While some instances of Stuxnet and Duqu found their way into seemingly unplanned locations, the majority of occurrences were localized to targeted systems.
Personnel announcements, acquisitions and other news from Information Systems Security Association, Tenable Network Security, PhishMe, eIQnetworks, McAfee and several other companies.
In this video Stonesoft's director of cyber security, Jarno Limnell, comes to the SC Magazine offices to discuss military cyber security strategies that can be implemented by the enterprise.
Sanjeev Sah has been CISO of UNC-Charlotte for just over a year, and he's already well versed on the unique circumstances that make securing colleges unlike any other vertical.
This month's threat of the month is anti-virtualization malware which automatically activates on a system boot-up.
Personnel announcements and M&A activity from Sophos, PwC US, NetSecurity, and others.
David Balcar, security adviser practice manager at Novacoast discusses various aspects of his job.
A recent federal appeals court ruling may make it easier for people to prove they suffered identity theft as a result of a data breach.
When it comes to insider threats, we often focus on implementing technologies and auditing at the endpoint, but it's the user behavior that we have to get a better grasp of.
There may be no silver bullet to detect or prevent insider threats, but there are sophisticated technological solutions that can help.
The Northrup Grumman Foundation has contributed $1 million to the Air Force Association toward the growing CyberPatriot competition.
Charlie Miller, well-known for his work in penetration testing, will be joining Twitter's security team.
The personally identifiable information found on social networks are a gateway for hackers to get access to the heart of the information they truly desire.
When it comes to customer service in the industry, Centrify believes they're the best, and hope to prove it with a win at the SC Awards.
Phishing is at an all time high, but Axway believes its email security solution is the answer. They're looking to take home a big award at the upcoming SC Awards.
At the upcoming awards show in San Francisco, Lancope hopes to take home a big award.
At the upcoming 2013 SC Awards US, Porticor hopes to take home the Best Cloud Computing Security award.
With breaches grabbing headlines and cash funneling toward infosec budgets, the role of the security executive is shifting from tech and compliance wonk to savvy businessperson.
The Cybersecurity Act of 2012 was defeated in the Senate, FinFisher spyware analyzed, nation-state-created espionage malware Gauss, and other breaking security news
It's not necessarily new, but researchers are upping their work into discovering weaknesses in on-board automobile computers, which conceivably could allow an hacker to do harm. They also are preaching the importance of building security in.
Tried-and-true phishing scams continue to win a psychological game with victims, and have hit Canada particularly hard.
Industrialization is a key factor driving the rate at which criminals are turning to malicious software to make serious money.
If there are two trends that have created a multitude of issues for security professionals, they're cloud services and bring-your-own-device. But there are ways to manage them.
LinkedIn's 2Q earnings call reveals that the company spent between $500,000 to $1 million on forensic work surrounding a recent data compromise.
Walter Strycharz Jr., a senior IS auditor at the University System of Maryland, discusses some of the concerns, challenges and achievements he has experienced.
SC Magazine catches up with Qualys chairman and CEO, Philippe Courtot, at this year's Black Hat conference in Las Vegas to discuss the challenges industry professionals face today.
SC Magazine catches up with Marcia Hofmann, senior staff attorney at the Electronic Frontier Foundation, who provides some legal guidance for researchers in the industry.
Industry professionals must update and continue to adapt their security tactics, according to an expert at this year's Black Hat conference in Las Vegas.
The FTC has made major moves this year in its fight against cyber crime, and if enterprises and organizations aren't careful, they may be facing a team of the agency's investigators.
Global companies facing a slew of regional laws, as well as small and midsized companies required to meet regulatory demands, need governance, risk and compliance solutions.