May 2014 Issue of SCMagazine
Our May issue features in-depth articles on cyber insurance, the latest on Bitcoins, and nation-state threats, as well as other industry insights and contributed articles by experts.
Just how vulnerable are we to an assault by the NSA, asks Illena Armstrong, SC's VP, editorial.
Target breach, flaw in WinRAR, SMS message attacks and other current news affecting the security industry.
In this month's debate, experts discuss whether or not companies should be obligated to sign up for cyber insurance.
The pervasiveness of drive-by downloads has made it our threat of the month for May.
Extortion isn't new when it comes to the threat landscape, but as of late, it seems as though it's the flavor of the times for ...
This month's company news includes a big acquisition by Blackstone, Alex Stamos joining Yahoo as VP of information security, and yet another big move within ...
Skills in Demand
There's a high demand for the assistance of cyber security contract specialists.
Me and my job
Challenges exist in areas of technology partner selection, managing employees and corporate role identity.
It turns out that using a DDNS service is the easiest and most pervasive method for creating sustainable command-and-control domains.
Having actionable insight into the goings on of your network is tantamount to managing operational variables.
You can't run an effective security program without the basics, says Patricia Titus, CISO, Freddie Mac.
It has soared in popularity, but is the leader in cryptocurrency viable enough for continued acceptance? Adam Greenberg investigates.
Following recent breaches, more organizations are investing in cyber insurance, says Mesa, Ariz.'s tech manager Alex Deshuk. Karen Epper Hoffman reports.
A website attack prompted an Australia-based mining company to shore up its security implementation, reports Greg Masters.
Espionage has been a fact of life for centuries, but with increased capabilities online, it's spread beyond a narrow core, reports James Hale.
With the end-of-support deadline for Windows XP just passed, firms large and small are at risk of attack, reports Kate O'Flaherty.
Gathered here are some of the most comprehensive digital forensic tools available.
Group Test 1
We are reviewing this suite of forensic tools as a package the same way we did last year because the elements work well together and ...
Cellebrite is, arguably, the number one mobile device forensic tool suite available.
Everything that one needs is in the case, including cables, adapters, a power brick and a space for extra disks.
EnCase Forensic v7.09.02 is the latest incarnation of the EnCase computer forensic tradition.
The only pure digital forensic case management tool of which we are aware.
This is a general purpose network forensic tool with a solid history.
These three products are approximately the same type of tool, but with different functionalities depending on the market in which they are used.
AhnLab refers to its product - MDS - as a malware defense system. I, however, think of it more as a malware management system.
Exec buy-in and new tech can help fight cyber threats, says BitSight's Stephen Boyer.
SC Magazine Articles
- PCI DSS version 3.2 release extends multifactor authentication requirement
- Over 7M Minecraft mobile credentials exposed after Lifeboat data breach
- New site on dark web offering one-stop ransom services
- Pwnedlist vulnerability exposed 866M accounts
- Turkish fascists claim responsibility for Qatar bank data breach
- DōTERRA breach exposes customer info; including SS, DOB, and addresses
- Federal court bucks trend, rules general liability insurance covers data breach
- The anatomy of a spearphishing scam, or how to steal $100M with a fake email
- Report: Ransomware feeds off poor endpoint security
- Pros examine Mossack Fonseca breach: WordPress plugin, Drupal likely suspects