Industry Insight

Jeans and blazers will feature RFID blocking fabric

By

Produced by Norton and Betabrand, the READY Active jeans and Work-It blazer feature pockets lined with RFID blocking material.

Securing the enterprise with the five W's of access

Securing the enterprise with the five W's of access

Burden of proof should grow heavier as request for access grows more sensitive.

Exploits, mobile and cloud storage threats will plague users in 2015

Exploits, mobile and cloud storage threats will plague users in 2015

2015 is setup to be one of the most dangerous years for not only your PC but also your mobile devices and cloud storage.

2015 trends to watch: Data destruction, endpoint intelligence and user behavior analytics

2015 trends to watch: Data destruction, endpoint intelligence and user behavior analytics

Based on the course of events that we've seen over the last year, and how the market is responding, here are some of the security trends that we will see over the coming 12 months.

A forecast of the cyberthreat landscape in 2015

A forecast of the cyberthreat landscape in 2015

From Heartbleed to WireLurker, we certainly had our hands full. Here are some other trends from 2014 and predictions for the coming year.

What we can be thankful for in '14, and what we might expect in '15

What we can be thankful for in '14, and what we might expect in '15

As we approach the time of year when all the security gurus bring out their crystal balls, we should also focus on the improvements made in 2014.

Study: Malicious social media attacks on the upswing

Study: Malicious social media attacks on the upswing

By

Social media represents the next frontier of threats; 2015 will be the year for social media managers and IT security professionals to unite, one study says.

Cyber intelligence in the private sector

By

In this interview, Jim Penrose, executive vice president at Darktrace, shares hows the industry can work to improve threat intelligence sharing, while maintaining client confidentiality.

$8.25M raised by Nok Nok Labs to bolster biometric authentication

By

The security firm which specializes in authentication, is also a founding member of the FIDO Alliance, which recently published its Universal Authentication Framework.

Malware signed with Sony certificate now thought to be researcher prank

By

Kaspersky initially thought the malware signature might be the work of malicious attackers.

Study reveals industry pros troubled most by ransomware threat, damage

Study reveals industry pros troubled most by ransomware threat, damage

By

A survey of IT security pros commissioned by Malwarebytes revealed that ransomware topped the list of security threats.

Reboot 2014: Industry experts discuss the year in security

By

In this video, some prominent information security professionals share their thoughts on prevalent threats in 2014 and what they think is to come in 2015.

Poll: IT leaders forecast security staff salary increase in 2015

By

In an annual forecast report, 54 percent of IT leaders said their budgets would accommodate increased salaries for security staff.

North Korea: Sony Pictures hack may be work of gov't supporters

North Korea: Sony Pictures hack may be work of gov't supporters

By

Meanwhile, an internal email between execs at Sony Pictures and Mandiant, the forensics unit tapped to investigate the breach, leaked to the press.

Reboot 25: Industry pioneers

Reboot 25: Industry pioneers

By

The following hitched up their digital wagons to blaze new trails in cybersecurity.

Reboot 25: Top management

Reboot 25: Top management

By

From childhood fascinations and unlikely epiphanies to unexpected opportunities and market surges, top security managers find inspiration in almost anything - and they're willing to seize opportunity and take responsibility to lead their teams.

Reboot 25: Thought leaders

Reboot 25: Thought leaders

By

These professionals have done everything from cryptography to founding an influential security conference.

Reboot 25: The influencers

Reboot 25: The influencers

By

Blessed are the influencers for they will make a true difference - through policy, vision, drive, innovation and ideas - in the course of information security. What sets our selection apart is that they've held significant sway on the direction of IT security.

Debate: If the good guys don't hire the "unhireable," the bad guys will.

By

Experts debate whether or not organizations should consider hiring hackers with a criminal past.

Reboot 25: Threat seekers

Reboot 25: Threat seekers

By

These explorers' findings of critical vulnerabilities - from Heartbleed to Shellshock - have generated excitement, along with awareness, and made an indelible mark on security.

Reboot 25: Honorable mention

Reboot 25: Honorable mention

By

Hang around IT security long enough and several of the same names keep popping up. With good reason. They have both vision and influence and they aren't afraid to use them.

The cybersecurity skills gap

The cybersecurity skills gap

Cooperation is required to advance the profession, says Towerwall's Candy Alexander.

Take the ride: 25 years of covering IT security

Take the ride: 25 years of covering IT security

By

For this year's annual Reboot edition, we took the opportunity to look back not just on the last 12 months, but the last 25 years SC has been entrenched in the information security space.

An epic ride: A look back at the ever-changing information security industry

An epic ride: A look back at the ever-changing information security industry

By

Over the past quarter century, corporate information security has come into its own, reports Karen Epper Hoffman.

And a little child shall secure them: The next generation of CISOs

And a little child shall secure them: The next generation of CISOs

By

You're never too young to learn about information security, Teri Robinson reports.

A look ahead: Security experts share forecasts on 2015

By

A Q&A gathering experts' thoughts on the threats they considered important in 2014 and envision imperiling us in 2015.

Information security in 2014: Another year of big events

Information security in 2014: Another year of big events

By

As 2014 draws to a close we can look back over one of the most tumultuous years in recent history.

Study: 58 percent of businesses do not have complete patch management strategy

Study: 58 percent of businesses do not have complete patch management strategy

By

Most businesses store and process financial data, yet 63 percent do not have a mature way to control and track sensitive data, Trustwave found.

Missing the big picture in the Sony hack

Missing the big picture in the Sony hack

Should we rush out signatures for this latest version of malware, or should we take a step back and figure out how to focus our technology and security operations around identifying attackers before they wreak such havoc?

Michael Fey, former Intel Security CTO, heads to Blue Coat

By

On Thursday, Fey was named president and COO of Blue Coat.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US