Editorial Staff Blogs

Executive Insight

SC Directors Cut

Reboot ’17 Industry Innovators eBook



GET SC MEDIA DELIVERED TO YOUR INBOX

Product Reviews

Carbon Black Cb Defense

Verdict: For a mix of threat analysis and incident response – where the core of the alert is malware-based – this one demands your attention. The Carbon Black experience is obvious.

Comodo Advanced Endpoint Protection

Verdict: This is a strong product under the covers but with a few warts for users. None of those are show-stoppers, though, and you would do well to take a close look at it.

SC Magazine Recommended

CrowdStrike Falcon

Verdict: This is a very sophisticated but rather specialized tool for the endpoint. If you are a large organization or one with high-value information assets, this is well worth your time. For what it does, we know of no better tool available. We make this our cloud-based Recommended product.

SC Magazine Recommended

Cylance CylancePROTECT with CylanceOPTICS

Verdict: If you are using CylancePROTECT this is a no-brainer. If you are not, it’s a good reason to consider it. Because CylancePROTECT is one of our SC Lab Approved products, it already has our highest rating, but we are naming the OPTICS add-on Recommended for the value that it adds ...

Whitepapers

CEO Fraud Prevention Manual

Cyber-risk management remains a blind spot for most C-level executives. Any company must quickly learn to integrate these skills and technologies into day-to-day operations – or face...

Account Application Fraud Trends 2017

Sneak preview of the upcoming April 27, 2017 | 2 PM ET/11 AM PT webinar on the topic "Using trusted identities to fight fraud and reduce customer friction".

4 Critical Elements of a Successful GRC Implementation

This paper will tackle four of the biggest challenges organizations face when trying to implement a GRC platform to help you avoid common pitfalls.

Components: Increasing Speed and Risk

Download this report to learn what strategies development and security teams need to tackle the challenge of securing their applications from vulnerabilities in third-party and open...