Industry Insight News, Articles and Updates
Farsight Security Services has promoted Robert Batch, a 12-year veteran employee, to IT administrator.
Rapid7 has appointed Marc Brown and Tom Schodorf to its Board of Directors.
Despite a slow start at the beginning of 2016, the IT jobs market in London experienced an upturn in the number of jobs with June being the highest month so far for job volume in 2016.
Twitter said Tuesday it had created an online application process so that Twitter accounts could receive verified status.
Researchers discovered a way to detect and block malware in Transport Layer Security (TLS) connections without decrypting the traffic.
Silicon Valley tech sector leaders released a statement expressing dismay at the possibility of Donald Trump becoming president.
A report from the U.K.'s National Crime Agency found that cybercrime has passed traditional crime in terms of impact.
A new malware strain, dubbed Keydnap, is targeting Mac users, perhaps, in particular, security researchers.
Democratic presidential hopeful Hillary Clinton called for administrative reform to help bring the U.S. copyright system into the digital age.
The amount of digital information stored on recycled devices is staggering, a new study found.
London is the center of tech startups in Europe. So, how will the U.K.'s separation from the EU impact the tech sector?
Patches have been made available for programming errors found in libarchive that could make software used in a number of platforms vulnerable to exploitation.
At one time ridiculed over lax cybersecurity, the federal health insurance exchange site HealthCare.gov scored second-highest out of approximately 1,000 websites in the Online Trust Alliance's eighth annual Trust Audit and Honor Roll.
Security and risk are often mentioned in the same breath, and while they can complement each other, taking a risk-based approach is essential to building a realistic and manageable IT security program.
When it comes to the most in demand positions in IT among CISOs David Foote, CEO of IT market intelligence firm Foote Partners, said it's internal IT "marketers" who can successfully communicate complex cybersecurity concepts to C-level executives.
When chief executives flout security rules, the losses can be higher than usual. What should organizations do to help their leaders stay on track with cybersecurity? Karen Epper Hoffman reports.
The MIAX Options Exchange needed more than a way to appease regulators, it also required security assurance. Greg Masters reports.
Just because a company offers a cybersecurity training program to its employees doesn't mean it's necessarily doing enough to change workers' dangerous online behaviors, according to a report from Experian and Ponemon Institute.
On the heels of a breach last week at LinkedIn that exposed passwords of 117 million users, Microsoft has put in place new password security for users of its Azure Active Directory.
A long-time hacker group is using DNS requests as a command-and-control mechanism in a new series of malware attacks.
A new study showing how federal agencies still don't have a firm grasp of cybersecurity practices was ironically released just days after the third-party contractor hired to fortify the U.S. Office of Personnel Management's systems suddenly quit.
A security update for Adobe Connect for Windows released Monday resolves an untrusted search path vulnerability in the add-in installer for Connect versions 9.5.2 and earlier.
International Recycling Day is held today, 17 May to caution businesses that being green and responsible recycling is vital to destroy data on disused devices
Data breaches in the worlds of banking, credit and finance have nearly double between 2014 and 2015 according to the Identity Theft Resource Centre's 2015 Breach List report. Despite being unsure of how long it would take, IT pros in financial services are very confident in their ability to detect a breach.
Yahoo has released its second wave of Foreign Intelligence Surveillance Court (FISC) documents concerning a 2007 case over user data.
Appthority's Q2 2016 Enterprise Mobile Threat Report found Apple and Android should better vet their app stores.
Microsoft noted a 9.4 percent increase in vulnerability disclosures to just above 3,300 disclosures in its latest study.
A team of researchers discover a new method of launching attacks that would threaten global critical infrastructure and utility providers through a worm that spreads through utility networks.
A recent study found that only 17 percent of IT professionals were confident in their ability to defeat cyberattacks.
University of Michigan researchers remotely pick locks of Samsung SmartThings connected home systemsMay 02, 2016
In a series of attacks, University of Michigan researchers hacked into Samsung SmartThings connected home systems and remotely unlocked doors.
SC Magazine Articles
- Cerber ransomware strain now targeting Office 365 users
- Critical infrastructure in Europe exposed to hackers
- Deal with the devil: Ransomware experiment proves you can negotiate price down
- WordPress Summer of Pwnage: 64 holes in 21 days
- Cerber ransomware C&C server shut down by research firm and CERT-Netherlands
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Hard Rock Hotel & Casino Las Vegas hit with POS breach
- X-ray and MRI machines among devices used as springboards for data breach attacks
- Brexit shakeup: How will the U.K.'s exit from the EU affect the technology sector?
- Hacker purportedly selling over 650,000 stolen medical records on dark web marketplace
- WhatsApp in the spotlight after Turkey publishes messages of coup officers
- For the incoming federal CISO: Focus on the human side of cybersecurity
- Audit: FBI's threat prioritization process too subjective and sluggish
- 2.3 million 'Warframe,' 'Clash of Kings' accounts compromised
- MS-ISAC official: Ransomware top priority