November 01, 2012
A Q&A with Grant Babb, proactive investigations program manager for Intel IT.
June 01, 2012
Mobile security problems continue to vex many an IT security officer.
Dan Kaplan, executive editor of SC Magazine, sits with WInn Schwartau to discuss what exactly keeps him up at night as a security professional.
A recent survey indicates that successful targeted attacks end up costing companies more than $200,000.
A move to the cloud means spending less on managing security for small to midsize companies, says a new report.
May 09, 2012
Dan Kaplan, executive editor of SC Magazine, sits with author and vendor Winn Schwartau to discuss what exactly keeps him up at night as a security professional.
Experts at this year's SC Congress Canada in Toronto discussed the challenges of BYOD and how implementing policies may be the industry's biggest weapon.
May 01, 2012
Me and my job: Brian Wolfinger VP of electronic discovery & forensic services, LDiscovery
May 01, 2012
software developers with skills in collaboration software, databases and mobile device programming are needed.
The Social Security numbers of millions of Texas voters were mistakenly given to opposing lawyers by the state attorney's office as part of a voter ID case.
Virtualization software vendor, VMware, confirmed this week that source code from its ESX hypervisor technology was leaked onto the internet.
It's important to be familiar with one's network before going in to assess any damage or patch vulnerabilities. Although good technology may be deployed, accidents happen.
Bring-your-own-device and cloud security are just some of the topics that add to the changing threat landscape of online security.
April 17, 2012
CeCOS VI: The Counter eCrime Operations Summit: A cybercrime conference I can't get to, but heartily recommend
Cyber criminals have cloaked spam to resemble US Airways check-in emails in phishing attempts that lead to Zeus trojan infections.
April 02, 2012
There are a whole host of things driving budget, resources and tweaks to security/risk management programs.
April 02, 2012
With data proliferating at astonishing rates, organizations are tearing into it, hoping to derive new business value, which, according to Zions CSO Preston Wood, includes better security decision making.
April 02, 2012
Much of the breach conversation over the past year has been devoted to so-called hacktivists. But nation-state adversaries, bent on looting organizations of intellectual property, are another breed entirely.
Company news: M&A activity and personnel announcements
April 02, 2012
Network monitoring solutions for the enterprise should be holistically integrated with the complete security suite...
One of the most talked about threats this month is the infamous Ukash ransomware.
April 02, 2012
Douglas Vitale, information assurance and forensic expert for a major utility company.
April 02, 2012
As more organizations move into the cloud, the demand for virtualization security architects is growing.
April 02, 2012
At a recent SC Magazine Roundtable, gov't security pros bemoaned the difficulty in obtaining resources. But instead of crying over spilled milk, they traded ideas for mitigating risk in a down economy.
April 02, 2012
Be patient and give staffers a real chance to show their stuff, says Michael Potters, CEO of the Glenmont Group.
April 02, 2012
Imagine a mobile device falling into the wrong hands - resulting in the draining of bank accounts co-opting of identities.
March 28, 2012
There's a certain amount of tension between testers and vendors from time to time, even in the rarified atmosphere of an AMTSO workshop.
March 23, 2012
Most businesses don't understand how to manage risk, yet, we live in a world full of risks, says Guidance Software's Anthony Di Bello.