Section Asset Image

Center for all IT-related crime content including data theft, ransomware to phishing scams, IoT hacks and malware.

Cybercrime
Bradley Barth
Jul 25, 2017
Section Asset Image

Center for all content concerning IT infrastructures including cloud security, vulnerability management, crisis planning and more.

Network Security
Jul 27, 2017

Editorial Staff Blogs

Executive Insight

SC Directors Cut

Reboot ’17 Industry Innovators eBook



GET SC MEDIA DELIVERED TO YOUR INBOX

Product Reviews

Carbon Black Cb Defense

Verdict: For a mix of threat analysis and incident response – where the core of the alert is malware-based – this one demands your attention. The Carbon Black experience is obvious.

Comodo Advanced Endpoint Protection

Verdict: This is a strong product under the covers but with a few warts for users. None of those are show-stoppers, though, and you would do well to take a close look at it.

SC Magazine Recommended

CrowdStrike Falcon

Verdict: This is a very sophisticated but rather specialized tool for the endpoint. If you are a large organization or one with high-value information assets, this is well worth your time. For what it does, we know of no better tool available. We make this our cloud-based Recommended product.

SC Magazine Recommended

Cylance CylancePROTECT with CylanceOPTICS

Verdict: If you are using CylancePROTECT this is a no-brainer. If you are not, it’s a good reason to consider it. Because CylancePROTECT is one of our SC Lab Approved products, it already has our highest rating, but we are naming the OPTICS add-on Recommended for the value that it adds ...

Whitepapers

Gartner: DevSecOps - How to Seamlessly Integrate Security into DevOps

Research has shown that DevOps is becoming increasingly common among organizations, with security integration an important next step. This Gartner report explains the best practices...

Employees at the Frontline in the Battle Against Ransomware

The recent escalating ransomware attacks have shown that no organization is safe and the effects of those attacks can be devastating. Find out how you can train your employees to...

Five Principles for Securing DevOps

As DevOps practices spread rapidly across organizations, the need to secure DevOps becomes more important. This eBook outlines the evolution of DevOps, and five principles that must...

Intelligent Threat Response & Risk Reduction for the Mobile Workforce

Watch this webinar from TechTarget “Intelligent Threat Response and Risk Reduction for Today’s Mobile Workplace” and learn how to use data and analytics to protect your enterprise...