December 2011 Issue of SCMagazine
At no time in our history have we seen individuals and organizations so dependent on IT.
Hacktivist group Anonymous, Duqu, malware reports and more
Alex Eckelberry, VP and general manager of GFI Software, has left the company
Threat of the month
Threat of the month: Unpatched applications
2 minutes on
Then-candidate Barack Obama masterfully leveraged the web in a way never before done by a presidential candidate, but he also witnessed the online medium's underbelly.
Skills in Demand
Companies are relying on vendors for the achievement of their business objectives through outsourcing of development, creating products and services, consulting and augmenting staff.
Me and my job
A Q&A with an IT security professional in the trenches.
Debate: The Stuxnet authors are behind the Duqu trojan.
As we look at the reasons why security fails in organizations, it keeps coming back to people, says Justin Somaini, CISO, Yahoo!
It's not all fun and games at Brady Distribution Co., a supplier of arcade entertainment, especially when malware and DDoS attacks are involved. Learn how ...
This year-end special section focuses on people who represent the highest degree of professionalism in security, individuals who stand out for their technical skills, managerial ...
Guesses for what a new year will bring often are wrong, but that doesn't mean we can't try, right? A group of some of our ...
While the financial services industry traditionally has been quicker to embrace cybersecurity than other verticals, the challenges it faces, like meeting compliance and deterring fraud, ...
The remarkable companies that we highlight in this issue are blazing the trails in their respective market segments through pure creativity and innovation.
Cutting edge is alive and well again, says Peter Stephenson, technology editor.
Products: Industry Innovators
As long as we want to allow some users access and deny others, these products will be with us.
We would be hard-pressed to find many product categories in the security space that did not have some encryption component associated with them.
Each year, we look at the burgeoning field of digital forensics and try to figure out which companies are doing the heavy lifting in terms ...
The infrastructure is everything about the enterprise that supports the applications and, therefore, protecting the data means protecting the infrastructure.
If there is anything that characterizes today's computing environment - beyond virtualization and the techniques that has fostered - it is the pervasiveness of mobile ...
Being able to address problems at the application layer is a key aspect of protecting the ever-fading perimeter in the enterprise of the future.
A next-generation UTM developer needs to learn from and then forget the past.
Virtualization has been with us in one form or another for a long time, but now that it is a staple of the systems world, ...
While there have been numerous prequels to the current state of vulnerability assessment (VA) tools, the Big Kahuna has been combining traditional VA with traditional ...
This year, there is only one Hall of Fame designation, but it is an interesting story because it is the amalgam of two companies.
To avoid past mistakes, one should appeal to outside experts, says Kyrus CTO Michael Tanji.
Sign up to our newsletters
SC Magazine Articles
- Popular adult website XTube compromised, delivers malware
- Orgs predict $53M risk, on average, from crypto key, digital cert attacks
- Report: More than 15,000 vulnerabilities in nearly 4,000 applications reported in 2014
- British Airways says rewards accounts hacked, locked down
- IBM will invest $3 billion in new IoT unit
- Wake up! What are you doing to battle breach fatigue?
- Obama orders new sanctions program to deter foreign cyber attackers
- 'Volatile Cedar' APT group spies on enterprises, focusing on Lebanese companies
- Orgs need to share info, crave more board oversight, study says
- Human error cited as leading contributor to breaches, study shows