Center for all IT-related crime content including data theft, ransomware to phishing scams, IoT hacks and malware.
Editorial Staff Blogs
Verdict: For a mix of threat analysis and incident response – where the core of the alert is malware-based – this one demands your attention. The Carbon Black experience is obvious.
Verdict: This is a strong product under the covers but with a few warts for users. None of those are show-stoppers, though, and you would do well to take a close look at it.
Verdict: This is a very sophisticated but rather specialized tool for the endpoint. If you are a large organization or one with high-value information assets, this is well worth your time. For what it does, we know of no better tool available. We make this our cloud-based Recommended product.
Verdict: If you are using CylancePROTECT this is a no-brainer. If you are not, it’s a good reason to consider it. Because CylancePROTECT is one of our SC Lab Approved products, it already has our highest rating, but we are naming the OPTICS add-on Recommended for the value that it adds ...
Five Principles for Securing DevOps
As DevOps practices spread rapidly across organizations, the need to secure DevOps becomes more important. This eBook outlines the evolution of DevOps, and five principles that must...
SC Media Infographic on GDPR
This infographic looks at some of the results of a recent SC Media and Guidance Software poll on the current state of U.S. companies’ preparations and priorities for GDPR.
State of Software Security – Developer Supplement
As ties between development and security grow closer, developers are tasked with hands-on security testing. This report helps developers by boiling down key takeaways they will be...
Employees at the Frontline in the Battle Against Ransomware
The recent escalating ransomware attacks have shown that no organization is safe and the effects of those attacks can be devastating. Find out how you can train your employees to...