In this month's "Me and my job" feature, we get to know Johannes Ullrich of the SANS Technology Institute.
The security community is abuzz about the risks of reverse engineering code.
It is an assumption for many enterprises operating today that they may already have been compromised.
The rise of IoT will require a completely new approach to network security, says vArmour CEO Timothy Eades.
A CSO with a budget must be in want of a thousand dedicated point solutions, says Alex Stamos, CISO, Yahoo.
Passing the annual compliance assessment is just the start of a vigilant security program, says Stephen Orfei of the PCI SSC.
With every new data leak end users are looking for ways to better protect themselves and keep their personal financial identity safe from hackers.
The saying "better safe than sorry" rings true when it comes to data security.
As end users bring their own devices, applications, and even networks into their employer's fray, hallowed IT security concepts like visibility, control and peace of mind are jettisoned out the window.
Cybercriminals often are specifically looking for credit card numbers that can be reused on other e-commerce sites or sold to the highest bidder on the digital black market.
Sign up to our newsletters
SC Magazine Articles
- Popular adult website XTube compromised, delivers malware
- Orgs predict $53M risk, on average, from crypto key, digital cert attacks
- Hanjuan Exploit Kit leveraged in malvertising campaign
- Report: More than 15,000 vulnerabilities in nearly 4,000 applications reported in 2014
- Amedisys notifies nearly 7,000 individuals of potential breach
- Obama orders new sanctions program to deter foreign cyber attackers
- 'Volatile Cedar' APT group spies on enterprises, focusing on Lebanese companies
- Orgs need to share info, crave more board oversight, study says
- Human error cited as leading contributor to breaches, study shows
- Nite Ize website attack impacts credit cards, possibly customer database