Slideshows

April 2013 global threats

April 2013 global threats

Among other notable factoids, this month's global threats map indicates that Belarus was the leading source of all zombie IP ...

The state of malware 2013

The state of malware 2013

Based on McAfee Labs Research, this infographic attempts to predict the state of malware in 2013, including new threats and ...

April 2013 Threat Stats

April 2013 Threat Stats

According to this month's threat stats, the total number of records containing sensitive data involved in breaches in the U.S. ...

Emerging products: Virtual system security

Emerging products: Virtual system security

This month, we continue our periodic look at the hot product groups that are shaping the information security marketplace. Here ...

2013 Unified threat manager tools

2013 Unified threat manager tools

After dissecting some of the top Unified Threat Management (UTM) tools out in the market, the SC Lab team reported ...

2013 mobile device survey

2013 mobile device survey

Sophos Labs recently conducted a mobile device survey that includes data on the average number of devices per person per ...

Is the Computer Fraud and Abuse Act too broad?

Is the Computer Fraud and Abuse Act too broad?

In one of our latest home page polls, we asked our audience if they believed the Computer Fraud and Abuse ...

SC Awards U.S. 2013 winners gallery

SC Awards U.S. 2013 winners gallery

Here's a full roundup of the big winners of this year's SC Awards U.S. in San Francisco.

March 2013 global threats

March 2013 global threats

According to this month's global threat report, Spain topped the list of producing the most zombie IP addresses.

March 2013 Threat Stats

March 2013 Threat Stats

This month's "Threat Stats" indicate that the Zbot password stealer is the top internet threat, as well as other notable ...

2013 SC Awards U.S.

2013 SC Awards U.S.

Hundreds of the industry's brightest minds descended upon the InterContinental Hotel in San Francisco for the 2013 SC Awards U.S. ...

RSA Conference 2013

RSA Conference 2013

From a jammed-pack vendor floor to insightful sessions with some of the leading minds in information security, there wasn't a ...

RSA 2013: Day two

RSA 2013: Day two

The action continued on Tuesday as visitors once again flooded the conference floor and attended sessions where industry thought-leaders shared ...

RSA 2013: Day one

RSA 2013: Day one

The 2013 RSA Conference kicked off Monday with a welcome reception that gave guests a chance to access the expo ...

2013 Vulnerability assessment tools

2013 Vulnerability assessment tools

The SC Labs team reported on the "strengths" and "weaknesses" of some of the leading vulnerability assessment tools on the ...

Security budgets in 2013

Security budgets in 2013

In a recent online poll we asked our audience if they expected their security budgets to change in 2013. Here ...

February 2013 Threat Stats

February 2013 Threat Stats

Among other notable data, this month's "Threat Stats" indicate that the education industry has the highest malware encounter rate.

Can bug hunters keep the internet safe?

Can bug hunters keep the internet safe?

This crafty infographic dissected into a slideshow, uniquely illustrates a popular industry topic. With so many bug bounty programs, ...

2012 Data breach review

2012 Data breach review

After taking a close look at Verizon's 2012 Data Breach Report, Praetorian Guard highlighted the most important statistical data and ...

Authentication tools

Authentication tools

The SC Labs team took a look at some of the top authentication security tools on the market and detailed ...