The SC Magazine Awards Blog
To thrwart web attackers, organizations must think like a criminal and turn to tricks that will stop attackers in their tracks -- or even make them believe that they are succeeding.
We've recently been witnessing tremendous change in perspective when it comes to IT security and the shroud of embarrassment associated with breaches has been lifting.
Bring-your-own-device (BYOD) quickly made the jump from industry trend to business imperative, and organizations are now feeling the pressure to open their networks to employee-owned devices.
LANDesk's Devin Anderson offers five vital strategies you need to know to fend off attacks and safeguard your organization.
Increased threat levels will lead to a budget realignment toward security.
While AV software derails a lot of potentially harmful attacks, it is only one component of a comprehensive security solution.
Every company in every part of the world is subject to some level of insider threat.
The threats associated with mobile devices can come in many forms, so there are a number of best practices one can put in place to thwart potentially disastrous consequences.
Hackers and computer criminals have shown an ongoing ability to stay one step ahead of the security professional, but there are strategies and tools to help thwart their efforts.
Companies targeted by APT will need to upgrade their defenses strategy to include multiple, integrated layers of extremely sensitive anomaly detection and mitigation.
Sign up to our newsletters
SC Magazine Articles
- Operators disable firewall features to increase network performance, survey finds
- Fake Dropbox login page nabs credentials, is hosted on Dropbox
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Citadel variant targets master passwords, authentication solutions
- USPS draws ire of Congress over data breach response
- Buffer overflow vulnerabilities identified in Hikvision DVR devices
- Android malware 'NotCompatible' evolves, spawns resilient botnet
- Vulnerabilities identified in three Advantech products