Upcoming Vendor Webcast
If one AV is good, are two AVs better defense against APTs, ransomware and other sophisticated malware? That's the way we used to do it back in the '80s and '90s, but does this approach still work?
The weather may be warm now but retailers are already planning for the 2015 holiday season, when businesses will conduct as much as 20% of their total annual sales
DNS is used by every device on your network. But are you leveraging it in your security stack?
IT security is more challenging than ever. IT departments are tasked with managing a roaming workforce with limited resources and budget. Security solutions need to be effective yet approachable, especially for mid-sized companies.
Demonstrating compliance with PCI DSS is far from a trivial exercise. Are you sure you can document your organization's compliance with the new 3.0 standards?
PREVIOUS VENDOR WEBCASTS
What if you could uncover the infrastructure attackers are staging and identify threats BEFORE the kill chain begins?
Feudal Security, a concept popularized by cyber security guru Bruce Schneier, requires organizations to entrust the security of their data and infrastructure to cloud providers.
The connection between cybersecurity and a company's bottom line is crystal clear to board members — and they're worried. In fact, more than 80 percent of corporate directors now discuss cybersecurity at most or all boardroom meetings.
With credit card data theft growing at an alarming rate and undermining consumer confidence, organizations are investing in their network security for PCI compliance - only to realize that being compliant does not mean they're protected against advanced cyberattacks.
A recent report by Forrester Research identified security as being the "top concern" for enterprise technology and business decision-makers for IoT*.
Mark Twain once said, "The report of my death was an exaggeration." Can the same be said for the password?
This webcast will highlight key findings from our recently completed Point-of-Sale Security Mid-year Health Assessment, during which we surveyed POS security professionals about their security posture.
Websites are under attack. In the last year, new vulnerabilities have been uncovered that allows malicious attackers to undermine security that organizations put in place to protect themselves and their end users sensitive information.
The cloud movement presents a rare and momentous opportunity to revisit not only how we think about computing, but also how we think about information security.
On average, it took compromised organizations over 200 days to detect attackers once they had penetrated the network. How long would it take your organization?
Sign up to our newsletters
SC Magazine Articles
- Zero-day in Fiat Chrysler feature allows remote control of vehicles
- 'GSMem' malware designed to infiltrate air-gapped computers, steal data
- United reportedly hacked by same group that breached Anthem, OPM
- All smartwatches are vulnerable to attack, finds study
- Security concerns raised at Windows 10 roll-out
- NYU conference encourages women to pursue cybersecurity
- Modular Potao malware used to spy on targets in Ukraine, Russia
- GM says OnStar app flaw fixed, researcher says still exploitable
- TV5Monde in chaos as data breach costs roll into the millions
- Four McLean Hospital backup data tapes go missing, thousands affected