It's not news anymore that cyberattackers penetrating corporate networks are after money, not infamy, these days. The bread they can make from these and other ...
Kevin Prince has joined Perimeter Internetworking as chief security officer. Prince will help formulate the managed network security firm's strategic and product development plans and ...
The uproar over foreign control over American interests was blamed for the break-up of one nearly successful IT security merger. Check Point Software Technologies Ltd., ...
NBA systems are the most effective solutions for stopping worms and viruses.
Some believe it is nothing more than a paper exercise. The government earned poor marks on information security this year. Of the 24 agencies graded, ...
How did you get into security? In my case, the question could be phrased, "How did security get into you?" I am not an infosec ...
We all have colleagues with whom we keep in touch. We all have colleagues who we call on from time to time for help when ...
Business in the Participation Age is all about engagement and collaboration. It’s about access, transparency and trust. Today, the isolationist approach to security – the ...
Many of us are struggling to extend security responsibility and accountability to third-party vendors and outsourcing companies.
Send your comments, praise or criticisms to scfeedbackus@haymarketmedia.com. We reserve the right to edit letters.
SC Magazine is providing an exclusive look at abridged versions of various chapters included in the just-released Larstan's The Black Book on Government Security, as ...
Gain insight and contacts to help achieve your goals as an IT security professional, but act fast.
Call it another unintentional legacy of Enron, WorldCom and other corporate accounting scandals of the past decade.
As if dealing with skyrocketing numbers of new vulnerabilities each day is not enough, the IT security world must now brace for a new challenge: ...
Back in the old days, at least by malicious hacking standards, the simplest way to hijack a PC was to compromise the vulnerable entryways of ...
A United States federal government agency didn't need to point out the weaknesses of username and password authentication to E*Trade Financial's CIO Greg Framke. He ...
In 2005, storage security losses frequently garnered a storm of media attention, with one organization losing computer backup tapes with personal information on current and ...