The U.S. government was justified to take control of Coreflood bot servers.
Debate: Mobile app stores should test and certify before making apps available to customers.
Two sides weigh in on whether so-called do-not-track applications, which monitor consumers' online behavior, should be regulated.
Two sides weigh in on whether the federal government should become involved in the distribution of certifications for security professionals.
Organizations will be better able to handle data breaches in 2011.
Free anti-virus software is as effective in protecting users as a paid solution.
Encryption is better equipped than tokenization to secure data in the cloud.
Hefty prison time for hackers, such as Heartland intruder Albert Gonzalez, is an effective deterrent.July 01, 2010
Users reject security advice because it requires too much effort for too little reward.
This debate pits Don Erickson director, government relations, Security Industry Association (SIA) against Lee Tien, senior staff attorney, Electronic Frontier Foundation (EFF).
Debate: Software vendors should "partner" with pirates to fight unlicensed software use.
Sign up to our newsletters
SC Magazine Articles
- Impact of Linux bug 'grinch' spans servers, workstations, Android devices and more
- House, in rush vote, passes Intelligence Authorization Act
- More than 100K WordPress sites compromised by malware due to plugin vulnerability
- Phishing email contains Word doc, enabling macros leads to malware infection
- U.S. accounts for most Mac OS X attacks and websites seeded with malware
- White House calls Sony hack a "serious national security matter," gov't mulls proper response
- 'Spark' shares traits with Alina, JackPOS, uses AutoIt differently
- California nonprofit sues San Diego Police Department over stingray documents
- Critical 'Misfortune Cookie' bug puts millions of internet-connected routers at risk
- Securing the enterprise with the five W's of access