Section Asset Image

Center for all IT-related crime content including data theft, ransomware to phishing scams, IoT hacks and malware.

Privacy & Compliance
Teri Robinson
Apr 28, 2017
Section Asset Image

Center for all content concerning IT infrastructures including cloud security, vulnerability management, crisis planning and more.

Vulnerabilities
Bradley Barth
Apr 28, 2017

Executive Insight

Editorial Staff Blogs

GET SC MEDIA DELIVERED TO YOUR INBOX

Product Reviews

IRONSCALES IronTraps

Verdict: This is an excellent approach to first phase interdiction for ransomware attacks and shows a solid understanding of the ransomware process and how to manage its delivery through phishing.

SC Magazine Recommended

Sophos Intercept X and Endpoint Protection

Verdict: This is a solid anti-ransomware tool, priced right and well-supported. It certainly deserves your attention. We make this our Recommended product for multi-featured products this month.

SC Magazine Best Buy

Trend Micro Smart Protection Complete

Verdict: This is absolutely a world-class anti-ransomware product in a world-class ecosystem. Using the associated products, you can build out a solid security framework in your enterprise. For its completeness and solid competence, we make this our Best Buy this month.

WatchPoint CryptoStopper

Verdict: A promising product not quite ready for prime time.

Whitepapers

A Conversation: Make Your Network Work Smarter, Not Harder

If you expect to thrive, your network must be able to respond instantly to changing requirements. It needs to help control costs and improve productivity. That’s where the new capabilities...

Solution Brief: Security when off the corporate network, off the ...

The bottom line is that the VPN is not always-on despite best practice policies. And your firewall, proxy, and AV is not enough to protect your mobile workforce. Learn how the DNS...

From Reactive to Proactive: How to Avoid Alert Fatigue

As cybersecurity teams become more inundated with alerts, they become desensitized and may be less inclined to address them. Find out how to take decisive action on the threats most...

Safeguarding the Internet

Today, none of us are immune to the impact of botnets on internet-connected organizations. There is ample validation that monitoring the communications patterns between command-and-control...

@SC Magazine

HTML asset sc Twitter template

Sponsored Links