Features

Beyond BYOD

Beyond BYOD By

The ever-increasing use of personal devices has tested enterprise defenses, so plans must be created to meet the challenge, reports James Hale.

Deciphering cloud strategy

Deciphering cloud strategy By

There are steps security pros can take to achieve greater peace of mind with cloud implementations, reports Alan Earls.

Urgent care: Safeguarding data at health care providers

Urgent care: Safeguarding data at health care providers

Health providers have pressing reasons to now embrace security, says INTEGRIS Health's John Delano. Karen Epper Hoffman reports.

Suspect everything: Advanced threats in the network

Suspect everything: Advanced threats in the network By

Are there ways to catch sophisticated malware that hides in trusted processes and services? Deb Radcliff finds out.

Book of the night

Book of the night By

Our program profiling the winners and finalists of the 2013 SC Awards U.S., held Feb. 26 in San Francisco.

CSO of the Year: John South, Heartland Payment Systems

CSO of the Year: John South, Heartland Payment Systems By

John South joined Heartland Payment Systems when it still was reeling from a devastating breach...and it's the best career decision he's ever made. Dan Kaplan reports.

Preparing for the new norm: 2013 Guarding against a data breach survey

Preparing for the new norm: 2013 Guarding against a data breach survey By

With almost daily advanced attacks, organizations of all sizes must be at the ready, according to respondents to this year's "Guarding Against a Data Breach" survey. Illena Armstrong reports.

Losing control: Critical infrastructure

Losing control: Critical infrastructure By

Industrial control systems remain troublingly vulnerable to both internal error and outside intruders, reports Danielle Walker.

Give and go: New Orleans Hornets and Array Networks

Give and go: New Orleans Hornets and Array Networks By

The NBA's New Orleans Hornets needed to provide its off-the-court, but highly mobile staff with a secure method for communicating. It found an enterprise remote access solution that could help.

Battle lines drawn: Nation-state threats

Battle lines drawn: Nation-state threats

The United States has established itself as a major force in a new era of combat, but what repercussions do state-sponsored actions in cyber space have on all of us?

Push comes to shove

Push comes to shove

PayPal's Andy Steingruebl knows security is not an insular task. By looking outside of its own walls, the company has taken the fight to the enemy, and helped everyone else in the process.

Global situation: Guarding against a data breach

Global situation: Guarding against a data breach By

Results from our sixth-annual data breach survey are out next month, but here's a sampling of what's to come from our study of budgets, hiring practices, security solutions and more.

Delayed reaction

Delayed reaction By

Despite the ubiquity of the Trusted Platform Module, holdups exist and adoption remains slow. Among them are issues with interoperability, considering Apple, Google and Microsoft all use different standards.

Not your parents' threatscape: APTs

Not your parents' threatscape: APTs

For those organizations at risk to a nation-state attack, preparation should come with the expectation of compromise, as well as knowledge that the damage can be mitigated.

Cloud of suspicion

Cloud of suspicion

Cloud computing still is trying to overcome the trust and reliability issues that has made it a questionable proposition for many organizations.

Risky business: Marriage of compliance & security

Risky business: Marriage of compliance & security

Compliance brings with it the stigma of cost, complexity and confusion, but viewing it from a risk point-of-view may help make it more tolerable.

A seat at the table: The plight of the CISO

A seat at the table: The plight of the CISO

Rodney Dangerfield couldn't get any respect, and neither can CISOs, who still struggle for recognition within the C-suite. But ignore them at your own risk, says Deven Bhatt, CISO for WEX.

Compliance confluence: 1st Credit and SureCloud

Compliance confluence: 1st Credit and SureCloud By

A highly regulated debt collector from the U.K. needed to achieve compliance, but it wanted to scrap all of the point solutions on which it traditionally relied.

Web exclusive: A look ahead

Web exclusive: A look ahead By

A group of prominent security professionals forecast the most significant industry shifts in 2013. Greg Masters compiles the responses.

Top mergers and acquisitions activity in 2012

By

Here's a year-end look back at some of the biggest mergers and acquisitions activity in the security space.

Anthropologist focused on hacker culture

Anthropologist focused on hacker culture By

Gabriella Coleman, professor at McGill University in Montreal and avid observer of the Anonymous online collective, has become one of the pre-eminent thought leaders on the hacktivist culture.

Web exclusive: In the year 2013, a trend forecast

Web exclusive: In the year 2013, a trend forecast By

The threats to enterprise networks continued to grow this year, but the tech grab bag is also getting more potent, reports Alan Earls.

The high-tech hydra: BYOD

The high-tech hydra: BYOD By

No a business' size, employees are yearning to connect their personal devices to the corporate network. But fear not: Solutions and best practices are starting to emerge to manage the risk attached with this craze.

Storms ahead: Insiders and the cloud

Storms ahead: Insiders and the cloud By

Most organizations cite trust issues as their primary reason for deciding against outsourcing their computing resources and data assets. So just what are cloud providers doing to ensure protection?

Employee benefits: Stemming the insider threat

Employee benefits: Stemming the insider threat By

External adversaries, such as nation-state attackers or criminals after credit card data, may get all the attention, but insiders pose a signfiicant threat. Can the non-malicious ones be taught to act securely?

IPS grows up

IPS grows up By

The intrusion prevention system is a mainstay of any organization's perimeter-focused security infrastructure, but its days may be numbered as a standalone technology. Yet, its purpose lives on.

Waking the sleeping giant: Critical infrastructure

Waking the sleeping giant: Critical infrastructure By

For the last several years, security experts have been stressing the vulnerability of industrial control systems. Now, with attacks like Stuxnet proof of the risk, the big question is: How will industry respond?

Blocking entry: Browsers offer prime attack vector

Blocking entry: Browsers offer prime attack vector By

Web browsers have become today's de facto operating system -- the single place where end-users spend most of their time. As such, they're ground zero for attacks. Technology, though, is coming to the rescue.

School ties: Security challenges at universities

School ties: Security challenges at universities By

Sanjeev Sah has been CISO of UNC-Charlotte for just over a year, and he's already well versed on the unique circumstances that make securing colleges unlike any other vertical.

Is danger looming: Mobile vulnerabilities

Is danger looming: Mobile vulnerabilities

With users flocking toward mobile platforms, fraudsters will join as well. But businesses have a bigger problem: What to do about employees wanting to use their devices to connect to the corporate network.

Technology to strategy: Today's CISO

Technology to strategy: Today's CISO By

With breaches grabbing headlines and cash funneling toward infosec budgets, the role of the security executive is shifting from tech and compliance wonk to savvy businessperson.

Cyber cold war: Espionage and warfare

Cyber cold war: Espionage and warfare By

When the history of the cyber arms race is written, the first chapter surely will be devoted to Stuxnet. But now that these sophisticated strikes have started, there are plenty of questions to answer.

Prime pickings: Application security

Prime pickings: Application security By

Applications provide the path to an organization's coveted assets. And even if they're not public-facing, they still can be a ripe target. We talk to Marcus Prendergast, CSO of ITG, for this month's cover story.

Why can't we be friends? A look at convergence

Why can't we be friends? A look at convergence

The ability to marry physical and logical security controls is maturing, which means companies can find efficiency wins, while in the process lowering their risk profile.

Sharing the pie: Threat collaboration

Sharing the pie: Threat collaboration By

Many view information sharing as an elusive quest, hampered by various roadblocks. But Georgia Tech researchers want to tear down these hurdles with a new threat intelligence system known as Titan.

Measuring success: Performance metrics

Measuring success: Performance metrics By

Security metrics remain elusive for many organizations, but key performance indicators, or KPIs, are achievable measurements that can help guide business planning and strategy.

Embracing BYOD: Mobile challenge

Embracing BYOD: Mobile challenge By

Businesses may no longer be able to turn away employees who want to bring their smartphones and tablets to work, and connect to the corporate network. But is that actually a good thing?

Assurance on the shore

Assurance on the shore By

While the town of Brick on the New Jersey shore maintains a 1950s aura, with the growth of digital media, its public school system had to alleviate engorged traffic on its network, while safeguarding data.

Danger within: Insider threat

Many organizations are focusing their security efforts on deterring the external attack -- often at the expense of catching the insider threat. This could be a costly oversight, especially with the rise of BYOD.

Guarding the crown jewels: Critical data

Guarding the crown jewels: Critical data

The loss of personally identifiable information (PII) by an organization can lead to customer loss, reputational harm, and fines, but before this data can be properly guarded, it must be located.

Medicine man: Risk assessment

Medicine man: Risk assessment By

In 1854, an English physician was one of the first to use an epidemiological method to ID disease risk. Ben Sapiro of the Dominion of General Insurance Co. wants his peers to do the same with security.

Case study: Malware checkout

Case study: Malware checkout By

The hospitality industry remains one of the most targeted by cyber criminals. That's why Thayer Lodging Group, which owns or operates 18 hotels, knew it was time to get serious about endpoint security.

Advancing firewalls

Advancing firewalls By

Firewalls have been an enterprise security mainstay for years. But with a majority of attacks now being launched against the web application layer of the stack, the technology must evolve.

Offensive line: Fighting back against hackers

Offensive line: Fighting back against hackers By

The only way to gain the upper hand on today's advanced adversaries is by being proactive -- even aggressive, a tactic that can take many forms, says Joel Yonts, CISO of an automotive supply company.

On fertile ground: Social networking

On fertile ground: Social networking

Sites such as Facebook and Twitter contain seemingly infinite amounts of personal data, so it's no wonder criminals have turned their focus there. But social media providers and end-users can protect themselves.

Seal of approval: Security certifications

Seal of approval: Security certifications By

Certifications have long validated security skills, says W. Hord Tipton of (ISC)2. But as the profession evolves and more educational opportunities pop up, how valuable do they remain?

A smarter migration: Cloud computing

A smarter migration: Cloud computing By

The decision to move to the cloud has always been wrought with anxiety over entrusting one's data to a third-party. Learning which questions to ask of a provider can help mitigate that concern.

Exotic, new connections: Embedded devices

Exotic, new connections: Embedded devices By

For a while, only traditional PCs were connected to the public internet. But with most devices now gaining networked capabilities, it's only a matter of time before your television can contract a virus.

Health hazard: SC Magazine Roundtable

Health hazard: SC Magazine Roundtable By

Health care traditionally, compared with other industries, has lagged in terms of cyber defense, but with attackers now specifically targeting these organizations for patient data, inaction is no longer an option.

Big Data: The big picture

Big Data: The big picture By

With data proliferating at astonishing rates, organizations are tearing into it, hoping to derive new business value, which, according to Zions CSO Preston Wood, includes better security decision making.

Sign up for our newsletters

POLL