May 2014 Issue of SCMagazine
Our May issue features in-depth articles on cyber insurance, the latest on Bitcoins, and nation-state threats, as well as other industry insights and contributed articles by experts.
Just how vulnerable are we to an assault by the NSA, asks Illena Armstrong, SC's VP, editorial.
Target breach, flaw in WinRAR, SMS message attacks and other current news affecting the security industry.
In this month's debate, experts discuss whether or not companies should be obligated to sign up for cyber insurance.
The pervasiveness of drive-by downloads has made it our threat of the month for May.
Extortion isn't new when it comes to the threat landscape, but as of late, it seems as though it's the flavor of the times for ...
This month's company news includes a big acquisition by Blackstone, Alex Stamos joining Yahoo as VP of information security, and yet another big move within ...
Skills in Demand
There's a high demand for the assistance of cyber security contract specialists.
Me and my job
Challenges exist in areas of technology partner selection, managing employees and corporate role identity.
It turns out that using a DDNS service is the easiest and most pervasive method for creating sustainable command-and-control domains.
Having actionable insight into the goings on of your network is tantamount to managing operational variables.
You can't run an effective security program without the basics, says Patricia Titus, CISO, Freddie Mac.
It has soared in popularity, but is the leader in cryptocurrency viable enough for continued acceptance? Adam Greenberg investigates.
Following recent breaches, more organizations are investing in cyber insurance, says Mesa, Ariz.'s tech manager Alex Deshuk. Karen Epper Hoffman reports.
A website attack prompted an Australia-based mining company to shore up its security implementation, reports Greg Masters.
Espionage has been a fact of life for centuries, but with increased capabilities online, it's spread beyond a narrow core, reports James Hale.
With the end-of-support deadline for Windows XP just passed, firms large and small are at risk of attack, reports Kate O'Flaherty.
Gathered here are some of the most comprehensive digital forensic tools available.
Group Test 1
We are reviewing this suite of forensic tools as a package the same way we did last year because the elements work well together and ...
Cellebrite is, arguably, the number one mobile device forensic tool suite available.
Everything that one needs is in the case, including cables, adapters, a power brick and a space for extra disks.
EnCase Forensic v7.09.02 is the latest incarnation of the EnCase computer forensic tradition.
The only pure digital forensic case management tool of which we are aware.
This is a general purpose network forensic tool with a solid history.
These three products are approximately the same type of tool, but with different functionalities depending on the market in which they are used.
AhnLab refers to its product - MDS - as a malware defense system. I, however, think of it more as a malware management system.
Exec buy-in and new tech can help fight cyber threats, says BitSight's Stephen Boyer.
SC Magazine Articles
- WhatsApp in the spotlight after Turkey publishes messages of coup officers
- WordPress Summer of Pwnage: 64 holes in 21 days
- Deal with the devil: Ransomware experiment proves you can negotiate price down
- 2.3 million 'Warframe,' 'Clash of Kings' accounts compromised
- Microsoft EOP exposes users to data breaches, whitepaper
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Hard Rock Hotel & Casino Las Vegas hit with POS breach
- X-ray and MRI machines among devices used as springboards for data breach attacks
- Hacker purportedly selling over 650,000 stolen medical records on dark web marketplace
- Wi-Fi warning! Study finds U.S. unaware of public Wi-fi risks
- Trump's Russian interests and Guccifer 2.0
- Russian hackers take the stage at DNC convention
- TSA master key hackers expose dangers of physical and digital key escrow policies
- Patchwork cyberespionage campaign branches out to strike businesses
- Proliferation of hacker culture helped keep Anonymous from being branded terrorist org