The NYU Polytechnic School of Engineering hosted a cybersecurity conference to help foster interest in the field among young women and teens.
Yahoo's Interim CEO Ramses Martinez detailed the company's bug bounty program's successes since its creation in 2013.
Israeli researchers detailed a new attack that can steal data from air-gapped computers, which are often seen as relatively safe.
A Google survey among security experts and "non-experts" found that both groups operate very differently when trying to keep themselves and their devices safe online.
All ten smartwatches tested by HP Fortify reported significant security vulnerabilities, along with their Android and iOS cloud and mobile application components, according to a new report.
As Stephen Scharf moves into newly created CSO position at DTCC, global CISO Mark Clancy assumes helm as CEO at Soltra.
A survey from Intel Security found that many information security professionals are overconfident in their systems' ability to thwart an attack.
After a FireEye intern was found selling his own custom RAT on a dark web forum, industry experts reemphasize the importance of understanding cybercrime and how to hire the right people.
Google Capital funded Crowdstrike during a funding round, and also granted Carnegie Mellon University $500,000.
JPMorgan Chase reassigned the executive in charge of network security a year after he was criticized for his handling of a major data breach.
These 10 women were selected for their longstanding contributions to the IT security space.
In the U.S., 51 percent of Facebook tech staff are white, while Black and Hispanic employees respectively account for 1 and 3 percent of tech staff.
Alex Stamos, who was appointed CISO at Yahoo last year, will join Facebook as CSO next Monday.
Polish airline LOT was attacked by hackers who accessed the company's ground systems responsible for issuing flight plans.
Google announced Friday that it will take steps to make revenge porn images inaccessible through its search engine.
Purdue Polytechnic Indianapolis High School, set to open in Indianapolis, will focus curriculum on STEM and help inner city students prepare for college.
LinkedIn's director of information security shared that the private bug bounty program was formalized in October.
Choosing the right secure file transfer vendor in today's heightened security & compliance landscapeJune 17, 2015
As mobile technologies, cloud computing, and always-connected environments continue to enable fluid movement of data, organizations must consider solutions that meet both current, and future needs.
Security leaders shared steps their own organizations have taken to effectively prepare for looming incidents or compromise.
Dave Lewis, global security advocate at Akamai, highlighted attack trends at SC Congress Toronto.
More than 400 security pros from companies of all sizes in 61 countries completed self-assessment tests against NIST Cybersecurity Framework for RSA's Cybersecurity Poverty Index.
During the afternoon keynote at SC Congress Toronto, Lodewijkx shared IBM's guiding principles for mitigating IT security threats.
A speaker advised attendees to have a clear understanding of the risk management side of their business, to choose a tailored plan that meets their needs.
Adobe has agreed to improve security and pay nearly $1.2 million in legal fees plus $5,000 per named plaintiff in the settlement of class action lawsuit over a 2013 breach.
During a panel at SC Magazine's Toronto conference, a panel of IT security professionals discussed ransomware and its possible future iterations.
Apple will require iOS 9 users to use six-digit passwords and two-factor authentication when signing into Apple services from a new device or browser.
The results of the IAPP's 2015 Privacy Professional Salary Survey showed that women and men in the privacy industry pull down roughly the same salaries and follow similar career trajectories.
Google released its workforce demographics Monday and the company has not made a lot of headway in diversifying its ranks.
A new survey shows board members across several industries are holding more C-level execs responsible in cases of data breaches.
You can't hire quality information security talent the same way you hire customer service reps.
Sign up to our newsletters
SC Magazine Articles
- Report delves into RAT videos on YouTube
- Tor Project, Library Freedom Project to establish Tor exit nodes in libraries
- PagerDuty requires password change for all customers following breach
- Cisco: Attackers innovating, evading defenses in first half of 2015
- Does Windows 10 Wi-Fi Sense spell end of private wireless networks?