December 2013 Issue of SCMagazine
Reboot 2013 features our industry luminaries, innovators, and lists of what we think were the top threats, law enforcements actions, and breaches in 2013.
Like no other year before it, 2013 illustrated for the entire globe just how essential cyber security is to business endurance, economic durability and personal ...
Adobe breach affects 38 million, UK man indicted for hack of U.S. Army network, NIST debuts new cyber security framework, and other news.
This month's industry news includes a new CEO at Appthority, recent funding acquired by Lookout, and Catbird's new CTO.
Threat of the month
December's threat of the month is domain hijacking, a popular attack technique that takes over major domains.
2 minutes on
The role of the CISO is rapidly garnering a strategic voice at many organizations.
Skills in Demand
The need for computer forensic examiners (aka "CFE") is on the rise.
Me and my job
BitDefender's Alexandru Catalin Cosoi discusses role and what he'd like to see occur in the security space.
In this month's debate, experts discuss whether the biometrics on Apple's iPhone 5s will evolve the security of personal devices.
The right form of network security can - and will - support continuous monitoring and network security management initiatives.
We must stop the insanity by focusing on the data and controlling privileged user access.
Information security personnel are challenged with protecting company reputation and enterprise and customer data from a constant and expanding barrage of cyber criminals.
A group of prominent security professionals forecast the significant industry shifts in 2014. Greg Masters compiles the responses.
As this year-end issue demonstrates, the vibrancy of this industry is as bright as ever and the challenges only more acute. However, stellar professionals on ...
What self-described "stunt hackers" Charlie Miller and Chris Valasek did to a Ford Focus on national TV was akin to breaking into a home, raiding ...
Chris Mitchell's creation, Uni-IDM (universal identity management), is a software-based tool that helps users manage the authentication process.
Jay Radcliffe showed how his insulin pump was vulnerable to a remote takeover.
Phyllis Schneck takes a level-headed approach to how the DHS should address potential attacks against critical infrastructure.
The revelations about government surveillance made public by Edward Snowden have brought urgency and clarity to the work Jennifer Stisa Granick is doing as director ...
We salute a number of professionals - including lawyers, analysts, journalists and engineers - whose achievements in 2013 greatly enhanced the IT security industry and those ...
We pay tribute to two security pros whose life's work helped evolve the technology and thinking of the IT security industry.
A compendium highlighting 2013's top mergers and acquisitions activity in the information security industry.
Enabling students to reset their own passwords relieved IT staff - and network congestion - at a North Carolina college. Greg Masters reports.
In the spirit of keeping up with advancements in information security, we take the December issue to examine those companies that will likely generate advancements.
Don't hang your hat on enterprise app store security, says Jack Walsh at ICSA Labs.
Products: Industry Innovators
Along with innovation comes uniqueness, says Peter Stephenson, technology editor.
Access control is, arguably, the key aspect of information protection.
Analysis and testing covers the entire gamut of testing - from forensic tools to penetration testing.
Since it's all about the data why not go straight to the data and protect it directly?
How do we protect a perimeter that does not, physically, exist?
GRC is at once the biggest pain point (arguably) of most large organizations and the most important task that does not usually get done right.
When we talk about the cloud, we need to realize that the concept of the cloud is a business, not a technical, construct.
The greatest pleasure that we have in writing this section each year is seeing who has the innovation and staying power to make it to ...
SC Magazine Articles
- Yahoo breach; State-sponsored actors suspected, at least 500 million accounts affected
- Cybercriminals already able to hack ATM biometric readers
- Education sector bullied by ransomware and can barely defend itself, report
- IoT assault, connected devices increasingly used for DDoS attacks
- Cisco warns of exploitation of new flaws linked to Shadow Brokers exploits
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Hard Rock Hotel & Casino Las Vegas hit with POS breach
- X-ray and MRI machines among devices used as springboards for data breach attacks
- Hacker purportedly selling over 650,000 stolen medical records on dark web marketplace
- Wi-Fi warning! Study finds U.S. unaware of public Wi-fi risks
- Presidential debate 2016: Candidates pledge cyber investment, differ on Russia
- Yahoo faces congressional action and class action lawsuits following historic data breach
- Case study: Hawaiian Telcom says aloha to AlienVault security management
- Pippa Middleton's iCloud account hacked
- OpenSSL patches 14 vulns, including high-severity flaw that can be exploited for DoS attacks