Throughout the day, SC Magazine will be announcing the finalists from each of its 32 award categories, covering the Reader Trust, Professional and Excellence sections.
To fight today's sophisticated adversaries and protect the nation's digital infrastructure, the cybersecurity industry must unite technologies, develop new ones and cultivate experts.
The Department of Homeland Security (DHS) division tasked with coordinating the cyber defense of federal agencies is falling short in several areas, according to an inspector general report released Wednesday.
Firewalls are again becoming talk of the town. There are an enormous amount of opinions including claims of a recent firewall revolution that have been proposed to completely change the firewall landscape. I will be the first to admit that the features and capabilities offered in today's firewall products are not the same as was offered in their original incarnation. But then again, traffic patterns and applications are not the same as they were when firewalls first hit the market.
Accused NASA hacker is running out options to avoid extradition to the United States.
A new report says web application firewalls and intrusion prevention systems are necessary technologies for many businesses, but intrusion detection systems and network behavior anomaly detection technologies are declining in popularity.
The National Security Agency will assist in a new program to monitor government traffic on private-sector computer networks, as part of a new program called Einstein 3, according to a published report.
A fundamental tension exists in balancing individual privacy rights and the collective right to security, Gary McGraw, CTO of application security vendor Cigital said at the RSA Conference Tuesday.
The Pentagon has spent more than $100 million in the past six months repairing damage to its networks caused by cyberattacks, according to military officials.
Foreign spies have penetrated the U.S. power grid, and left behind malicious software that could be activated at a later date to disrupt the nation's electric system, according to a published report.
The recently uncovered cyberespionage network named GhostNet made use of phishing malware to attack the nearly 1,300 computers that are said to have been compromised by servers traced to China.
Vulnerabilities in web applications made up 80 percent of all web-related flaws in the second half of 2008 and rose in prevalence by about eight percent from the first half of the year.
Web filtering today goes beyond just blocking access. It now has to be integrating Web 2.0, managing data leakage, and guarding against malware coming in, according to a new study.
Managed security vendor Trustwave will add network access control (NAC) technology to its suite of solutions with its acquisition of Mirage Networks, the company announced Tuesday.
StillSecure has acquired ProtectPoint Security, a managed security services provider. The deal, announced Monday, helps round out StillSecure's line of NAC, IDS/IPS and vulnerability management products, the company said. Teams from both companies will integrate manufacturing and management efforts to build and manage network security. Terms of the deal were not disclosed; both companies are privately held. — CAM
An online computer supplies and electronics retailer settled Federal Trade Commission charges that it violated federal law by not providing adequate security to protect customer data, the agency announced Thursday.
One of the congressmen who admitted last year that his office computers were hacked wants to raise cybersecurity awareness on Capitol Hill.
With attackers shifting their focus to applications, the IT team at University of Miami, Miller School of Medicine, decided it was time to upgrade the school's intrusion prevention solution, reports Greg Masters.
A former employee of the U.S. Department of State was sentenced for unauthorized access to a database containing passport applicants' confidential information.
A pharmacy benefits firm offers $1 million for information leading to the conviction of a band of data thief extortionists.
The stakes were high when scores of researchers and investigators met Tuesday for the twice-annual International Botnet Task Force meeting.
A Miami man pleaded guilty this week for his involvement in the wireless-enabled data heists at TJX and a number of other well-known retailers.
Sign up to our newsletters
SC Magazine Articles
- CTB-Locker ransomware variant being distributed in spam campaign
- 'Sexy Girls' wallpaper app in Google Play store accessed account info
- Proposed CFAA revisions agitate IT security community
- New attack uses ransomware to drop trojans and keyloggers
- Firm finds link between Regin spy tool and QWERTY keylogger
- Zeus variant targeting Canadian banks, U.S. banks may also be a target
- Winnti trojan may help set stage for Skeleton Key attacks, analysts say
- FTC settles with revenge porn site operator
- Upatre, Dyre used in Univ. of Florida attack
- Wisconsin chiropractic clinic notifies 3,000 patients of insider breach