IT Security

How mobile security breeds concern for companies

How mobile security breeds concern for companies

By

Mobile security problems continue to vex many an IT security officer.

The high risk of lower data breach costs

The high risk of lower data breach costs

The challenge is using resources wisely and right-sizing a network security strategy that prioritizes protection.

Video: What scares the living IT out of you?

By

Dan Kaplan, executive editor of SC Magazine, sits with WInn Schwartau to discuss what exactly keeps him up at night as a security professional.

SC Congress Canada: What scares the living IT out of you?

SC Congress Canada: What scares the living IT out of you?

By

Dan Kaplan, executive editor of SC Magazine, sits with author and vendor Winn Schwartau to discuss what exactly keeps him up at night as a security professional.

Threat of the month: Chrome exploit

Threat of the month: Chrome exploit

Me and my job: Brian Wolfinger VP of LDiscovery

Me and my job: Brian Wolfinger VP of LDiscovery

Me and my job: Brian Wolfinger VP of electronic discovery & forensic services, LDiscovery

VMware source code leaked onto internet

By

Virtualization software vendor, VMware, confirmed this week that source code from its ESX hypervisor technology was leaked onto the internet.

Video: The expanded threat landscape

By

Bring-your-own-device and cloud security are just some of the topics that add to the changing threat landscape of online security.

The 1, 2, 3 of a more secure network

The 1, 2, 3 of a more secure network

By implementing some basic best practices, you will be able to adjust and defend against cybercriminals' new tactics.

CeCOS VI: The Counter eCrime Operations Summit

CeCOS VI: The Counter eCrime Operations Summit

CeCOS VI: The Counter eCrime Operations Summit: A cybercrime conference I can't get to, but heartily recommend

Stupid is as stupid does: Four preventable data breaches in health care

Stupid is as stupid does: Four preventable data breaches in health care

When it comes to the causes of data breaches in health care, these are four scenarios that could have easily been prevented.

Flight check-in emails lead to Zeus infection

By

Cyber criminals have cloaked spam to resemble US Airways check-in emails in phishing attempts that lead to Zeus trojan infections.

Evolutionary conundrums...

Evolutionary conundrums...

By

There are a whole host of things driving budget, resources and tweaks to security/risk management programs.

Big Data: The big picture

Big Data: The big picture

By

With data proliferating at astonishing rates, organizations are tearing into it, hoping to derive new business value, which, according to Zions CSO Preston Wood, includes better security decision making.

Cyber Warfare: The next Cold War

Cyber Warfare: The next Cold War

By

Much of the breach conversation over the past year has been devoted to so-called hacktivists. But nation-state adversaries, bent on looting organizations of intellectual property, are another breed entirely.

Company news: M&A activity and personnel announcements

By

Company news: M&A activity and personnel announcements

Tightening the fed's belt: Government Roundtable

Tightening the fed's belt: Government Roundtable

By

At a recent SC Magazine Roundtable, gov't security pros bemoaned the difficulty in obtaining resources. But instead of crying over spilled milk, they traded ideas for mitigating risk in a down economy.

David can be Goliath

David can be Goliath

Be patient and give staffers a real chance to show their stuff, says Michael Potters, CEO of the Glenmont Group.

Shutting access to passwords

Shutting access to passwords

Imagine a mobile device falling into the wrong hands - resulting in the draining of bank accounts co-opting of identities.

Debate: Anti-virus is essential

Debate: Anti-virus is essential.

Threat of the month: Ukash ransomware

By

One of the most talked about threats this month is the infamous Ukash ransomware.

Skills in demand: Virtualization security

Skills in demand: Virtualization security

As more organizations move into the cloud, the demand for virtualization security architects is growing.

The "caught red-handed" league

The "caught red-handed" league

There's a certain amount of tension between testers and vendors from time to time, even in the rarified atmosphere of an AMTSO workshop.

Making risk management more manageable

Making risk management more manageable

Most businesses don't understand how to manage risk, yet, we live in a world full of risks, says Guidance Software's Anthony Di Bello.

Sponsored Video: Hugh Njemanze of HP on resource challenges

By

"Budgets are low, while threats are increasing," said Hugh Njemanze, CTO and VP of worldwide research and development at HP Enterprise Security, at this year's RSA Conference 2012.

Sponsored Video: John Vigoroux of M86 on security industry issues

John Vigoroux, CEO of security at M86, discusses the challenges facing the IT industry today at this year's RSA Conference 2012.

RSA Conference 2012: Swapping info on the smart grid

By

Standards and policy leaders are concerned about the lack of threat intelligence on smart grid.

Threat of the month: Compromised embedded systems

Threat of the month: Compromised embedded systems

Deception and the art of cyber security

To thrwart web attackers, organizations must think like a criminal and turn to tricks that will stop attackers in their tracks -- or even make them believe that they are succeeding.

Forensic incident response to the fore

We've recently been witnessing tremendous change in perspective when it comes to IT security and the shroud of embarrassment associated with breaches has been lifting.

Sign up to our newsletters

POLL