May 2014 Issue of SCMagazine
Our May issue features in-depth articles on cyber insurance, the latest on Bitcoins, and nation-state threats, as well as other industry insights and contributed articles by experts.
Just how vulnerable are we to an assault by the NSA, asks Illena Armstrong, SC's VP, editorial.
Target breach, flaw in WinRAR, SMS message attacks and other current news affecting the security industry.
In this month's debate, experts discuss whether or not companies should be obligated to sign up for cyber insurance.
The pervasiveness of drive-by downloads has made it our threat of the month for May.
Extortion isn't new when it comes to the threat landscape, but as of late, it seems as though it's the flavor of the times for ...
This month's company news includes a big acquisition by Blackstone, Alex Stamos joining Yahoo as VP of information security, and yet another big move within ...
Skills in Demand
There's a high demand for the assistance of cyber security contract specialists.
Me and my job
Challenges exist in areas of technology partner selection, managing employees and corporate role identity.
It turns out that using a DDNS service is the easiest and most pervasive method for creating sustainable command-and-control domains.
Having actionable insight into the goings on of your network is tantamount to managing operational variables.
You can't run an effective security program without the basics, says Patricia Titus, CISO, Freddie Mac.
It has soared in popularity, but is the leader in cryptocurrency viable enough for continued acceptance? Adam Greenberg investigates.
Following recent breaches, more organizations are investing in cyber insurance, says Mesa, Ariz.'s tech manager Alex Deshuk. Karen Epper Hoffman reports.
A website attack prompted an Australia-based mining company to shore up its security implementation, reports Greg Masters.
Espionage has been a fact of life for centuries, but with increased capabilities online, it's spread beyond a narrow core, reports James Hale.
With the end-of-support deadline for Windows XP just passed, firms large and small are at risk of attack, reports Kate O'Flaherty.
Exec buy-in and new tech can help fight cyber threats, says BitSight's Stephen Boyer.
Gathered here are some of the most comprehensive digital forensic tools available.
Group Test 1
We are reviewing this suite of forensic tools as a package the same way we did last year because the elements work well together and ...
Cellebrite is, arguably, the number one mobile device forensic tool suite available.
Everything that one needs is in the case, including cables, adapters, a power brick and a space for extra disks.
EnCase Forensic v7.09.02 is the latest incarnation of the EnCase computer forensic tradition.
The only pure digital forensic case management tool of which we are aware.
This is a general purpose network forensic tool with a solid history.
These three products are approximately the same type of tool, but with different functionalities depending on the market in which they are used.
AhnLab refers to its product - MDS - as a malware defense system. I, however, think of it more as a malware management system.
Sign up to our newsletters
SC Magazine Articles
- Skype targeted by T9000 backdoor trojan
- CISO salaries and demand for cyber-skills skyrockets, surprising no-one
- Student SSNs exposed in University of Central Florida breach
- Malwarebytes says sorry for multiple AV bugs, still unpatched
- Ransomware and POS attackers to zero in on small businesses, retailers
- Senate, House OK Judicial Redress Act, send to Obama to sign
- Hearthstone gamers who download cheats may be cursed with malware
- Cryptowall has been a cash bonanza for criminals, failure for cops
- IRS hackers try to use stolen SSNs to generate E-file PINs
- Report: Pros urged to roll out IT projects before they are security-ready