SC Media Reboot Leadership Awards 2017, an extension of SC Media's Reboot edition and the first in what will be an on-going Awards program that will enable us to honor executive and professional leaders in our space for their unique, inventive and inspiring contributions that improve security, shape the industry, provide thought leadership, and otherwise have a positive impact on cybersecurity. The honorees were selected based on how they changed the practice or understanding of cybersecurity for the better. Please CLICK HERE to see the honorees.

Breaking News

Latest Headlines

Section Asset Image

Center for all IT-related crime content including data theft, ransomware to phishing scams, IoT hacks and malware.

Malware
Rene Millman
Aug 23, 2017
Section Asset Image

Center for all content concerning IT infrastructures including cloud security, vulnerability management, crisis planning and more.

APTs/cyberespionage
Teri Robinson
Aug 23, 2017

Executive Insight

SC Fast Facts



Product Reviews

Carbon Black Cb Defense

Verdict: For a mix of threat analysis and incident response – where the core of the alert is malware-based – this one demands your attention. The Carbon Black experience is obvious.

Comodo Advanced Endpoint Protection

Verdict: This is a strong product under the covers but with a few warts for users. None of those are show-stoppers, though, and you would do well to take a close look at it.

SC Magazine Recommended

CrowdStrike Falcon

Verdict: This is a very sophisticated but rather specialized tool for the endpoint. If you are a large organization or one with high-value information assets, this is well worth your time. For what it does, we know of no better tool available. We make this our cloud-based Recommended product.

SC Magazine Recommended

Cylance CylancePROTECT with CylanceOPTICS

Verdict: If you are using CylancePROTECT this is a no-brainer. If you are not, it’s a good reason to consider it. Because CylancePROTECT is one of our SC Lab Approved products, it already has our highest rating, but we are naming the OPTICS add-on Recommended for the value that it adds ...

Executive Insight

Editorial Staff Blogs

GET SC MEDIA DELIVERED TO YOUR INBOX

Whitepapers

Where Are We Today?

Encryption keeps data confidential, concealing threats while adding network burdens for organizations inspecting encrypted traffic. This brief examines current adoption and what's...

Mobile App Security Program Management Handbook

Whether starting with a mobile app security testing initiative, or wanting to make some tweaks to improve an existing program - use this guide to build a programmatic approach to mobile...

SC Media eBook on Insider Threat

Not all threats are malicious. Well-intentioned employees represent a risk vector just as severe as others. Read the latest SC Magazine eBook on Insider Threat to learn more.

The New Enterprise Security Model

Cyber attacks as of late have been a growing issue, and pose as threats to all businesses. Identifying an issue, and orchestrating the proper security measures will put companies in...