May 2014 Issue of SCMagazine
Our May issue features in-depth articles on cyber insurance, the latest on Bitcoins, and nation-state threats, as well as other industry insights and contributed articles by experts.
Just how vulnerable are we to an assault by the NSA, asks Illena Armstrong, SC's VP, editorial.
Target breach, flaw in WinRAR, SMS message attacks and other current news affecting the security industry.
In this month's debate, experts discuss whether or not companies should be obligated to sign up for cyber insurance.
The pervasiveness of drive-by downloads has made it our threat of the month for May.
Extortion isn't new when it comes to the threat landscape, but as of late, it seems as though it's the flavor of the times for ...
This month's company news includes a big acquisition by Blackstone, Alex Stamos joining Yahoo as VP of information security, and yet another big move within ...
Skills in Demand
There's a high demand for the assistance of cyber security contract specialists.
Me and my job
Challenges exist in areas of technology partner selection, managing employees and corporate role identity.
It turns out that using a DDNS service is the easiest and most pervasive method for creating sustainable command-and-control domains.
Having actionable insight into the goings on of your network is tantamount to managing operational variables.
You can't run an effective security program without the basics, says Patricia Titus, CISO, Freddie Mac.
It has soared in popularity, but is the leader in cryptocurrency viable enough for continued acceptance? Adam Greenberg investigates.
Following recent breaches, more organizations are investing in cyber insurance, says Mesa, Ariz.'s tech manager Alex Deshuk. Karen Epper Hoffman reports.
A website attack prompted an Australia-based mining company to shore up its security implementation, reports Greg Masters.
Espionage has been a fact of life for centuries, but with increased capabilities online, it's spread beyond a narrow core, reports James Hale.
With the end-of-support deadline for Windows XP just passed, firms large and small are at risk of attack, reports Kate O'Flaherty.
Gathered here are some of the most comprehensive digital forensic tools available.
Group Test 1
We are reviewing this suite of forensic tools as a package the same way we did last year because the elements work well together and ...
Cellebrite is, arguably, the number one mobile device forensic tool suite available.
Everything that one needs is in the case, including cables, adapters, a power brick and a space for extra disks.
EnCase Forensic v7 is the latest incarnation of the EnCase computer forensic tradition.
The only pure digital forensic case management tool of which we are aware.
This is a general purpose network forensic tool with a solid history.
These three products are approximately the same type of tool, but with different functionalities depending on the market in which they are used.
AhnLab refers to its product - MDS - as a malware defense system. I, however, think of it more as a malware management system.
Exec buy-in and new tech can help fight cyber threats, says BitSight's Stephen Boyer.
Sign up to our newsletters
SC Magazine Articles
- Zero-day in Fiat Chrysler feature allows remote control of vehicles
- 'GSMem' malware designed to infiltrate air-gapped computers, steal data
- All smartwatches are vulnerable to attack, finds study
- Apple App Store and iTunes buyers hit by zero-day
- Hacking Team issues new statement while researcher clears up Android tool confusion
- United reportedly hacked by same group that breached Anthem, OPM
- HAMMERTOSS malware represents culmination of 'best practices' for cyber attackers
- Hundreds of Massachusetts General Hospital patients notified of data incident
- Majority of Android devices vulnerable to denial-of-service bug
- Security concerns raised at Windows 10 roll-out