Industry Insight

Insider threats changing security spending, report says

Insider threats changing security spending, report says

By

The 2015 Vormetric Insider Threat Report found that a large majority of U.S. companies believe they are vulnerable to insider threats.

2015 identity and access management ebook

2015 identity and access management ebook

In many companies, information security in general and segregation of duties in particular, are lower security priority because the process tends to be costly and time-consuming. The key is to give users just the access they need when they need it and no more.

Could the Sony breach have been prevented?

Could the Sony breach have been prevented?

While most agree that corporate security needs to improve, a question still remains: Even with best practices in place, could the Sony debacle have been prevented?

Six ways identity will take center stage in 2015

Six ways identity will take center stage in 2015

With the growing connectedness of all things great and small, the need for trusted identities will take center stage in 2015.

Making improved authentication second nature to users

By

In this video, Phillip Dunkelberger, CEO of Nok Nok Labs, discusses emerging attacks for defeating authentication on mobile devices.

False malware alerts cost organizations $1.27M annually, report says

By

Research from The Ponemon Institute and Damballa found that of an average 17,000 alerts a company fields weekly, only 19 percent are reliable.

Data security firm Ionic raises $40 million in funding

By

The latest round of funding is led by Meritech Capital Partners, but includes contributions from current investors Kleiner Perkins Caufield & Byers, in addition to others.

Investment in end-user training could reduce cost by 60 percent

Investment in end-user training could reduce cost by 60 percent

By

The Aberdeen Group teamed up with Wombat Security Technologies to create a Monte Carlo model that would quantify how employees' online actions correlate with an enterprise's risk

2015 SC Awards U.S. Finalists

2015 SC Awards U.S. Finalists

By

The highly anticipated SC Awards U.S. are just around the corner. Here's the full list of finalists competing to take home a trophy on the big night in San Francisco.

2015 SC Awards U.S. Finalists: Round Six

2015 SC Awards U.S. Finalists: Round Six

By

Round one of the 2015 SC Awards U.S. finalists includes categories for best email security solution, UTM security solution, emerging technology, security team and CSO of the year.

2015 SC Awards U.S. Finalists: Round Five

2015 SC Awards U.S. Finalists: Round Five

By

Round one of the 2015 SC Awards U.S. finalists includes categories for best database security solution, managed security service, SIEM solution, security company and security company of the year.

2015 SC Awards U.S. Finalists: Round Four

2015 SC Awards U.S. Finalists: Round Four

By

Round one of the 2015 SC Awards U.S. finalists includes categories for best DLP solution, risk/policy management solution, customer service, professional certification program and IT security-related training program.

2015 SC Awards U.S. Finalists: Round Three

2015 SC Awards U.S. Finalists: Round Three

By

Round one of the 2015 SC Awards U.S. finalists includes categories for best computer forensic solution, best identity management solution, NAC solution, web content management solution, and the excellence award for best regulatory compliance solution.

2015 SC Awards U.S. Finalists: Round Two

2015 SC Awards U.S. Finalists: Round Two

By

Round one of the 2015 SC Awards U.S. finalists includes categories for best cloud computing security solution, fraud prevention solution, multifactor solution, application firewall, and the excellence awards for best enterprise security solution.

2015 SC Awards U.S. Finalists: Round One

2015 SC Awards U.S. Finalists: Round One

By

Round one of the 2015 SC Awards U.S. finalists includes categories for best advanced persistent threat protection, mobile security solution, vulnerability management solution, and the Excellence Award for best SME security solution.

Who is responsible for software safety? Nobody is no longer an option

Who is responsible for software safety? Nobody is no longer an option

It is now up to banks to self-regulate themselves or continue to deal with the pressing questions of concerned officials like Benjamin Lawsky.

Respected information security journalist Steve Gold dies

Respected information security journalist Steve Gold dies

Steve Gold, one of the U.K.'s most respected information security journalists, who helped found SC Magazine and was renowned for helping his family, friends and colleagues, has died.

Study: Majority of enterprises breached in first half of 2014, regardless of vertical

Study: Majority of enterprises breached in first half of 2014, regardless of vertical

By

FireEye found that a majority of enterprises had their systems breached during the first half of 2014, and often times, advanced malware allowed for the intrusion.

Building a proactive versus solutions-based security plan

Building a proactive versus solutions-based security plan

2014 taught us that organizations cannot rest on their laurels. Security team needs to be in a state of hypervigilance. This is precisely why developing and implementing a proactive security plan will be a critical component of 2015 IT priorities.

FBI shares info on Sony hack, but doubt in N. Korea theory lingers

FBI shares info on Sony hack, but doubt in N. Korea theory lingers

By

The FBI director said that attackers failed to use proxy servers to conceal their whereabouts when sending threatening emails to Sony employees.

Will 2015 bring a stronger focus on IT security?

Will 2015 bring a stronger focus on IT security?

As we predicted around this time last year, 2014 has seen more high-profile targeted attacks with motivations of stealing information. Here's what could be in store this year.

Sam Curry, previously of MicroStrategy, joins Arbor Networks

By

Sam Curry has joined Arbor Networks as its chief technology & security officer, a newly created position.

Facebook acquires voice recognition company

By

With the acquisition of wit.ai, Facebook has fast-tracked the voice recognition's vision to build an open community-based platform for developers.

Silent Circle names new CEO

By

Silent Circle has appointed William Conner as CEO while founder Mike Janke becomes chairman of the board.

iSIGHT Partners raises $30M in equity financing

By

The company will use the funds to expand its intelligence capacity, enhance ThreatScape products and grow partnerships.

Cyber threat developments in 2015

Cyber threat developments in 2015

It was a tumultuous year with several interesting developments in computer security and the lack thereof.

Reconnaissance is the name of the game in 2015

Reconnaissance is the name of the game in 2015

Attackers are moving away from a "smash and grab" theft of credit card numbers towards the benefits accessible by waiting for "interesting" data.

We're failing on the basics and need a new approach

We're failing on the basics and need a new approach

In 2015, we will see the rise of targeted defensive security solutions that are accurate, scalable and lack the need for the coddling hand of security experts.

FBI searching for cyber experts to become special agents

By

Recruits would have the opportunity to become the lead agent in counterterrorism or counterintelligence investigations.

Expect more ransomware and 'extortionware' in 2015

Expect more ransomware and 'extortionware' in 2015

While we can expect to see the return of some of the issues we faced in 2014, there are still a number of new threats that we need to be aware of in the year to come.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US