Youthful mischief online can wreak havoc for offenders. Can IT security community leaders provide alternatives? Lee Sustar investigates.
Even the best security people can't be expected to know the whole zoo of devices being used across a large organization, reports James Hale.
When does cyberespionage cross the line into cyberwar? Adam Segal at the Council on Foreign Relations has answers. Lee Sustar reports.
The gap between a breach and its detection allows bad guys plenty of opportunity to wreak havoc, reports Joe Aragona.
Profiles of five women who are advancing the IT security field through their advocacy, legal expertise, engineering acumen and entrepreneurial efforts.
Welcome to the second annual Women in IT Security issue.
Veteran female executives, as well as women new to IT security, are looking to blaze their own trail, reports Karen Epper Hoffman.
Women take a stand against revenge porn and implore the security community to help protect the public. Danielle Walker reports.
These 10 women were selected for their longstanding contributions to the IT security space.
Much of the road to diversity still stretches out in front of Silicon Valley firms where women are very clearly still in the passenger seat, reports Teri Robinson.
Sign up to our newsletters
SC Magazine Articles
- Women in IT Security: 10 Power Players
- Report: Phishing costs average organization $3.7 million per year
- Scanner identifies thousands of malicious Android apps on Google Play, other markets
- Women in IT Security: Women of influence
- DARPA seeks to develop program that drastically improves DDoS defense
- DOJ issues new 'stingray' policies and begins requiring a warrant
- Outdated websites deliver TeslaCrypt via Neutrino Exploit Kit: Heimdal
- Scammers and schemers look to cash in on Ashley Madison breach
- ACLU asks DOJ to withhold funds for LAPD body cams
- A question of balance between security solutions and the people who use it