Breaking News

Latest Headlines

Section Asset Image

Center for all IT-related crime content including data theft, ransomware to phishing scams, IoT hacks and malware.

Ransomware
Bradley Barth
Aug 17, 2017
Section Asset Image

Center for all content concerning IT infrastructures including cloud security, vulnerability management, crisis planning and more.

Data Breach
Bradley Barth
Aug 18, 2017

SC Fast Facts

SC Fast Facts



Product Reviews

Carbon Black Cb Defense

Verdict: For a mix of threat analysis and incident response – where the core of the alert is malware-based – this one demands your attention. The Carbon Black experience is obvious.

Comodo Advanced Endpoint Protection

Verdict: This is a strong product under the covers but with a few warts for users. None of those are show-stoppers, though, and you would do well to take a close look at it.

SC Magazine Recommended

CrowdStrike Falcon

Verdict: This is a very sophisticated but rather specialized tool for the endpoint. If you are a large organization or one with high-value information assets, this is well worth your time. For what it does, we know of no better tool available. We make this our cloud-based Recommended product.

SC Magazine Recommended

Cylance CylancePROTECT with CylanceOPTICS

Verdict: If you are using CylancePROTECT this is a no-brainer. If you are not, it’s a good reason to consider it. Because CylancePROTECT is one of our SC Lab Approved products, it already has our highest rating, but we are naming the OPTICS add-on Recommended for the value that it adds ...

Executive Insight

Editorial Staff Blogs

GET SC MEDIA DELIVERED TO YOUR INBOX

Whitepapers

Cyber Risk Management: A New Approach to Responding to Complex ...

Cyber threats are significant business risks facing organizations. While companies spend money every year to secure a perimeter against cyber and insider threats, new data breaches...

The Hidden Costs of Microsoft Office 365 Security

According to Gartner, 35% of organizations that move to Office 365 supplement the natively available email security with a third-party product. Learn where native features fall short...

SC Media eBook on Mobile Security

This SC Magazine eBook on Mobile Security will delve into the world of mobile security and look at the policies and procedures CISOs need to have in place to augment MDM software.

Strategies for the Enterprise to Address Today's Top Security Vulnerabilities

A state of rock-solid cyber security last year may be a flawed security approach today. This is a reality facing many organizations. Download this whitepaper to learn how confident...