A Q&A with Grant Babb, proactive investigations program manager for Intel IT.
Mobile security problems continue to vex many an IT security officer.
The challenge is using resources wisely and right-sizing a network security strategy that prioritizes protection.
Dan Kaplan, executive editor of SC Magazine, sits with WInn Schwartau to discuss what exactly keeps him up at night as a security professional.
A recent survey indicates that successful targeted attacks end up costing companies more than $200,000.
A move to the cloud means spending less on managing security for small to midsize companies, says a new report.
Dan Kaplan, executive editor of SC Magazine, sits with author and vendor Winn Schwartau to discuss what exactly keeps him up at night as a security professional.
Experts at this year's SC Congress Canada in Toronto discussed the challenges of BYOD and how implementing policies may be the industry's biggest weapon.
Threat of the month: Chrome exploit
Me and my job: Brian Wolfinger VP of electronic discovery & forensic services, LDiscovery
software developers with skills in collaboration software, databases and mobile device programming are needed.
The Social Security numbers of millions of Texas voters were mistakenly given to opposing lawyers by the state attorney's office as part of a voter ID case.
Virtualization software vendor, VMware, confirmed this week that source code from its ESX hypervisor technology was leaked onto the internet.
It's important to be familiar with one's network before going in to assess any damage or patch vulnerabilities. Although good technology may be deployed, accidents happen.
Bring-your-own-device and cloud security are just some of the topics that add to the changing threat landscape of online security.
By implementing some basic best practices, you will be able to adjust and defend against cybercriminals' new tactics.
CeCOS VI: The Counter eCrime Operations Summit: A cybercrime conference I can't get to, but heartily recommend
When it comes to the causes of data breaches in health care, these are four scenarios that could have easily been prevented.
Cyber criminals have cloaked spam to resemble US Airways check-in emails in phishing attempts that lead to Zeus trojan infections.
At a recent SC Magazine Roundtable, gov't security pros bemoaned the difficulty in obtaining resources. But instead of crying over spilled milk, they traded ideas for mitigating risk in a down economy.
Be patient and give staffers a real chance to show their stuff, says Michael Potters, CEO of the Glenmont Group.
Imagine a mobile device falling into the wrong hands - resulting in the draining of bank accounts co-opting of identities.
As more organizations move into the cloud, the demand for virtualization security architects is growing.
There are a whole host of things driving budget, resources and tweaks to security/risk management programs.
With data proliferating at astonishing rates, organizations are tearing into it, hoping to derive new business value, which, according to Zions CSO Preston Wood, includes better security decision making.
Much of the breach conversation over the past year has been devoted to so-called hacktivists. But nation-state adversaries, bent on looting organizations of intellectual property, are another breed entirely.
Network monitoring solutions for the enterprise should be holistically integrated with the complete security suite...
Debate: Anti-virus is essential.
One of the most talked about threats this month is the infamous Ukash ransomware.
Company news: M&A activity and personnel announcements