Successfully defending against socially engineered phishing campaigns means addressing both technological and human vulnerabilities. Doug Olenick reports.
When chief executives flout security rules, the losses can be higher than usual. What should organizations do to help their leaders stay on track with cybersecurity? Karen Epper Hoffman reports.
Repeated exposure of private data is giving rise to a new class of companies promising to clean up the mess - and they don't come cheap. Lee Sustar reports.
CISOs say the Apple-FBI case confirms the need for strong encryption and IT security programs. Steve Zurier reports.
A contentious amendment to an international export treaty has been causing an uproar in the security communities, reports Karen Epper Hoffman.
The market, not government regulation, will push IoT security to a higher standard, says John Ellis of Ellis & Associates. Lee Sustar reports.
C-suites and boards of directors are increasing their knowledge of IT security risks and needs - before a breach happens. Larry Jaffee reports.
Briefs: Company news, April 2016: Personnel moves and M&A activity in the IT security industry
Breaking news from the IT security industry: personnel moves, mergers and acquisitions, and other happenings.
Sign up to our newsletters
SC Magazine Articles
- Blasphemy! Godless malware preys on nearly 90 percent of Android devices
- 'Password attacks' continue; Citrix becomes latest victim
- Access to 70,000 hacked servers sold on hacker marketplace; industry reacts
- Gartner's top-10 list of infosec techs addresses concerns over cloud, IoT
- CEO sacked after aircraft company grounded by whaling attack
- Microsoft warns of new, self-propagating ransomware in the wild
- Wendy's POS breach 'considerably' bigger than first thought
- No hacking required: Israeli researchers show how to steal data through PC components