Editorial

Sidestepping the humdrum

By

Among the humdrum there are cyber events cropping up here and there that breed excitement.

Just get on with it already

By

Offering up more general guidelines to strengthen the country's critical infrastructure security - as in the president's recent executive order - is all well and good, but without any meaningful and enforceable requirements then, really, what's the point?

Of crime and punishment

Of crime and punishment By

I was dismayed and disturbed by the suicide of Aaron Swartz, which only added to well-rooted revulsion for the relentlessness of legal actions against him.

Starting the year off with a...bang?

Starting the year off with a...bang? By

As we start 2013 off, I'm pretty sure that information security leaders everywhere are glad to hear all those predictions about their budgets getting a boost this year (and that the Mayans were wrong).

The classic fairy tale gone cyber

The classic fairy tale gone cyber By

From stealthy to blatant tactics, 2012 has seen them all.

When less isn't more

When less isn't more By

Among the some 400 attendees at last month's SC Congress New York, fears bandied about crossed various spectrums.

Wyndham resorts to laughable litigation

Wyndham resorts to laughable litigation By

Isn't Wyndham Hotels and Resorts culpable for failing to enlist industry standards and implement security practices and tools to protect customer accounts?

Big egos block important cyber bill

Big egos block important cyber bill By

President Obama now is considering an executive order to breathe some life back into the Cyber Security Act of 2012 with the goal in mind to protect the country's critical infrastructure.

Staying out of the headlines

Staying out of the headlines By

Yahoo presumably took no measures to ensure sensitive stuff like customer account credentials were kept safe and sound.

Preparing for a post-Flame world

Preparing for a post-Flame world By

The latest evidence of cyber espionage weaponry could be a harbinger of nation-state assaults to come.

How mobile security breeds concern for companies

How mobile security breeds concern for companies By

Mobile security problems continue to vex many an IT security officer.

ID thieves find gold in medical data

ID thieves find gold in medical data By

Is health care a last frontier for today's cyber criminals?

Evolutionary conundrums...

Evolutionary conundrums... By

There are a whole host of things driving budget, resources and tweaks to security/risk management programs.

Stern oversight in the United States

Stern oversight in the United States By

U.S. agencies argue that monitoring social media will arm them with "situational awareness" to thwart potential attacks.

The apple doesn't fall far from the tree

The apple doesn't fall far from the tree By

The FTC settled a case with Upromise after it failed to encrypt information and provide details about its data collection practices.

Ascending the ladder, rung by rung: Data breach prevention

Ascending the ladder, rung by rung: Data breach prevention By

Nearly two-thirds of respondents to our fifth annual "Guarding Against a Data Breach" survey say their budgets related to IT security and data protection will remain the same this year.

Summing up the year that was

Summing up the year that was By

At no time in our history have we seen individuals and organizations so dependent on IT.

Health care must respond to shortfalls

Health care must respond to shortfalls By

Security experts believe that robust risk management programs should be a pillar of business planning, says SC Magazine Editor-in-Chief Illena Armstrong.

The art of this war is changing

The art of this war is changing By

Being prepared, yet nimble, is key to a well-designed mission, says Illena Armstrong, SC Magazine's editor-in-chief.

A flight or fight response?

A flight or fight response? By

Transparency after a breach does more than save face.

Accounting for transaction assurance

Accounting for transaction assurance By

With data breaches becoming an everyday occurrence, technologies that help to minimize online fraud are more indispensable than ever, says Illena Armsttrong, editor-in-chief, SC Magazine.

You might be next: Data breaches

You might be next: Data breaches By

CISOs must concede they eventually will see their infrastructures compromised.

Finding a cure for breach fatigue

Finding a cure for breach fatigue By

There probably always will be some indifference to breach notifications, but I'd like to hope that today's average, technology-reliant consumer isn't blissfully trusting that businesses and the government have their best interests in mind.

What to learn from the RSA breach

What to learn from the RSA breach By

The recent social engineering attack on RSA has dominated industry talk, with some dubbing coverage of the incident a media circus.

Are you ready for some action?

Are you ready for some action? By

Despite the lip service given to the nebulous concept of partnerships between public and private entities, what really has seen the light of day?

Are things getting brighter...or not?

Are things getting brighter...or not? By

Executives are poised to accept the additional expenses required to deploy evolved security solutions as they experience cost savings and increased productivity by relying on the cloud or mobile devices.

An accounting of the insiders

An accounting of the insiders By

No matter your view of Julian Assange, his WikiLeaks controversy is the story that just keeps on giving, says Illena Armstrong, editor-in-chief, SC Magazine.

Data Breach Survey: Getting the bosses on board

Data Breach Survey: Getting the bosses on board By

One of the findings in SC Magazine's fourth annual "Guarding Against a Data Breach" survey is that you can get compliant with a sound security program in place, but you might not necessarily get security with a compliance-based plan.

Keep upward swings going and going and going...

Keep upward swings going and going and going... By

With people out of work, insider threats spike and budgets often plummet, says Illena Armstrong.

Fending off cyberwar attacks

Fending off cyberwar attacks By

Chicken Little could relate to the likely thoughts of all those cybersecurity players who have warned time-and-again that it isn't a matter of 'if' cyberwar would occur but 'when.'

Calvin Broadus against cybercrime

Calvin Broadus against cybercrime By

Snoop Dogg reportedly told a group of reporters on a Symantec 18-wheeler, no less, that he's "not with" online crime.

Will a federal data breach bill help?

Will a federal data breach bill help? By

Yet another data breach notification law at the federal level has been introduced into the U.S. Congress.

Taking bets on secure code

Taking bets on secure code By

A company new to the information security marketplace is reportedly outsourcing its software development for both its consumer and enterprise security solutions to programmers in China.

Changes to celebrate the industry

Changes to celebrate the industry By

The SC Magazine Awards have been going strong for years now.

Cautiously optimistic on cyber chief

Cautiously optimistic on cyber chief By

Optimism, no matter how dosed with skepticism, feels right following the appointment of Howard Schmidt as the nation's cyber coordinator, says SC Magazine Editor-in-Chief Illena Armstrong.

Security news tailored to your needs

Security news tailored to your needs By

Whatever it is you're looking for, we're hoping you'll find it either in the pages of the magazine or on our website.

Getting wise to continuing education

Getting wise to continuing education By

Education, whether through a university, a professional industry body or a long-standing private organization is essential, says Editor-in-Chief Illena Armstrong.

In support of rights to privacy

In support of rights to privacy By

A balance between basic civil rights and national security must be struck

Educating the workforce and beyond

Educating the workforce and beyond By

Awareness training really can help to make security a part of corporate cultures.

"This is ourselves under pressure"

"This is ourselves under pressure" By

Just as Queen and David Bowie were in 1981, chief information security officers today are under pressure. Surprise, surprise, right?

Don't despair, the best is yet to come

Don't despair, the best is yet to come By

With the start of our next year, we're looking for some signs of revitalization.

Look how far we've come

Look how far we've come By

We and the industry of which we are a contented part, have flourished over these last 20 years.

Leaving users unscathed after M&A

Leaving users unscathed after M&A By

Information security as an industry sees a profusion of mergers and acquisitions. But one interesting effect from it is the need to re-evaluate the variety of business practices under which each individual business once operated before the transaction, so that refinements and more sweeping changes can be implemented and followed after they merge.

Working together...like the bad guys

Working together...like the bad guys By

In this month's cover story, we hear from one of our SC World Congress keynote speakers, Heartland Payment System's CEO Robert Carr

Is the U.S. lagging in the cyberworld?

Is the U.S. lagging in the cyberworld? By

Government entities are likely ill-prepared for a coordinated cyberattack.

Pros and cons of user-driven content

Pros and cons of user-driven content By

Preventing access to Web 2.0 sites altogether isn't the right move.

Is the CISO gaining influence?

Is the CISO gaining influence? By

Information security is still in its formative years. But, as executive leaders' understanding of the need to integrate security strategies into their business plans matures, the IT security professional's role presumably expands in importance. As it turns out, such an evolution is happening in some organizations

Infrastructure security: Power to the people

Infrastructure security: Power to the people By

Congress needs to do what's necessary to help NERC call electric power officers to task and get the power systems they own and operate secured as fully as possible.

Security positions vacant at fed level

Security positions vacant at fed level By

A leader is needed, deft at working with private companies, to protect critical data.

Can you be PCI compliant & secure?

Can you be PCI compliant & secure? By

Meant to secure all cardholder data that companies touch, PCI DSS has been perceived as both a blessing and a curse.

Sign up for our newsletters

POLL