IT Security News, Articles and Updates
Mobile security problems continue to vex many an IT security officer.
The challenge is using resources wisely and right-sizing a network security strategy that prioritizes protection.
Dan Kaplan, executive editor of SC Magazine, sits with WInn Schwartau to discuss what exactly keeps him up at night as a security professional.
Dan Kaplan, executive editor of SC Magazine, sits with author and vendor Winn Schwartau to discuss what exactly keeps him up at night as a security professional.
Threat of the month: Chrome exploit
Me and my job: Brian Wolfinger VP of electronic discovery & forensic services, LDiscovery
Virtualization software vendor, VMware, confirmed this week that source code from its ESX hypervisor technology was leaked onto the internet.
Bring-your-own-device and cloud security are just some of the topics that add to the changing threat landscape of online security.
By implementing some basic best practices, you will be able to adjust and defend against cybercriminals' new tactics.
CeCOS VI: The Counter eCrime Operations Summit: A cybercrime conference I can't get to, but heartily recommend
When it comes to the causes of data breaches in health care, these are four scenarios that could have easily been prevented.
Cyber criminals have cloaked spam to resemble US Airways check-in emails in phishing attempts that lead to Zeus trojan infections.
There are a whole host of things driving budget, resources and tweaks to security/risk management programs.
With data proliferating at astonishing rates, organizations are tearing into it, hoping to derive new business value, which, according to Zions CSO Preston Wood, includes better security decision making.
Much of the breach conversation over the past year has been devoted to so-called hacktivists. But nation-state adversaries, bent on looting organizations of intellectual property, are another breed entirely.
At a recent SC Magazine Roundtable, gov't security pros bemoaned the difficulty in obtaining resources. But instead of crying over spilled milk, they traded ideas for mitigating risk in a down economy.
Be patient and give staffers a real chance to show their stuff, says Michael Potters, CEO of the Glenmont Group.
Imagine a mobile device falling into the wrong hands - resulting in the draining of bank accounts co-opting of identities.
Debate: Anti-virus is essential.
One of the most talked about threats this month is the infamous Ukash ransomware.
Company news: M&A activity and personnel announcements
As more organizations move into the cloud, the demand for virtualization security architects is growing.
There's a certain amount of tension between testers and vendors from time to time, even in the rarified atmosphere of an AMTSO workshop.
Most businesses don't understand how to manage risk, yet, we live in a world full of risks, says Guidance Software's Anthony Di Bello.
"Budgets are low, while threats are increasing," said Hugh Njemanze, CTO and VP of worldwide research and development at HP Enterprise Security, at this year's RSA Conference 2012.
John Vigoroux, CEO of security at M86, discusses the challenges facing the IT industry today at this year's RSA Conference 2012.
Standards and policy leaders are concerned about the lack of threat intelligence on smart grid.
Threat of the month: Compromised embedded systems
To thrwart web attackers, organizations must think like a criminal and turn to tricks that will stop attackers in their tracks -- or even make them believe that they are succeeding.
We've recently been witnessing tremendous change in perspective when it comes to IT security and the shroud of embarrassment associated with breaches has been lifting.
SC Magazine Articles
- Three zero-days found in iOS, Apple suggests users update their iPhone
- MedSec goes its own way with medical device flaw
- Juniper confirms leaked "NSA exploits" affect its firewalls, no patch released yet
- Researchers find seven classes of vulnerabilities in iOS sandbox security feature
- Ransomware: The evolution of cybercrime, a roundtable
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Wendy's POS breach 'considerably' bigger than first thought
- No hacking required: Israeli researchers show how to steal data through PC components
- Don't connect your charging cell to a computer or you may get hacked!
- Six senators urge Obama to prioritize cybercrime at G20 summit
- Creating a buzz: USBee software causes air-gapped computers to leak data via USB connections
- Privacy advocates upset over FAA drone regulations, citizen takes action
- Voter database hack in Illinois by foreign intruder compromises info of 200K
- Fantom and FairWare ransomware discovered