The 2015 Vormetric Insider Threat Report found that a large majority of U.S. companies believe they are vulnerable to insider threats.
In many companies, information security in general and segregation of duties in particular, are lower security priority because the process tends to be costly and time-consuming. The key is to give users just the access they need when they need it and no more.
While most agree that corporate security needs to improve, a question still remains: Even with best practices in place, could the Sony debacle have been prevented?
With the growing connectedness of all things great and small, the need for trusted identities will take center stage in 2015.
In this video, Phillip Dunkelberger, CEO of Nok Nok Labs, discusses emerging attacks for defeating authentication on mobile devices.
Research from The Ponemon Institute and Damballa found that of an average 17,000 alerts a company fields weekly, only 19 percent are reliable.
The latest round of funding is led by Meritech Capital Partners, but includes contributions from current investors Kleiner Perkins Caufield & Byers, in addition to others.
The Aberdeen Group teamed up with Wombat Security Technologies to create a Monte Carlo model that would quantify how employees' online actions correlate with an enterprise's risk
The highly anticipated SC Awards U.S. are just around the corner. Here's the full list of finalists competing to take home a trophy on the big night in San Francisco.
Round one of the 2015 SC Awards U.S. finalists includes categories for best email security solution, UTM security solution, emerging technology, security team and CSO of the year.
Round one of the 2015 SC Awards U.S. finalists includes categories for best database security solution, managed security service, SIEM solution, security company and security company of the year.
Round one of the 2015 SC Awards U.S. finalists includes categories for best DLP solution, risk/policy management solution, customer service, professional certification program and IT security-related training program.
Round one of the 2015 SC Awards U.S. finalists includes categories for best computer forensic solution, best identity management solution, NAC solution, web content management solution, and the excellence award for best regulatory compliance solution.
Round one of the 2015 SC Awards U.S. finalists includes categories for best cloud computing security solution, fraud prevention solution, multifactor solution, application firewall, and the excellence awards for best enterprise security solution.
Round one of the 2015 SC Awards U.S. finalists includes categories for best advanced persistent threat protection, mobile security solution, vulnerability management solution, and the Excellence Award for best SME security solution.
It is now up to banks to self-regulate themselves or continue to deal with the pressing questions of concerned officials like Benjamin Lawsky.
Steve Gold, one of the U.K.'s most respected information security journalists, who helped found SC Magazine and was renowned for helping his family, friends and colleagues, has died.
FireEye found that a majority of enterprises had their systems breached during the first half of 2014, and often times, advanced malware allowed for the intrusion.
2014 taught us that organizations cannot rest on their laurels. Security team needs to be in a state of hypervigilance. This is precisely why developing and implementing a proactive security plan will be a critical component of 2015 IT priorities.
The FBI director said that attackers failed to use proxy servers to conceal their whereabouts when sending threatening emails to Sony employees.
As we predicted around this time last year, 2014 has seen more high-profile targeted attacks with motivations of stealing information. Here's what could be in store this year.
Sam Curry has joined Arbor Networks as its chief technology & security officer, a newly created position.
With the acquisition of wit.ai, Facebook has fast-tracked the voice recognition's vision to build an open community-based platform for developers.
Silent Circle has appointed William Conner as CEO while founder Mike Janke becomes chairman of the board.
The company will use the funds to expand its intelligence capacity, enhance ThreatScape products and grow partnerships.
It was a tumultuous year with several interesting developments in computer security and the lack thereof.
Attackers are moving away from a "smash and grab" theft of credit card numbers towards the benefits accessible by waiting for "interesting" data.
In 2015, we will see the rise of targeted defensive security solutions that are accurate, scalable and lack the need for the coddling hand of security experts.
Recruits would have the opportunity to become the lead agent in counterterrorism or counterintelligence investigations.
While we can expect to see the return of some of the issues we faced in 2014, there are still a number of new threats that we need to be aware of in the year to come.
Sign up to our newsletters
SC Magazine Articles
- CTB-Locker ransomware variant being distributed in spam campaign
- 'Sexy Girls' wallpaper app in Google Play store accessed account info
- Obama talks cybersecurity legislation in State of the Union
- Proposed CFAA revisions agitate IT security community
- PCI compliance not synonymous with security, panel says
- Firm finds link between Regin spy tool and QWERTY keylogger
- Insider threats changing security spending, report says
- New attack uses ransomware to drop trojans and keyloggers
- Size and frequency of DDoS attacks increasing, annual report shows
- Former California pharmacist employee accessed data without business or treatment purpose