December 2012 Issue of SCMagazine
From stealthy to blatant tactics, 2012 has seen them all.
The latest news involving personnel and companies in the security industry, including Barracuda Networks' new CEO, and Incapsula's new alliance program.
This month's news briefs include the massive South Carolina breach, the detection of MiniFlame, and the debacle Barnes & Noble faced after scammers tampered with ...
Threat of the month
Our threat of the month for December are natural disasters, which result in the loss of confidentiality, integrity, and availability of sensitive information.
2 minutes on
As the threat landscape continues to evolve, one malicious tactic has stood the test of time: distributed denial-of-service attacks (DDoS).
Skills in Demand
The convergence of communications, VoIP and multimedia systems (video conferencing, webinars, peer-to-peer) has increased the demand for engineers capable of designing and managing systems.
Me and my job
A Q&A with Brian Calkin assistant director, Multi-State ISAC Security Operations Center at the Center for Internet Security.
Comprehensive cyber security legislation (or a presidential executive order) will happen in 2013.
This is the age of bring-your-own-device, and it is too late to turn back now.
As network security grows more elusive, CxOs need to ask their IT departments some tough questions.
We all know what we spend internally, but how do we get reliable, timely information for comparison purposes?
Here's a year-end look back at some of the biggest mergers and acquisitions activity in the security space.
Valerie Aurora and Mary Gardiner have united to form a decade-long collaboration on a variety of "women in open source" advocacy projects, including developing anti-harassment ...
Michael Coates, director of security assurance at Mozilla and chairman of OWASP, is a steadfast supporter of open-source methods to safeguard users against security and ...
Gabriella Coleman, professor at McGill University in Montreal and avid observer of the Anonymous online collective, has become one of the pre-eminent thought leaders on ...
Ron Ross is helping to lead the development of new standards and controls that security professionals can use to safeguard their organizations against today's internet ...
Chris Soghoian, who was recently hired as the ACLU's first-ever principal technologist, has never been afraid to ruffle the feathers of the corporate establishment when ...
The threats to enterprise networks continued to grow this year, but the tech grab bag is also getting more potent, reports Alan Earls.
A group of prominent security professionals forecast the most significant industry shifts in 2013. Greg Masters compiles the responses.
This year, the information security industry has given all of us a gift of sorts: a bumper crop of new tools. And, we're calling out ...
It's all about protecting enterprise data, says Peter Stephenson, technology editor.
When we talk about access control, we usually assume that we are discussing all of its aspects, including identification, authentication and authorization.
There are two times when we need analysis and testing: before and after an event.
Now we get to the meat of the issue: Protecting the data directly.
Protecting the perimeter is usually about dealing with threats and this year's Innovators do a great job of addressing that.
These tools define and manage the security infrastructure by managing risk and implementing policy.
The cloud and its core enabling architecture virtualization needs a special kind of security.
This year's inductees have a loyal following, good year-on-year growth and the right stuff for their respective niches
2013 may be the year that U.S. companies strike back at their cyber adversaries, says Taia Global's Jeffrey Carr.
Sign up to our newsletters
SC Magazine Articles
- Long list of devices believed to be affected by NetUSB vulnerability
- Scammers target oil companies with sneaky attack
- CareFirst BlueCross BlueShield breached, more than one million individuals notified
- Study: Employees acknowledge risky security behavior, continue to engage in it
- Hack of airplane systems described in FBI docs raises security questions
- Hackers exploit Starbucks auto-reload feature to steal from customers
- Study: Nearly all SAP systems remain unpatched and vulnerable to attacks
- Former Nuclear Regulatory Commission employee arrested for alleged spear phishing campaign
- Millions of WordPress websites vulnerable to XSS bug
- FireEye first cybersecurity firm awarded DHS SAFETY Act certification
- Thousands of Bellevue Hospital Center patients notified of data breach
- Study: 86 percent of websites contain at least one 'serious' vulnerability
- Investigation ongoing in reported multimillion member Adult FriendFinder breach
- Report: $19M breach settlement between MasterCard, Target terminated
- FTC gives thumbs up to companies that cooperate during breach probes