December 2013 Issue of SCMagazine
Reboot 2013 features our industry luminaries, innovators, and lists of what we think were the top threats, law enforcements actions, and breaches in 2013.
Like no other year before it, 2013 illustrated for the entire globe just how essential cyber security is to business endurance, economic durability and personal ...
Adobe breach affects 38 million, UK man indicted for hack of U.S. Army network, NIST debuts new cyber security framework, and other news.
This month's industry news includes a new CEO at Appthority, recent funding acquired by Lookout, and Catbird's new CTO.
Threat of the month
December's threat of the month is domain hijacking, a popular attack technique that takes over major domains.
2 minutes on
The role of the CISO is rapidly garnering a strategic voice at many organizations.
Skills in Demand
The need for computer forensic examiners (aka "CFE") is on the rise.
Me and my job
BitDefender's Alexandru Catalin Cosoi discusses role and what he'd like to see occur in the security space.
In this month's debate, experts discuss whether the biometrics on Apple's iPhone 5s will evolve the security of personal devices.
The right form of network security can - and will - support continuous monitoring and network security management initiatives.
We must stop the insanity by focusing on the data and controlling privileged user access.
Information security personnel are challenged with protecting company reputation and enterprise and customer data from a constant and expanding barrage of cyber criminals.
A group of prominent security professionals forecast the significant industry shifts in 2014. Greg Masters compiles the responses.
As this year-end issue demonstrates, the vibrancy of this industry is as bright as ever and the challenges only more acute. However, stellar professionals on ...
What self-described "stunt hackers" Charlie Miller and Chris Valasek did to a Ford Focus on national TV was akin to breaking into a home, raiding ...
Chris Mitchell's creation, Uni-IDM (universal identity management), is a software-based tool that helps users manage the authentication process.
Jay Radcliffe showed how his insulin pump was vulnerable to a remote takeover.
Phyllis Schneck takes a level-headed approach to how the DHS should address potential attacks against critical infrastructure.
The revelations about government surveillance made public by Edward Snowden have brought urgency and clarity to the work Jennifer Stisa Granick is doing as director ...
We salute a number of professionals - including lawyers, analysts, journalists and engineers - whose achievements in 2013 greatly enhanced the IT security industry and those ...
We pay tribute to two security pros whose life's work helped evolve the technology and thinking of the IT security industry.
A compendium highlighting 2013's top mergers and acquisitions activity in the information security industry.
Enabling students to reset their own passwords relieved IT staff - and network congestion - at a North Carolina college. Greg Masters reports.
Don't hang your hat on enterprise app store security, says Jack Walsh at ICSA Labs.
In the spirit of keeping up with advancements in information security, we take the December issue to examine those companies that will likely generate advancements.
Products: Industry Innovators
Along with innovation comes uniqueness, says Peter Stephenson, technology editor.
Access control is, arguably, the key aspect of information protection.
Analysis and testing covers the entire gamut of testing - from forensic tools to penetration testing.
Since it's all about the data why not go straight to the data and protect it directly?
How do we protect a perimeter that does not, physically, exist?
GRC is at once the biggest pain point (arguably) of most large organizations and the most important task that does not usually get done right.
When we talk about the cloud, we need to realize that the concept of the cloud is a business, not a technical, construct.
The greatest pleasure that we have in writing this section each year is seeing who has the innovation and staying power to make it to ...
Sign up to our newsletters
SC Magazine Articles
- CTB-Locker ransomware variant being distributed in spam campaign
- 'Sexy Girls' wallpaper app in Google Play store accessed account info
- Proposed CFAA revisions agitate IT security community
- New attack uses ransomware to drop trojans and keyloggers
- Firm finds link between Regin spy tool and QWERTY keylogger
- Zeus variant targeting Canadian banks, U.S. banks may also be a target
- Winnti trojan may help set stage for Skeleton Key attacks, analysts say
- FTC settles with revenge porn site operator
- Upatre, Dyre used in Univ. of Florida attack
- Wisconsin chiropractic clinic notifies 3,000 patients of insider breach