Video: The continued rise of DDoS

In this video, Ashley Stephenson, CEO at Corero Network Security, discusses the development of DDoS attacks, as well as how security professionals can grapple with the challenges the threat poses.

Video: The risks surrounding digital certificates

In this video, Jeff Hudson, CEO at Venafi, discusses the importance of digital certificates, as well as the threats surrounding forged ones should they be used in an attack against an organization.

Video: The challenges third-parties pose for SMBs

In this video, Marcos Colón, digital content coordinator at SC Magazine, sits with Charles Henderson, director of SpiderLabs at Trustwave, to discuss the growing challenges that SMBs face with third-parties that may put an organization's data at risk.

Video: Privileged access in the enterprise

In this video, Leonid Shtilman, CEO at Viewfinity, sits with SC Magazine reporter, Danielle Walker, to discuss privileged management and ways organizations can secure corporate accounts.

Video: Corporations defending IT infrastructure

John McClurg, vice president of Dell Global Security, discusses some of the threats posed to corporations today, and how security professionals should assess them in order to implement successful security strategies.

Video: Impacts of the executive order

Ahren S. Tryon, attorney at Cozen O'Connor, discusses the recent executive order, as well as the concerns of privacy in relation to information sharing between the public and private sector.

Video: Advanced attacks in today's threat landscape

In this video, Greg Masters, managing editor for SC Magazine, sits with Tomer Teller, security evangelist and researcher for Check Point Software Technologies, to discuss some of the advanced threats that enterprises are facing today.

Members only: The Information Security Forum

Steve Durbin, global vice president for the Information Security Forum, discusses some of the problems security professionals face today.

Video: Evolving threat tactics and the targets

In this video Danielle Walker, reporter for SC Magazine, sits with Don Grey, chief security strategist at Solutionary, to discuss the major highlights of the report.

Video: Reducing the attack surface

In this video, Charles Renert, vice president of research and development for Websense Labs, discusses the findings of their "2013 Threat Report" and how companies can minimize their attack surface.

Video: The prevalence of spam

In this video, Tom Buoniello, senior vice president of product management at AppRiver sits with Greg Masters, managing editor at SC Magazine, to discuss this prevalent threat and what users can do to protect themselves.

Video: The benefits of legal counsel

Bryant Bell, senior product marketing manager of Guidance Software, sits with SC Magazine reporter, Danielle Walker, to discuss some of the benefits of having legal counsel in the security industry.

Video: Conveying security issues to upper management

Dan Kaplan, executive editor at SC Magazine, sits with Abe Kleinfeld, CEO of nCircle, to discuss communication between the CSO and upper management.

Video: Security and the human factor

Danielle Walker, reporter for SC Magazine, discusses the human factor in terms of security with Dr. Hugh Thompson, senior vice president and chief security strategist at Blue Coat Systems.

Video: The year in spam

After a year that witnessed a threat landscape more diverse than ever, Neil Cook, CTO at Cloudmark, talks about the unprecedented levels that spam has reached.

Video: Borrowing cyber security tactics from the military

In this video Stonesoft's director of cyber security, Jarno Limnell, comes to the SC Magazine offices to discuss military cyber security strategies that can be implemented by the enterprise.

Video: SSH key management

Executive editor, Dan Kaplan, sits with Tatu Ylönen, CEO of SSH Communications Security, to discuss SSH key management.

Video: Targeted Attacks

It's one thing to be a victim of a phishing campaign, but it's an entirely different ball game when you're at the receiving end of a targeted attack.

Video: Incident Response

Anthony Di Bello of Guidance Software talks about incident response with executive editor, Dan Kaplan, at the SC Magazine offices.

Video: Legal guidance for security researchers

SC Magazine catches up with Marcia Hofmann, senior staff attorney at the Electronic Frontier Foundation, who provides some legal guidance for researchers in the industry.

Black Hat Video: Threats surrounding advanced metering infrastructure

In this Black Hat 2012 press conference video, Don Weber, hardware analysis expert at InGuardian, discusses the threats involved with advanced metering infrastructure.

Video: Password security

SC Magazine executive editor, Dan Kaplan, sits with James Lyne, director of technology and strategy at Sophos, to discuss password security in today's threat landscape.

Video: Analyzing DDoS Attacks

Ashley Stephenson, EVP of Corero Network Security, visits the SC Magazine offices to discuss one of the most popular attack methods used by cyber criminals.

Video: The growing sophistication of threats

McAfee co-president, Michael DeCesare, stopped by the SC Magazine offices to discuss the advancements in the threat landscape.

Video: The state of information

SC Magazine's Dan Kaplan sits with Francis deSouza of Symantec, to discuss the global state of information in the enterprise and costs associated with it.

Video: CloudFlare protects -- and defends against -- hackers

SC Magazine's Dan Kaplan sat with the co-founder and CEO of CloudFlare, Matthew Prince, to discuss the company's stance on security when it comes to protecting its dynamic customer base.

Video: Protecting enterprise mobility through app management

With a slew of threat vectors to cover, security professionals are faced with one of the biggest challenges in the industry to date: mobility in the workplace. In this video, the founder and president of Appthority discusses app management in the enterprise.

Video: Defending mission-critical applications

While the security industry is on their toes, many companies still haven't addressed their information security. In this video interview, Dan Kaplan sits with Radware CEO, Roy Zisapel, to chat about defending mission-critical applications.

Video: What scares the living IT out of you?

Dan Kaplan, executive editor of SC Magazine, sits with WInn Schwartau to discuss what exactly keeps him up at night as a security professional.

Video: Security and Windows 8

Coverity's Chris Valasek sits with SC Magazine's executive editor, Dan Kaplan, to discuss the upcoming release of Windows 8 and the new security features implemented.

Video: Network visibility and continuous monitoring

It's important to be familiar with one's network before going in to assess any damage or patch vulnerabilities. Although good technology may be deployed, accidents happen.

Video: The expanded threat landscape

Bring-your-own-device and cloud security are just some of the topics that add to the changing threat landscape of online security.

Video: Cyber intelligence and enterprises

The Information Security Forum (ISF) works with organizations on issues they face protecting their information and data.

Video: Mobile and social networking threats

From issues that corporations face with mobile security, to social networking threats on sites like Pinterest, there were endless hot topics at this year's RSA Conference 2012 in San Francisco.

Video: Hacktivism, Anonymous and the new security model

Noted security researcher Hugh Thompson, the chief security strategist at People Security and the program chairman of the RSA Conference, discusses how companies may reconsider controversial business decisions if they mean inciting the wrath of the Anonymous hacktivist collective.

Video: 2011 and cyber crime

2011 was marked by a rise in hacktivism, an evolution in cyber crime toolkits, a preponderance of mobile malware -- namely on the Android -- and increased risks in social media. This resulted in "unprecedented public attention to [these] problems," said James Lyne, director of technology strategy at Sophos. In this video, Lyne describes how organizations can use this newfound cyber awareness to best respond to the challenges.

Video: Shifting the advantage from attacker to defender

Digital adversaries have lots going for them: financial incentives, easy-to-access tools and ubiquitous access points thanks to the pervasive nature of the internet. And defenders have lots working against them, as they try to do more with less. But in this video, Rapid7 CEO Mike Tuchen offers suggestions of how organizations can harden their networks, from poking at their own infrastructure to prioritizing their risk posture.

Video: The Android problem

In this interview, Harry Sverdlove, CTO of Bit9, describes to SC Magazine Executive Editor Dan Kaplan what the bring-your-own-device revolution means for organizations, and how they should best address the threat posed by endpoints such as the Android.

Video: Deterring hacktivism

SC Magazine Managing Editor Greg Masters chats with Carl Herberger, vice president of security solutions at Radware, about the risk posed by politically and ideologically motivated attacks, known as hacktivism.

Video: Educating students on reducing online risk

Andrew Lee, CEO of ESET North America, sits down with SC Magazine Executive Editor Dan Kaplan to discuss why security education needs to make its way into school curricula. This will allow students to become better protectors of their personal critical infrastructure -- their homes -- and prepare them to be security conscious employees once they enter the working world.

Video: The "Bring Your Own Device" conundrum

SC Magazine Executive Editor Dan Kaplan sits down with a Juniper security executive to learn why the trend of mobility and data migration should be a top concern for security professionals, and how they can institute best practices to deal with the new risk.

Hacking industrial control systems: Dillon Beresford press conference

Security researcher Dillon Beresford speaks to the press at the Black Hat conference in Las Vegas following his presentation which demonstrated how to hack into Siemens industrial control systems. Beresford specifically uncovered "replay attack" vulnerabilities in programmable logic controllers, or PLCs, which are used in organizations such as power plants to automate processes. He told the media that part of his motivation for the research was to debunk conventional thinking that SCADA attacks require deep pockets. This week, ICS-CERT issued an advisory warning of the bugs in the Berlin-based Siemens products.

Tracing the advanced persistent threat: Interview with Joe Stewart

While McAfee's recently released "Shady RAT" report concentrated on the victims of a mass cyberespionage ring, another researcher has decided to focus his attention on the adversaries behind such attacks. In a video recorded last week at the Black Hat conference in Las Vegas, Joe Stewart of Dell SecureWorks explains how he was able to trace 60 families of custom malware thanks to error messages yielded by a "connection bouncer" tool used by the hackers to hide their tracks, but which inadvertently pointed back to about a dozen command-and-control centers hosted by ISPs in China. Two of the malware families are known to have been used in the RSA SecurID breach. "It gives you a better line on attribution," Stewart told SCMagazineUS.com.

Minding the database: Interview with Phil Neray, IBM

A host of high-profile breaches have defined 2011, from HBGary to Epsilon to Sony to RSA to Lockheed Martin. The motives for each attack have been different, but they all share something in common: The perpetrators wanted access to the database, where the company's crown jewels lie. Phil Neray, vice president of data security strategy at IBM, discusses why organizations must implement protections at the database level to both catch the adversaries in action and trace their footsteps for the forensic investigation.

Rethinking security: Interview with David Koretz, CEO, Mykonos Software

In an interview with SC Magazine Managing Editor Greg Masters, David Koretz, CEO of web application security start-up Mykonos Software, explains why the industry needs a rethink. He says security products traditionally have produced too much data, which leads to stress on customers and too many false positives. And even with this preponderance of information, solutions still are missing threats, as evidenced by zero-day attacks that evade malware detection technology. Koretz explains why a shift in focus, plus increased education for college students, may make all the difference.

Managing virtualization: Interview with Rob Juncker, VP of technology, Shavlik

As virtualization becomes more mainstream, even in small and midsize organizations, security professionals must consider the risks of managing this emerging technology. Threats such as VM sprawl, in which IT departments lose visibility of their virtual assets, creates the potential of unpatched and vulnerable machines. Rob Juncker, VP of technology at Shavlik, sits down with SC Magazine Executive Editor Dan Kaplan to explain why organizations must apply the same security principles to their virtual machines as they do for their traditional computing systems.

Encryption and advancing cloud security

SPONSORED VIDEO: Dave Asprey chats with SC Magazine Executive Editor Dan Kaplan on the RSA Conference showroom floor in San Francisco. Asprey explains that as cloud and virtualization technology gain traction with senior-level executives, enterprises are taking the time to build security into these projects. He also talks about the benefits of encryption in the cloud and how virtual machine density can be increased simply by running proper security products.

Next-generation firewalls and increasing network visiblity

SPONSORED VIDEO: Michelle Cobb of Skybox Security chats with SC Magazine Editor-in-Chief Illena Armstrong on the RSA Conference showroom floor in San Francisco. Cobb discusses the importance of next-generation firewalls to protect systems from attack and reveals what organizations should prioritize in 2011, including identifying risks proactive, operationalizing security and automating controls.

SC Awards 2011: Video of the big night

Couldn't attend the 2011 SC Awards? Were you there and want to relive memories of the IT security industry's biggest - and most glamorous - night? Check out this video, which recaps all the pageantry of the event, where we honor those professionals, companies and solutions that represent the best of the information security marketplace.

What is security? Interview with Bruce Schneier

Bruce Schneier, chief security technology officer of BT, discusses his forthcoming book, which examines "the why of security." In particular, by drawing on economic and behavioral theory and more, Schneier seeks to learn: Why does security exist and how can more closely examining this question result in better solutions? Schneier, who recently blogged about the book idea, spoke with SC Magazine Executive Editor Dan Kaplan at the RSA Conference in San Francisco.

Has cyberwar happened? Interview with Mikko Hypponen, chief research officer of F-Secure

Mikko Hypponen, chief research officer of F-Secure, distinguishes among cyberwar and everything else, explains why the anti-virus industry failed when it came to detecting and preventing Stuxnet, discusses why critical infrastructure is at major risk to attack and reveals how he tracked down the authors of the first PC virus, which turns 25 years old this year. SC Magazine Executive Editor Dan Kaplan spoke with Hypponen following a media luncheon at the RSA Conference in San Francisco.

SC Congress Canada: The risk of mobile applications

Joe Lobianco, senior director of information security and risk management at CIBC, a major bank in Canada, breaks down the mobile application threat. He discusses security from the perspective of CIBC, which recently rolled out its mobile banking application, and delves into whether the mobile computing space will prompt the same risks as the traditional desktop environment.

SC Congress Canada: Smart grid and privacy

Ann Cavoukian, privacy commissioner of Ontario, discusses how privacy risks must be considered as smart meters are deployed to homes throughout North America. Many utilities, she says, are overlooking the privacy dangers, such as third-parties gaining access to homeowners' electrical usage patterns, but that mindset must change.

Fraud prevention: Interview with Laura Mather, founder of SilverTail Systems

SC Magazine Deputy Editor sits down with Laura Mather, founder of SilverTail Systems and a former fraud prevention expert at eBay, to discuss why back-end controls that sniff out fraudulent web activity may be just as important to organizations as front-end solutions, such as authentication.

End-user awareness: Interview with JR Smith, CEO of AVG

SC Magazine reporter Angela Moscaritolo asks JR Smith, CEO of anti-virus firm AVG, for his thoughts on National Cyber Security Awareness Month, which kicked off this week. Smith also offers his suggestions on how organizations can best implement a culture of education around security best practices.

Developments to the PCI standard: Interview with Jeremy King, European head of the PCI Security Standards Council

SC Magazine's Angela Moscaritolo recently traveled to Orlando, Fla. to the PCI Security Standard Council's annual North American Community Meeting to learn about the latest changes to the payment security standard and what merchants can expect in the form of additional guidance to reduce their compliance scope. During her trip, she sat down with Jeremy King, who heads the PCI Council's European operations, to discuss the developments.

Automated web attacks: Interview with Amichai Shulman, co-founder and CTO of Imperva

In a conversation with SC Magazine Deputy Editor Dan Kaplan, Amichai Shulman, co-founder and CTO of Imperva, introduces a new research initiative underway and addresses the automated methods now used by attackers to compromise legitimate websites.

The threat landscape: Interview with Chester Wisniewski, senior security adviser at Sophos

SC Magazine reporter Angela Moscaritolo sits down with Chester Wisniewski of Sophos to hear about the latest social engineering efforts that attackers are leveraging to work their way into organizations. He also sounds off on what security professionals must do to lock down their networks and how law enforcement is working to stem the tide of cybercrime.

How does the SC Magazine Awards process work?

SC Magazine Editor-in-Chief Illena Armstrong explains all you need to know about entering the 2011 SC Awards U.S. and how the categories and winners are chosen.

SMB security concerns: Interview with Christian Renaud, CEO of Palisade Systems

SC Magazine's Angela Moscaritolo chats with Christian Renaud, CEO of Palisade Systems, who discusses the unique security challenges facing small and midsize businesses and offers up some best practices they can put to use to protect themselves in today's threat landscape.

Mobile workforce: Interview with Patricia Titus, CISO of Unisys

SC Magazine Managing Editor Greg Masters sits down with Patricia Titus, the former CISO at the Transportation Security Administration and current CISO at IT firm Unisys, to discuss how organizations should handle the threat posed by employees who seek to connect remotely and use mobile devices for work-related functions.

The bug bounty debate: Black Hat 2010 panelists debate the merits of vendors paying for vulnerabilities

Alex Stamos of iSEC partners offers his take on the usefulness of incentive programs that encourage researchers to privately report vulnerabilities to vendors, in exchange for cash. While the initiatives might fatten the wallets of bug hunters, some believe it taints the mission of white-hat hackers.

The state of SSL on the web: Qualys' Ivan Ristic discusses the good and the bad

Ivan Ristic, director of engineering at Qualys, provides an overview of his Black Hat 2010 talk, in which he presented a plethora of research findings into the state of SSL on the internet. As Ristic notes, websites are succeeding in some areas and falling short in others when it comes to deployment of SSL encryption.

$9 million counterfeit check scheme uncovered: Details revealed at Black Hat 2010

Ben Feinstein, director of research at SecureWorks, reveals the inner workings of Russian cybercrime gang that leveraged botnets, VPN tunnels, social engineering and money mules to create a $9 million check counterfeiting scheme. Details of the racket were announced last week at the Black Hat conference in Las Vegas.

Hacking smartphones to make long-distance calls: Mikko Hypponen reveals the secret at Black Hat 2010

Mikko Hypponen, chief research officer at F-Secure, speaks with SC Magazine's Angela Moscaritolo after his Black Hat 2010 presentation, "You will be billed $90,000 for this call," which examined how hackers can secretly attack a smartphone to make long-distance calls — on your dime.

How he attacked ATMs: Barnaby Jack press conference at Black Hat 2010

Barnaby Jack, director of security research at IOActive Labs, fields questions from the press shortly after wowing the Black Hat 2010 crowd with a talk about ATM vulnerabilities, both remote and local, that can allow attackers to retrieve free cash from the machines. In the press conference, Jack describes how he perpetrated the exploits. He references "Dillinger," an attack tool named after the infamous 1930s bank robber that he used to exploit one of the vulnerabilities — an issue in the remote monitoring authentication process, which is turned on by default in most machines made by manufacturer Tranax.

Dealing with compliance: Interview with Michael Thelander, product marketing manager at Tripwire

SC Magazine Deputy Editor Dan Kaplan sits down with Tripwire's Michael Thelander to learn whether compliance remains a driver for organizations, especially as new regulations pop up and existing mandates become more stringent. Thelander also touches on compliance in the cloud, and whether it can be achieved.

Guarding against insider malfeasance: Interview with Paul Smith, CEO of PacketMotion

Paul Smith, CEO of PacketMotion, maker of network segmentation and compliance solutions, tells SC Magazine's Angela Moscaritolo how organizations can best guard against trusted insiders stealing company assets and intellectual property.

Managing access: Interview with Glenn Hazard, CEO of Xceedium

Glenn Hazard, CEO of identity and access management provider Xceedium, tells SC Magazine's Angela Moscaritolo what is driving this security industry sector and how it is morphing to keep up with the increasing mobile workforce.

Mergers and acquisitions: Interview with Gary Steele, CEO of Proofpoint

SC Magazine reporter Angela Moscaritolo discusses the bustling M&A landscape with Gary Steele, CEO of Proofpoint, to learn what has prompted a recent flurry of activity and how security buyers should react when considering a solution.

Protecting databases: Interview with Thom VanHorn, vice president of marketing for Application Security Inc.

SC Magazine's Angela Moscaritolo learns from Application Security Inc.'s Thom VanHorn of the latest trends around database security. A majority of the attacks come from insiders, but external attacks are quite prevalent as well. For example, government databases undergo constant "probing" from adversaries.

Web security: Interview with Devin Redmond, vice president of product management at Websense

SC Magazine Deputy Editor Dan Kaplan sits down with Websense's vice president of product management to discuss today's web threats facing businesses of all sizes.

Application whitelisting: Interview with Paul Paget, president and CEO of Savant Protection

Paul Paget, president and CEO of Savant Protection, discusses how whitelisting is evolving as a viable alternative to traditional anti-virus defenses. In an interview with SC Magazine's Angela Moscaritolo, Paget also responds to the criticisms he often hears about whitelisting.

Payment security: Interview with Bob Carr, chairman and CEO of Heartland Payment Systems

Bob Carr, CEO of Heartland Payment Systems, which suffered a record-breaking breach in 2008, has rolled out a new payment solution to its merchants that offers end-to-end encryption of sensitive transaction data. In an interview with SC Magazine's Deputy Editor Dan Kaplan, Carr discusses the new offering and offers an update on the company's recovery 18 months after it announced the breach, which exposed some 130 million records.

ACH fraud: Interview with Chris Mark, EVP of data security and compliance at ProPay

Chris Mark of ProPay discusses how some small- and mid-size businesses are falling victim to ACH fraud due to poor authentication.

Compromised endpoints: Interview with Val Rahmani, CEO of Damballa

Val Rahmani, CEO of Damballa, describes to SC Magazine Deputy Editor Dan Kaplan how organizations are starting to view botnets as a risk management concern, especially considering many businesses do not even realize that, on average, 5 to 10 percent of their endpoints are infected. In many cases, bot malware cannot be detected by conventional anti-virus products, so organizations must detect outbound communications between zombie machines and command-and-control hubs to gain visibility into the problem.

Smartphone security policies: Interview with Eduard Goodman, CPO of Idenity Theft 911

SC Magazine reporter Angela Moscaritolo interviews Eduard Goodman, chief privacy officer of Identity Theft 911, who says businesses are slow to develop policies for mobile device use, and smartphones can be the cause of many breaches.

Website protection: Interview with Mandeep Khera, CMO of Cenzic

Cenzic's Mandeep Khera discusses why SMBs are more susceptible to web application attacks.

Advertisement

How to Prevent Insider Threats!

POLL