This infographic created by WhiteHat Security, provides insight into the state of website security and issues organizations face today.
This month's threat stats indicate that the encounter rate of web malware across the retail and wholesale industry was over ...
In this month's global threat map, events across the globe are highlighted that include the sentencing of a man who ...
The final day of the conference held in London may have ended earlier than the first two, but the showroom ...
The action continued on Day Two of the InfoSecurity Europe conference in London. With engaging and compelling presentations, keynotes, and ...
Security professionals from all over Europe flocked to London for the start of the InfoSecurity Europe 2013 conference. Here's a ...
In this inforgraphic, AlgoSec illustrates the findings of a recent survey in which security, network operations and compliance professionals shared ...
The SC Labs team took a look at some of the latest SIEM products on the market and reported the ...
In a recent online poll we asked our viewers if they thought President Obama's recent cyber security executive order was ...
Among other notable factoids, this month's global threats map indicates that Belarus was the leading source of all zombie IP ...
Based on McAfee Labs Research, this infographic attempts to predict the state of malware in 2013, including new threats and ...
According to this month's threat stats, the total number of records containing sensitive data involved in breaches in the U.S. ...
This month, we continue our periodic look at the hot product groups that are shaping the information security marketplace. Here ...
After dissecting some of the top Unified Threat Management (UTM) tools out in the market, the SC Lab team reported ...
Sophos Labs recently conducted a mobile device survey that includes data on the average number of devices per person per ...
In one of our latest home page polls, we asked our audience if they believed the Computer Fraud and Abuse ...
Here's a full roundup of the big winners of this year's SC Awards U.S. in San Francisco.
According to this month's global threat report, Spain topped the list of producing the most zombie IP addresses.
This month's "Threat Stats" indicate that the Zbot password stealer is the top internet threat, as well as other notable ...
Hundreds of the industry's brightest minds descended upon the InterContinental Hotel in San Francisco for the 2013 SC Awards U.S. ...
From a jammed-pack vendor floor to insightful sessions with some of the leading minds in information security, there wasn't a ...
The action continued on Tuesday as visitors once again flooded the conference floor and attended sessions where industry thought-leaders shared ...
The 2013 RSA Conference kicked off Monday with a welcome reception that gave guests a chance to access the expo ...
The SC Labs team reported on the "strengths" and "weaknesses" of some of the leading vulnerability assessment tools on the ...
In a recent online poll we asked our audience if they expected their security budgets to change in 2013. Here ...
Among other notable data, this month's "Threat Stats" indicate that the education industry has the highest malware encounter rate.
This crafty infographic dissected into a slideshow, uniquely illustrates a popular industry topic. With so many bug bounty programs, ...
After taking a close look at Verizon's 2012 Data Breach Report, Praetorian Guard highlighted the most important statistical data and ...
The SC Labs team took a look at some of the top authentication security tools on the market and detailed ...
This slideshow by Neustar, based on a study by UBM, highlights key points of a recent survey on companies that ...
This month's "Global Threats" map found in the January issue, indicates that Spain was the top producer of zombie ...
We asked our audience if accused members of the infamous Anonymous hacktivist collective should face felony charges regarding DDoS attacks ...
With the big tech conference taking Las Vegas by storm this week, software firm Novell produced this infographic that ...
The January issue includes insightful data such as the top 10 threats on the internet, which include Hotbar, Kelihos.F, ...
2012 saw some of the biggest malware discoveries in the history of information security. AlienVault has crafted this unique slideshow ...
A new year presents new challenges as well as solutions. In this slideshow by IBM, predictions are given for what ...
From Flame and Flashback to Gauss and Wiper, here are a collection of the most malware in 2012.
Law enforcement cracked down on many cyber criminals this year, but these scenarios ranked above the rest.
From Microsoft closing the infamous Kelihos case, to courts concluding that Gary McKinnon would not be extradited.
If there was a year that put data breaches on the map, it may be 2012. Here are the top ...
There were many eye-catching headlines in 2012, but these were a few outrageous news bits that caught our attention.
There were many security products released in 2012, but our Labs team hand-picked a select few that were "SC Lab ...
When it comes to some of the best security products, here's a collection of the tools the SC Labs team ...
Here's a collection of the products that received "Best Buy" seals of approval from the SC Magazine Labs team.
These figures from the December issue include statistical information from the government server in South Carolina that was hacked, ...
The "Global Threats" map in the December issue indicate that the EMEA region (Europe, Middle East, Africa) was the ...
This infographic created by Cloudmark displays the results of a Harris Interactive survey which gives insight on how ...
With the potential of cyber threats increasing during the holidays, here are some interesting tips by Norton and Symantec on ...
Thales e-Security created this infographic that compares the two potential models for mobile payment security: the secure element model in ...
Fraud detection firm, 41st Parameter, created this infographic that highlights five steps organizations can take to reach FFIEC compliance.
After inspecting the latest database application and security products on the market, the SC Magazine Labs team reported the ...
Based on a collection of research, fraud prevention experts at Telesign created this unique infographic that covers cloud usage in ...
This year's big event produced some insightful discussions covering hot topics like mobile security and supply risk management.
We asked our audience if their company website had been the target of a DDoS attack recently. Here are the ...
This map, which features a roundup of security-related news in the November issue, details the cyber criminal activity ...
As election day approaches, Veracode crafted this unique infographic that highlights both President Obama and Gov. Romney's take on ...
A survey conducted by Viewfinity reveals interested stats in this infographic regarding local admin rights.
Silver Tail Systems and the Ponemon Institute conducted a survey of IT professionals on business logic abuse and reported their ...
The SC Magazine Labs team examined ID management, NAC and DLP products currently on the market and reported their ...
We asked our readers if they thought cars would eventually be attacked by hackers. Here are the results including additional ...
This year's annual event in New York City welcomed security leaders from various sectors to speak about hot topics ...
The annual conference brought in some of the top security pros to share their insight. Here are pictures of the ...
Internet fraud is the crime of the 21st century, but these emerging products can bolster an enterprise's defenses.
We determined the cyber criminal activity across the globe in this map that features a roundup of security-related news in ...
Among other notable data, the Threat Stats from the October issue of SC Magazine indicate there were 13.1 million ...
The SC Magazine Labs team examined endpoint security products currently on the market and reported their strengths and weaknesses.
We've gathered some insightful stats featured in our Insider Threat spotlight that range from how intrusions are handled to ...
Here are some interesting statistics from our recent September feature, "Technology to Strategy," that address issues security leaders face.
We asked our readers what their thoughts are on security awareness training. Here are the results including additional stats.
Incapsula conducted a study and released an interesting infographic that provides statistical information on the top threats and attacks by ...
The SC Magazine Labs team examined email security and content filtering products currently on the market and reported their ...
Here are a collection of interesting statistics pulled from our "Mobile Spotlight" issue that cover mobility in the workplace ...
Among other notable data, the Threat Stats from the September issue issue of SC Magazine indicate the most popular ...
We determined the cyber criminal activity across the globe in this map that features a roundup of security-related news in ...
One of the most talked about topics in the industry, BYOD, is constantly changing and nCircle has created an ...
We asked our readers what social media platforms they spend most of their time on. Here are the results including ...
Using information from their Open Threat Exchange, AlienVault created an infographic that covers the cyber attacks in over 77 countries ...
We determined the cyber criminal activity across the globe in this map that features a roundup of security-related news in ...
We asked our readers what their thoughts were on hotel wireless connections. Here are the results including additional stats.
Each quarter, Technology Editor Peter Stephenson and his team at the SC Lab address emerging technologies and markets. In the ...
The SC Magazine Labs team examined Mobile Device Security products currently on the market and reported their strengths and ...
We determined the cyber criminal activity across the globe in this map that features a roundup of security-related news in ...
Among other notable data, the Threat Stats from the July issue of SC Magazine indicate the most popular attacks ...
The SC Magazine Labs squad reviewed popular Unified Threat Management tools and highlighted the pros and cons of each.
We asked our readers if they think that Anonymous poses a threat to the U.S. power grid. Here are the ...
The SC Magazine Labs Team tested some of the top vulnerability assessment tools on the market, and found that ...
We asked our readers if Windows Remote Desktop Protocol was exposed at their organizations. These are the results including additional ...
Based on the (ISC)2 Career Impact Survey, organizations are beginning to hire more individuals specifically for information security roles.
OpenDNS and the Ponemon Institute teamed up to create a unique infographic that provides statistics on one of the most ...
The SC Magazine Labs Team tested some popular digital forensic tools currently on the market, and provided some insight ...
The P2P file-sharing site became the victim of its own success when New Zealand police shut down operations with ...
At the core, SIEM tools take data from sources and get useful, actionable information from it. The SC Magazine ...
We evaluated our readers' stance on the controversial CISPA cyber security bill. These are the results including additional stats.
The SC Magazine Labs staff, as well as other respected industry experts, looked at several risk and policy ...
We determined the cyber criminal activity across the globe in this map that features a roundup of security-related news in ...
OpenDNS produced an inforgraphic timeline to map out the registrations of the command-and-control servers of the cyber espionage malware
Among other notable data, the Threat Stats from the June issue of SC Magazine indicate the most popular mobile devices ...
Among other notable factoids, Threat Stats from the May issue of SC Magazine indicate where the largest increases in month-over-month ...
SC Congress Canada was a unique conference and expo experience for the information security industry. Here's a look at this ...
The SC Awards Canada brought in some of the most esteemed IT security professionals to Toronto. Here's a look at ...