IT Security

Me and my job: Grant Babb, Intel IT

Me and my job: Grant Babb, Intel IT

A Q&A with Grant Babb, proactive investigations program manager for Intel IT.

How mobile security breeds concern for companies

How mobile security breeds concern for companies

By

Mobile security problems continue to vex many an IT security officer.

The high risk of lower data breach costs

The high risk of lower data breach costs

The challenge is using resources wisely and right-sizing a network security strategy that prioritizes protection.

Video: What scares the living IT out of you?

By

Dan Kaplan, executive editor of SC Magazine, sits with WInn Schwartau to discuss what exactly keeps him up at night as a security professional.

Targeted attacks cost companies an average of $200k

By

A recent survey indicates that successful targeted attacks end up costing companies more than $200,000.

Pros of managing security in cloud make it attractive

By

A move to the cloud means spending less on managing security for small to midsize companies, says a new report.

SC Congress Canada: What scares the living IT out of you?

SC Congress Canada: What scares the living IT out of you?

By

Dan Kaplan, executive editor of SC Magazine, sits with author and vendor Winn Schwartau to discuss what exactly keeps him up at night as a security professional.

SC Congress Canada: Policies can combat mobile worries

By

Experts at this year's SC Congress Canada in Toronto discussed the challenges of BYOD and how implementing policies may be the industry's biggest weapon.

Threat of the month: Chrome exploit

Threat of the month: Chrome exploit

Me and my job: Brian Wolfinger VP of LDiscovery

Me and my job: Brian Wolfinger VP of LDiscovery

Me and my job: Brian Wolfinger VP of electronic discovery & forensic services, LDiscovery

Skills in demand: Database and mobile device programming

Skills in demand: Database and mobile device programming

software developers with skills in collaboration software, databases and mobile device programming are needed.

Voters' Social Security numbers released by Texas AG

By

The Social Security numbers of millions of Texas voters were mistakenly given to opposing lawyers by the state attorney's office as part of a voter ID case.

VMware source code leaked onto internet

By

Virtualization software vendor, VMware, confirmed this week that source code from its ESX hypervisor technology was leaked onto the internet.

Video: Network visibility and continuous monitoring

By

It's important to be familiar with one's network before going in to assess any damage or patch vulnerabilities. Although good technology may be deployed, accidents happen.

Video: The expanded threat landscape

By

Bring-your-own-device and cloud security are just some of the topics that add to the changing threat landscape of online security.

The 1, 2, 3 of a more secure network

The 1, 2, 3 of a more secure network

By implementing some basic best practices, you will be able to adjust and defend against cybercriminals' new tactics.

CeCOS VI: The Counter eCrime Operations Summit

CeCOS VI: The Counter eCrime Operations Summit

CeCOS VI: The Counter eCrime Operations Summit: A cybercrime conference I can't get to, but heartily recommend

Stupid is as stupid does: Four preventable data breaches in health care

Stupid is as stupid does: Four preventable data breaches in health care

When it comes to the causes of data breaches in health care, these are four scenarios that could have easily been prevented.

Flight check-in emails lead to Zeus infection

By

Cyber criminals have cloaked spam to resemble US Airways check-in emails in phishing attempts that lead to Zeus trojan infections.

Evolutionary conundrums...

Evolutionary conundrums...

By

There are a whole host of things driving budget, resources and tweaks to security/risk management programs.

Big Data: The big picture

Big Data: The big picture

By

With data proliferating at astonishing rates, organizations are tearing into it, hoping to derive new business value, which, according to Zions CSO Preston Wood, includes better security decision making.

Cyber Warfare: The next Cold War

Cyber Warfare: The next Cold War

By

Much of the breach conversation over the past year has been devoted to so-called hacktivists. But nation-state adversaries, bent on looting organizations of intellectual property, are another breed entirely.

Tightening the fed's belt: Government Roundtable

Tightening the fed's belt: Government Roundtable

By

At a recent SC Magazine Roundtable, gov't security pros bemoaned the difficulty in obtaining resources. But instead of crying over spilled milk, they traded ideas for mitigating risk in a down economy.

David can be Goliath

David can be Goliath

Be patient and give staffers a real chance to show their stuff, says Michael Potters, CEO of the Glenmont Group.

Shutting access to passwords

Shutting access to passwords

Imagine a mobile device falling into the wrong hands - resulting in the draining of bank accounts co-opting of identities.

A Monitoring Solution: Smart network management

A Monitoring Solution: Smart network management

Network monitoring solutions for the enterprise should be holistically integrated with the complete security suite...

Debate: Anti-virus is essential

Debate: Anti-virus is essential.

Threat of the month: Ukash ransomware

By

One of the most talked about threats this month is the infamous Ukash ransomware.

Company news: M&A activity and personnel announcements

By

Company news: M&A activity and personnel announcements

Me and my job: Douglas Vitale, information assurance and forensic expert for a major utility company

Me and my job: Douglas Vitale, information assurance and forensic expert for a major utility company

By

Douglas Vitale, information assurance and forensic expert for a major utility company.

Sign up to our newsletters

POLL