December 2012 Issue of SCMagazine
From stealthy to blatant tactics, 2012 has seen them all.
The latest news involving personnel and companies in the security industry, including Barracuda Networks' new CEO, and Incapsula's new alliance program.
This month's news briefs include the massive South Carolina breach, the detection of MiniFlame, and the debacle Barnes & Noble faced after scammers tampered with ...
Threat of the month
Our threat of the month for December are natural disasters, which result in the loss of confidentiality, integrity, and availability of sensitive information.
2 minutes on
As the threat landscape continues to evolve, one malicious tactic has stood the test of time: distributed denial-of-service attacks (DDoS).
Skills in Demand
The convergence of communications, VoIP and multimedia systems (video conferencing, webinars, peer-to-peer) has increased the demand for engineers capable of designing and managing systems.
Me and my job
A Q&A with Brian Calkin assistant director, Multi-State ISAC Security Operations Center at the Center for Internet Security.
Comprehensive cyber security legislation (or a presidential executive order) will happen in 2013.
This is the age of bring-your-own-device, and it is too late to turn back now.
As network security grows more elusive, CxOs need to ask their IT departments some tough questions.
We all know what we spend internally, but how do we get reliable, timely information for comparison purposes?
Here's a year-end look back at some of the biggest mergers and acquisitions activity in the security space.
Valerie Aurora and Mary Gardiner have united to form a decade-long collaboration on a variety of "women in open source" advocacy projects, including developing anti-harassment ...
Michael Coates, director of security assurance at Mozilla and chairman of OWASP, is a steadfast supporter of open-source methods to safeguard users against security and ...
Gabriella Coleman, professor at McGill University in Montreal and avid observer of the Anonymous online collective, has become one of the pre-eminent thought leaders on ...
Ron Ross is helping to lead the development of new standards and controls that security professionals can use to safeguard their organizations against today's internet ...
Chris Soghoian, who was recently hired as the ACLU's first-ever principal technologist, has never been afraid to ruffle the feathers of the corporate establishment when ...
The threats to enterprise networks continued to grow this year, but the tech grab bag is also getting more potent, reports Alan Earls.
A group of prominent security professionals forecast the most significant industry shifts in 2013. Greg Masters compiles the responses.
This year, the information security industry has given all of us a gift of sorts: a bumper crop of new tools. And, we're calling out ...
It's all about protecting enterprise data, says Peter Stephenson, technology editor.
When we talk about access control, we usually assume that we are discussing all of its aspects, including identification, authentication and authorization.
There are two times when we need analysis and testing: before and after an event.
Now we get to the meat of the issue: Protecting the data directly.
Protecting the perimeter is usually about dealing with threats and this year's Innovators do a great job of addressing that.
These tools define and manage the security infrastructure by managing risk and implementing policy.
The cloud and its core enabling architecture virtualization needs a special kind of security.
This year's inductees have a loyal following, good year-on-year growth and the right stuff for their respective niches
2013 may be the year that U.S. companies strike back at their cyber adversaries, says Taia Global's Jeffrey Carr.
SC Magazine Articles
- USAA members hit with multiple phishing attacks
- Industry pros react to Cisco, Fortinet advisories after possible Snowden NSA leak
- Trust exercise: Symantec's new website security expert is reaching out to hacker community
- Three zero-days found in iOS, Apple suggests users update their iPhone
- Two-thirds of IT security pros surveyed expect a breach to hit their company, report
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Wendy's POS breach 'considerably' bigger than first thought
- No hacking required: Israeli researchers show how to steal data through PC components
- Don't connect your charging cell to a computer or you may get hacked!