Industry Insight

Study: Organizations lack training, budget to thwart insider threats

Study: Organizations lack training, budget to thwart insider threats

By

Of the 355 IT and security professionals surveyed, a majority indicated that they were ill-equipped to thwart a possible insider threat.

The 'human firewall': a more proactive approach to infosec

The 'human firewall': a more proactive approach to infosec

The high price of defending against cyber attacks exposes an age old problem in information security: how do you balance security requirements with maintaining your business's bottom line and ability to deliver service?

Symantec rolls Norton solutions into single suite

By

In a move to keep up with the evolution of connected devices, Symantec has announced that its Norton security software will be rolled into one suite.

Weak password trend persists in the enterprise, study says

By

Trustwave's "2014 Business Password Analysis" indicates that strong authentication policies have yet to be implemented at organizations.

Ensuring your developers love - or at least don't hate - security

Ensuring your developers love - or at least don't hate - security

The relationship between development and security doesn't need to be hostile, and there are ways to engage developers more with security.

Security movement urges automakers to collaborate with researchers

Security movement urges automakers to collaborate with researchers

By

A group of security pros called "I am The Cavalry" introduced a five star automotive cyber safety program.

Google announces use of HTTPS as ranking signal

By

In an effort to bolster security on the web, Google has announced that it will boost the search engine ranking of sites that use HTTPS encryption by default.

Getting ahead on medical device security

By

In this video, Jay Radcliffe, senior security researcher at Rapid7, discusses his recent work and how the industry needs to get ahead of the game when it comes to medical device security.

The industry's role in public safety

By

In this video, Joshua Corman, CTO at Sonatype, chats with SC Magazine's Danielle Walker on his involvement in some important upcoming initiatives.

Black Hat:"Saving cyberspace" requires next-level defense focus

Black Hat:"Saving cyberspace" requires next-level defense focus

By

Speaker Jason Healey warned that the internet can only endure so much abuse before it's irreversibly damaged.

Black Hat keynote talks cyber policies for field's future

Black Hat keynote talks cyber policies for field's future

By

On Wednesday, Dan Geer delivered his keynote called "Cybersecurity as Realpolitik" at Black Hat.

2014 eBook on Encryption

2014 eBook on Encryption

By

The experts we spoke to for this new ebook agree that when deciding what data must be encrypted, it's a question of classifying it by level of importance.

2014 Women in IT Security: Katie Moussouris

2014 Women in IT Security: Katie Moussouris

By

As chief policy officer of HackerOne, Katie Moussouris oversees the company's philosophy and approach to vulnerability disclosure, advises customers and researchers, and as she puts it, "works toward the public good to legitimize and promote security research to help make the internet safer for everyone."

Two more sessions pulled on eve of Black Hat

By

The Black Hat conference schedule no longer includes sessions on home insecurity and dissecting the Snake malware campaign.

2014 Women in IT Security: Wendy Nather

2014 Women in IT Security: Wendy Nather

By

In 2010 Wendy Nather joined 451 Research as a senior analyst, and she now serves as research director for the information security practice covering many different areas, with a heavy focus on application security, security services and threat intelligence.

2014 Women in IT Security: Hemma Prafullchandra

2014 Women in IT Security: Hemma Prafullchandra

By

As both the CTO and the SVP for products at HyTrust, as well as more recently its head of engineering and CISO, Hemma Prafullchandra is also "an evangelist for what's possible."

2014 Women in IT Security: Patricia Titus

2014 Women in IT Security: Patricia Titus

By

As VP and CISO at Freddie Mac, Patricia Titus is responsible for the protection and integrity of the mortgage company's information assets while enabling world-class information access.

2014 Women of influence

By

These seven women are featured for their noteworthy efforts, which have impacted the field of online security and data privacy for the better.

2014 Women to Watch

By

Here's a list of five notable women to watch who have had a positive impact on the information security industry.

Insider outlook: Q&A on the status of women in IT security

By

We asked a number of security professionals what they thought about the conditions for women in the IT security workplace today.

Meetings of the mind: Women at the Podium

Meetings of the mind: Women at the Podium

By

Targeted events help stake out space for women in the security field, reports Alan Earls.

A glass cliff: Gender gap

A glass cliff: Gender gap

By

Women bring new skill sets, but early encouragement, training in grade school and mentoring are all needed to succeed, reports James Hale.

What's sex got to do with it?

What's sex got to do with it?

By

Harassment has no place in the security industry. Neither do sexism or discrimination. But, there they are. It's time for infosec to just say no, reports Teri Robinson.

Backing diversity lowers the bar?

Backing diversity lowers the bar?

Many groups have striven to cultivate a more welcoming workplace, says Alison Gianotto.

2014 Women in IT Security: Making headway

2014 Women in IT Security: Making headway

By

Though plenty of work remains to be done in closing the industry's gender gap, this inaugural issue of SC Magazine takes the step of highlighting women for their noteworthy contributions to the IT security and privacy space.

2014 Women in IT Security: Becky Bace

2014 Women in IT Security: Becky Bace

By

Becky is one of 10 women selected for their longstanding contributions to the IT security space. As veterans in the field, they've served as exemplary women taking on leadership roles in the community. We celebrate by offering their stories as well as testimonials from colleagues who have been inspired by them.

A long-overdue change

A long-overdue change

By

Debates about the dearth of women in IT security and, well, a lack of diversity in the field overall, seem to be edging our space closer and closer to some sort of tipping point.

2014 Women in IT Security: Stacey Halota

2014 Women in IT Security: Stacey Halota

By

When she stepped into the job of vice president of information security and privacy at Graham Holdings Company in 2003, Stacey Halota had to carve out new territory because her position had never existed at the corporate level before.

2014 Women in IT Security: Kristin Lovejoy

2014 Women in IT Security: Kristin Lovejoy

By

It's fair to say that Kristin Lovejoy understands IBM's information security approach inside and out, largely because she helped shape both the corporation's internal and customer-facing infosec strategy.

2014 Women in IT Security: Jennifer Minella

2014 Women in IT Security: Jennifer Minella

By

Jennifer Minella grew up in the shadow of the company she now helps run.

Sign up to our newsletters

POLL