April 2013 global threats

April 2013 global threats

Among other notable factoids, this month's global threats map indicates that Belarus was the leading source of all zombie IP ...

The state of malware 2013

The state of malware 2013

Based on McAfee Labs Research, this infographic attempts to predict the state of malware in 2013, including new threats and ...

April 2013 Threat Stats

April 2013 Threat Stats

According to this month's threat stats, the total number of records containing sensitive data involved in breaches in the U.S. ...

Emerging products: Virtual system security

Emerging products: Virtual system security

This month, we continue our periodic look at the hot product groups that are shaping the information security marketplace. Here ...

2013 Unified threat manager tools

2013 Unified threat manager tools

After dissecting some of the top Unified Threat Management (UTM) tools out in the market, the SC Lab team reported ...

2013 mobile device survey

2013 mobile device survey

Sophos Labs recently conducted a mobile device survey that includes data on the average number of devices per person per ...

Is the Computer Fraud and Abuse Act too broad?

Is the Computer Fraud and Abuse Act too broad?

In one of our latest home page polls, we asked our audience if they believed the Computer Fraud and Abuse ...

SC Awards U.S. 2013 winners gallery

SC Awards U.S. 2013 winners gallery

Here's a full roundup of the big winners of this year's SC Awards U.S. in San Francisco.

March 2013 global threats

March 2013 global threats

According to this month's global threat report, Spain topped the list of producing the most zombie IP addresses.

March 2013 Threat Stats

March 2013 Threat Stats

This month's "Threat Stats" indicate that the Zbot password stealer is the top internet threat, as well as other notable ...

2013 SC Awards U.S.

2013 SC Awards U.S.

Hundreds of the industry's brightest minds descended upon the InterContinental Hotel in San Francisco for the 2013 SC Awards U.S. ...

RSA Conference 2013

RSA Conference 2013

From a jammed-pack vendor floor to insightful sessions with some of the leading minds in information security, there wasn't a ...

RSA 2013: Day two

RSA 2013: Day two

The action continued on Tuesday as visitors once again flooded the conference floor and attended sessions where industry thought-leaders shared ...

RSA 2013: Day one

RSA 2013: Day one

The 2013 RSA Conference kicked off Monday with a welcome reception that gave guests a chance to access the expo ...

2013 Vulnerability assessment tools

2013 Vulnerability assessment tools

The SC Labs team reported on the "strengths" and "weaknesses" of some of the leading vulnerability assessment tools on the ...

Security budgets in 2013

Security budgets in 2013

In a recent online poll we asked our audience if they expected their security budgets to change in 2013. Here ...

February 2013 Threat Stats

February 2013 Threat Stats

Among other notable data, this month's "Threat Stats" indicate that the education industry has the highest malware encounter rate.

Can bug hunters keep the internet safe?

Can bug hunters keep the internet safe?

This crafty infographic dissected into a slideshow, uniquely illustrates a popular industry topic. With so many bug bounty programs, ...

2012 Data breach review

2012 Data breach review

After taking a close look at Verizon's 2012 Data Breach Report, Praetorian Guard highlighted the most important statistical data and ...

Authentication tools

Authentication tools

The SC Labs team took a look at some of the top authentication security tools on the market and detailed ...

The threat of DDoS

The threat of DDoS

This slideshow by Neustar, based on a study by UBM, highlights key points of a recent survey on companies that ...

January 2013 global threats

January 2013 global threats

This month's "Global Threats" map found in the January issue, indicates that Spain was the top producer of zombie ...

Anonymous and felony charges

Anonymous and felony charges

We asked our audience if accused members of the infamous Anonymous hacktivist collective should face felony charges regarding DDoS attacks ...

Is your device safe at CES?

Is your device safe at CES?

With the big tech conference taking Las Vegas by storm this week, software firm Novell produced this infographic that ...

January 2013 Threat Stats

January 2013 Threat Stats

The January issue includes insightful data such as the top 10 threats on the internet, which include Hotbar, Kelihos.F, ...

Malware never dies

Malware never dies

2012 saw some of the biggest malware discoveries in the history of information security. AlienVault has crafted this unique slideshow ...

IBM predicts

IBM predicts

A new year presents new challenges as well as solutions. In this slideshow by IBM, predictions are given for what ...

Top 7 threats

Top 7 threats

From Flame and Flashback to Gauss and Wiper, here are a collection of the most malware in 2012.

Top 3 law enforcement actions

Top 3 law enforcement actions

Law enforcement cracked down on many cyber criminals this year, but these scenarios ranked above the rest.

Top 5 legal developments

Top 5 legal developments

From Microsoft closing the infamous Kelihos case, to courts concluding that Gary McKinnon would not be extradited.

Top 8 breaches

Top 8 breaches

If there was a year that put data breaches on the map, it may be 2012. Here are the top ...

Top 3 weirdest news items

Top 3 weirdest news items

There were many eye-catching headlines in 2012, but these were a few outrageous news bits that caught our attention.

"SC Lab Approved" in 2012

"SC Lab Approved" in 2012

There were many security products released in 2012, but our Labs team hand-picked a select few that were "SC Lab ...

"Recommended" in 2012

"Recommended" in 2012

When it comes to some of the best security products, here's a collection of the tools the SC Labs team ...

"Best Buys" in 2012

"Best Buys" in 2012

Here's a collection of the products that received "Best Buy" seals of approval from the SC Magazine Labs team.

December 2012 Threat Stats

December 2012 Threat Stats

These figures from the December issue include statistical information from the government server in South Carolina that was hacked, ...

December 2012 global threats

December 2012 global threats

The "Global Threats" map in the December issue indicate that the EMEA region (Europe, Middle East, Africa) was the ...

Mobile spam by the numbers

Mobile spam by the numbers

This infographic created by Cloudmark displays the results of a Harris Interactive survey which gives insight on how ...

10 tips to keep your website safe

10 tips to keep your website safe

With the potential of cyber threats increasing during the holidays, here are some interesting tips by Norton and Symantec on ...

Trust the phone or the cloud?

Trust the phone or the cloud?

Thales e-Security created this infographic that compares the two potential models for mobile payment security: the secure element model in ...

On the road to FFIEC compliance

On the road to FFIEC compliance

Fraud detection firm, 41st Parameter, created this infographic that highlights five steps organizations can take to reach FFIEC compliance.

Database & application security

Database & application security

After inspecting the latest database application and security products on the market, the SC Magazine Labs team reported the ...

Is the cloud safe?

Is the cloud safe?

Based on a collection of research, fraud prevention experts at Telesign created this unique infographic that covers cloud usage in ...

SC Congress Chicago 2012

SC Congress Chicago 2012

This year's big event produced some insightful discussions covering hot topics like mobile security and supply risk management.

DDoS attack targets

DDoS attack targets

We asked our audience if their company website had been the target of a DDoS attack recently. Here are the ...

November 2012 Global Threats

November 2012 Global Threats

This map, which features a roundup of security-related news in the November issue, details the cyber criminal activity ...

Obama vs Romney on cyber security

Obama vs Romney on cyber security

As election day approaches, Veracode crafted this unique infographic that highlights both President Obama and Gov. Romney's take on ...

Who has admin rights?

Who has admin rights?

A survey conducted by Viewfinity reveals interested stats in this infographic regarding local admin rights.

The threats of business logic abuse

The threats of business logic abuse

Silver Tail Systems and the Ponemon Institute conducted a survey of IT professionals on business logic abuse and reported their ...

ID Management, NAC and DLP

ID Management, NAC and DLP

The SC Magazine Labs team examined ID management, NAC and DLP products currently on the market and reported their ...

Cars attacked by hackers

Cars attacked by hackers

We asked our readers if they thought cars would eventually be attacked by hackers. Here are the results including additional ...

SC Congress New York 2012

SC Congress New York 2012

This year's annual event in New York City welcomed security leaders from various sectors to speak about hot topics ...

SC Congress NY Snapshots

SC Congress NY Snapshots

The annual conference brought in some of the top security pros to share their insight. Here are pictures of the ...

Online fraud defenses

Online fraud defenses

Internet fraud is the crime of the 21st century, but these emerging products can bolster an enterprise's defenses.

October 2012 Global Threats

October 2012 Global Threats

We determined the cyber criminal activity across the globe in this map that features a roundup of security-related news in ...

October 2012 Threat Stats

October 2012 Threat Stats

Among other notable data, the Threat Stats from the October issue of SC Magazine indicate there were 13.1 million ...

Endpoint Security

Endpoint Security

The SC Magazine Labs team examined endpoint security products currently on the market and reported their strengths and weaknesses.

The Insider Gauge

The Insider Gauge

We've gathered some insightful stats featured in our Insider Threat spotlight that range from how intrusions are handled to ...

Securing the enterprise

Securing the enterprise

Here are some interesting statistics from our recent September feature, "Technology to Strategy," that address issues security leaders face.

Security Awareness Training

Security Awareness Training

We asked our readers what their thoughts are on security awareness training. Here are the results including additional stats.

Attacks and threats by country

Attacks and threats by country

Incapsula conducted a study and released an interesting infographic that provides statistical information on the top threats and attacks by ...

Email security and content filtering

Email security and content filtering

The SC Magazine Labs team examined email security and content filtering products currently on the market and reported their ...

The Mobile Gauge

The Mobile Gauge

Here are a collection of interesting statistics pulled from our "Mobile Spotlight" issue that cover mobility in the workplace ...

September 2012 Threat Stats

September 2012 Threat Stats

Among other notable data, the Threat Stats from the September issue issue of SC Magazine indicate the most popular ...

September 2012 Global Threats

September 2012 Global Threats

We determined the cyber criminal activity across the globe in this map that features a roundup of security-related news in ...

The development of BYOD

The development of BYOD

One of the most talked about topics in the industry, BYOD, is constantly changing and nCircle has created an ...

Social media habits

Social media habits

We asked our readers what social media platforms they spend most of their time on. Here are the results including ...

Malicious activity in 2012

Malicious activity in 2012

Using information from their Open Threat Exchange, AlienVault created an infographic that covers the cyber attacks in over 77 countries ...

August 2012 Global Threats

August 2012 Global Threats

We determined the cyber criminal activity across the globe in this map that features a roundup of security-related news in ...

Secure hotel wireless connections

Secure hotel wireless connections

We asked our readers what their thoughts were on hotel wireless connections. Here are the results including additional stats.

Cloud Technology

Cloud Technology

Each quarter, Technology Editor Peter Stephenson and his team at the SC Lab address emerging technologies and markets. In the ...

Mobile Device Security

Mobile Device Security

The SC Magazine Labs team examined Mobile Device Security products currently on the market and reported their strengths and ...

July 2012 Global Threat Report

July 2012 Global Threat Report

We determined the cyber criminal activity across the globe in this map that features a roundup of security-related news in ...

July 2012 Threat Stats

July 2012 Threat Stats

Among other notable data, the Threat Stats from the July issue of SC Magazine indicate the most popular attacks ...

Unified Threat Management Tools

Unified Threat Management Tools

The SC Magazine Labs squad reviewed popular Unified Threat Management tools and highlighted the pros and cons of each.

Anonymous and the U.S. power grid

Anonymous and the U.S. power grid

We asked our readers if they think that Anonymous poses a threat to the U.S. power grid. Here are the ...

Vulnerability assessment tools

Vulnerability assessment tools

The SC Magazine Labs Team tested some of the top vulnerability assessment tools on the market, and found that ...

Windows RDP Poll

Windows RDP Poll

We asked our readers if Windows Remote Desktop Protocol was exposed at their organizations. These are the results including additional ...

Career survey

Career survey

Based on the (ISC)2 Career Impact Survey, organizations are beginning to hire more individuals specifically for information security roles.

Mobile security stats

Mobile security stats

OpenDNS and the Ponemon Institute teamed up to create a unique infographic that provides statistics on one of the most ...

Digital forensic tools

Digital forensic tools

The SC Magazine Labs Team tested some popular digital forensic tools currently on the market, and provided some insight ...

The MegaUpload Hunt

The MegaUpload Hunt

The P2P file-sharing site became the victim of its own success when New Zealand police shut down operations with ...

SIEM Tools

SIEM Tools

At the core, SIEM tools take data from sources and get useful, actionable information from it. The SC Magazine ...

CISPA Poll

CISPA Poll

We evaluated our readers' stance on the controversial CISPA cyber security bill. These are the results including additional stats.

Risk & policy management tools

Risk & policy management tools

The SC Magazine Labs staff, as well as other respected industry experts, looked at several risk and policy ...

June 2012 Global Threat Report

June 2012 Global Threat Report

We determined the cyber criminal activity across the globe in this map that features a roundup of security-related news in ...

C&C stats and timeline

C&C stats and timeline

OpenDNS produced an inforgraphic timeline to map out the registrations of the command-and-control servers of the cyber espionage malware

June 2012 Threat Stats

June 2012 Threat Stats

Among other notable data, the Threat Stats from the June issue of SC Magazine indicate the most popular mobile devices ...

May 2012 Threat Stats

May 2012 Threat Stats

Among other notable factoids, Threat Stats from the May issue of SC Magazine indicate where the largest increases in month-over-month ...

SC Congress Canada 2012

SC Congress Canada 2012

SC Congress Canada was a unique conference and expo experience for the information security industry. Here's a look at this ...

SC Awards Canada 2012

SC Awards Canada 2012

The SC Awards Canada brought in some of the most esteemed IT security professionals to Toronto. Here's a look at ...

Virtual systems security

Virtual systems security

The Emerging Products section keeps tabs on important emerging market segments within the information security space and seeks out ...

SC Awards 2012

SC Awards 2012

The SC Awards were in full-swing this February in San Francisco. Here's a look at all of the action.

Innovators

Innovators

Every year at this time, we roll up our sleeves and start digging for those companies that have the vision, ...

SC Congress New York 2011

SC Congress New York 2011

SC Congress New York 2011

"Recommended" Products of 2011

"Recommended" Products of 2011

"Recommended" Products of 2011

Case studies

Case studies

In case studies, we focus on how end-users have deployed and managed various security products or services. These profiles include ...

"SC Lab Approved" 2011

"SC Lab Approved" 2011

We've assembled here those products and services which were deemed SC Lab Approved in 2011. This designation is granted to ...

Sign up for our newsletters

POLL