Software developers are challenged with prioritizing between delivering code within aggressive timelines and incorporating security into the development lifecycle.
The latest updates on personnel shifts, M&A activity and more, including ESET, ZeroFOX, Norse, Wandera, Bastille, Secure Islands and Zscaler.
Here's a closer look at CipherCloud's Chief Trust Officer Bob West.
Seeing as web apps are a major target for attackers, skilled application security engineers are in demand.
Despite ongoing attacks against major corporations, not much is changing at the executive level, says Illena Armstrong, VP, editiorial, SC Magazine.
Security certifications can land you a better job, but companies are also looking for people who can communicate and manage projects, reports Steve Zurier.
Even when you've got a breach or an insider gone bad, there are still ways to limit the damage and protect data, reports Alan Earls.
The Federal Trade Commission (FTC) has become the de facto enforcer of data privacy laws and regulations, reports Lee Sustar.
An ill-informed worker is a weak link that leaves a giant gap in your defenses, says SOHO Solutions VP Scott Aurnou.
Identity management has evolved rapidly over the past decade, says Jim Robell, president and COO, Eid Passport.
Even the most sophisticated, well-intentioned perimeter-focused cybersecurity strategy cannot possibly be 100 percent effective, says Oliver Tavakoli, CTO, Vectra.
Experts debate whether the financial industry has a leg up in terms of their cybersecurity strategy when compared to other industries.
In new budgets, both at organizations and the government, one thing's for sure: Cybersecurity spending continues to trend upward.
Reddit will donate 10 percent of its 2014 gross ad revenue to 10 charities chosen by Reddit users.
In a poll that surveyed 1,008 U.S. adults, GFI found that the fear of a cybersecurity attack has increased significantly over the past year.
Michael DeCesare has left Intel Security to take the helm at ForeScout.
With President Obama drawing attention to a possible federal data breach law, one study found that 14 percent of small business owners are "not at all confident" with their states' current laws.
Mobile cyber threats are on the rise and getting more advanced. Enterprises want to bolster their security programs to protect against new, unknown mobile threats, but understanding these risks requires visibility.
When it comes to healthcare security, if you think compliance is the only thing you need to worry about, think again.
In this video, Lou Shipley, president and CEO of Black Duck, discusses what exactly is meant by 'open source,' and how organizations can manage their security when it comes to open source.
The terms of the deal have not been disclosed, but Check Point has reportedly said it is worth "tens of millions of dollars."
While threat intelligence didn't stop attackers of the health care giant Anthem, the breach is likely to add to the pressure to improve efforts to make threat data intelligible and useful to frontline IT security specialists.
Considered "one of the most important priorities" in the upcoming release of the operating system, Microsoft is looking to transition away from the password.
On the whole, the recent steps taken by government are thoughtful and meaningful - and the attention to cybersecurity is overdue. But will they be enough?
Mark Turnage has been appointed CEO of the Denver-based security firm.
While portraying hacking as an exciting, blockbuster-worthy pursuit certainly makes for a good story, the truth usually isn't as intense as the fantasy.
Undoubtedly, the cybersecurity challenge is going to result in an increasing focus and spend on security systems. The question, however, is whether this will reduce the risk.
If we can't stop breaches, then let's remove the incentive for hacking by devaluing the data, especially Social Security Numbers.
CrowdStrike's Global Threat Intel Report details some of the attacks IT security professionals have seen in 2014 and can expect to see more of this year.
Sophos announced on Tuesday the appointment of Joe Levy as chief technical officer.
Sign up to our newsletters
SC Magazine Articles
- State breakdowns: Anthem breach by the numbers
- Malware on Lime Crime website, payment cards compromised
- Florida law enforcement docs show widespread stingray use, secrecy
- Botnet of Joomla servers furthers DDoS-for-hire scheme
- Bug in popular WordPress plugin opens up websites to SQL injection attacks
- State breakdowns: Anthem breach by the numbers
- Carbanak APT campaign made off with $1B from banks globally
- BMW issues security patch for bug allowing attackers physical access into vehicles
- NIST requests final comments on ICS security guide
- Disconnect yawns between CISOs, exec leadership, study says
- In growing market for genetic data, privacy implications prove lasting
- Natural Grocers investigating unauthorized access to POS systems
- Proposed Consumer Privacy Bill of Rights Act doesn't go far enough, critics say
- Data at risk for about 50,000 current and former Uber drivers
- North Carolina credit union notification says laptop containing data missing