Information Security

The good, bad and ugly

The good, bad and ugly

While some instances of Stuxnet and Duqu found their way into seemingly unplanned locations, the majority of occurrences were localized to targeted systems.

Company news: ISSA elects a new president

By

Personnel announcements, acquisitions and other news from Information Systems Security Association, Tenable Network Security, PhishMe, eIQnetworks, McAfee and several other companies.

Video: Borrowing cyber security tactics from the military

By

In this video Stonesoft's director of cyber security, Jarno Limnell, comes to the SC Magazine offices to discuss military cyber security strategies that can be implemented by the enterprise.

School ties: Security challenges at universities

School ties: Security challenges at universities

By

Sanjeev Sah has been CISO of UNC-Charlotte for just over a year, and he's already well versed on the unique circumstances that make securing colleges unlike any other vertical.

Threat of the month: Anti-virtualization malware

Threat of the month: Anti-virtualization malware

This month's threat of the month is anti-virtualization malware which automatically activates on a system boot-up.

Company News: Personnel announcements from Sophos, PwC, and others

Personnel announcements and M&A activity from Sophos, PwC US, NetSecurity, and others.

Me and my job: David Balcar, Novacoast

Me and my job: David Balcar, Novacoast

David Balcar, security adviser practice manager at Novacoast discusses various aspects of his job.

10 steps toward eliminating insider threats

10 steps toward eliminating insider threats

If there's one threat in information security that's difficult to prevent, it's the insider threat. But there are ways in which your organization can minimize the risks.

AvMed data breach case opens door for ID theft claims

By

A recent federal appeals court ruling may make it easier for people to prove they suffered identity theft as a result of a data breach.

Insider threat behavior not just actions: Part two of a series

Insider threat behavior not just actions: Part two of a series

When it comes to insider threats, we often focus on implementing technologies and auditing at the endpoint, but it's the user behavior that we have to get a better grasp of.

Countering insider threats: Part One of a series

Countering insider threats: Part One of a series

There may be no silver bullet to detect or prevent insider threats, but there are sophisticated technological solutions that can help.

Air Force Association receives $1 million grant for CyberPatriot contest

By

The Northrup Grumman Foundation has contributed $1 million to the Air Force Association toward the growing CyberPatriot competition.

Twitter adds famed security expert to team

By

Charlie Miller, well-known for his work in penetration testing, will be joining Twitter's security team.

Never trust a stranger: Secure social networking

Never trust a stranger: Secure social networking

The personally identifiable information found on social networks are a gateway for hackers to get access to the heart of the information they truly desire.

Centrify for Best Customer Service

Centrify for Best Customer Service

When it comes to customer service in the industry, Centrify believes they're the best, and hope to prove it with a win at the SC Awards.

Axway for Best Email Security Solution

Axway for Best Email Security Solution

Phishing is at an all time high, but Axway believes its email security solution is the answer. They're looking to take home a big award at the upcoming SC Awards.

Lancope for Best Computer Forensic Tool & Best Enterprise Security Solution

Lancope for Best Computer Forensic Tool & Best Enterprise Security Solution

At the upcoming awards show in San Francisco, Lancope hopes to take home a big award.

Porticor for Best Cloud Computing Security

Porticor for Best Cloud Computing Security

At the upcoming 2013 SC Awards US, Porticor hopes to take home the Best Cloud Computing Security award.

Technology to strategy: Today's CISO

Technology to strategy: Today's CISO

By

With breaches grabbing headlines and cash funneling toward infosec budgets, the role of the security executive is shifting from tech and compliance wonk to savvy businessperson.

News briefs: Breaking security news from the Cybersecurity Act to Gauss

News briefs: Breaking security news from the Cybersecurity Act to Gauss

The Cybersecurity Act of 2012 was defeated in the Senate, FinFisher spyware analyzed, nation-state-created espionage malware Gauss, and other breaking security news

Reducing "MAX-TTR" and why it matters to your network

Reducing "MAX-TTR" and why it matters to your network

The status quo can be managed, but it requires a different capital investment profile than the one that most organizations are using today.

Researchers consider threat of car hacking

By

It's not necessarily new, but researchers are upping their work into discovering weaknesses in on-board automobile computers, which conceivably could allow an hacker to do harm. They also are preaching the importance of building security in.

Why doesn't your VPN work on the road?

Why doesn't your VPN work on the road?

Connecting to a host of different networks across the country could result in potential security vulnerabilities, but closing security loopholes too often results in slow or blocked connections.

RSA finds phishing led to $687m in worldwide loses

By

Tried-and-true phishing scams continue to win a psychological game with victims, and have hit Canada particularly hard.

Industrial crimeware sets a blistering pace

Industrial crimeware sets a blistering pace

Industrialization is a key factor driving the rate at which criminals are turning to malicious software to make serious money.

Making peace with the cloud and BYOD

Making peace with the cloud and BYOD

If there are two trends that have created a multitude of issues for security professionals, they're cloud services and bring-your-own-device. But there are ways to manage them.

Data breach costs LinkedIn up to $1 million

By

LinkedIn's 2Q earnings call reveals that the company spent between $500,000 to $1 million on forensic work surrounding a recent data compromise.

Me and my job: Walter Strycharz Jr.

Me and my job: Walter Strycharz Jr.

Walter Strycharz Jr., a senior IS auditor at the University System of Maryland, discusses some of the concerns, challenges and achievements he has experienced.

Sponsored Video: Philippe Courtot, chairman and CEO, Qualys

By

SC Magazine catches up with Qualys chairman and CEO, Philippe Courtot, at this year's Black Hat conference in Las Vegas to discuss the challenges industry professionals face today.

Video: Legal guidance for security researchers

By

SC Magazine catches up with Marcia Hofmann, senior staff attorney at the Electronic Frontier Foundation, who provides some legal guidance for researchers in the industry.

Sign up to our newsletters

POLL