You searched for cyber | SC Media

Your search for cyber returned 475 results

Your search for cyber returned 475 results

Sort Results:

Relevant Recent
Perspectives

Build security by expanding cyber awareness

Governments and intelligence agencies are engaged in cyberwarfare on an epic scale. As issues discussed on the internet are frequently amplified in the media by organizations with vested interests, it’s become daunting for security pros to unravel the complex and constantly changing web of online allegiances. All this noise offers the perfect cover for cybercriminals,…
Data Breach, Security News

Supply chain weak security link for 92 percent of US companies

The devastating Target breach – the result of an earlier attack on the retail giant’s HVAC vendor – wasn’t an anomaly. New research from BlueVoyant found that 92 percent of U.S. organizations suffered a breach in the past 12 months as a result of weakness in their supply chain. When four other countries (the U.K.,…
Sponsor Content

Threat intelligence starts with strong relationships

The availability of reliable and actionable threat intelligence is essential for any effective security strategy. Security tools not only need to be able to gather threat intelligence from the places in the network they have been deployed, but they also need to be able to share and correlate that intelligence across and between all other…
Perspectives

Why the $26 billion in BEC scams are worse than you think

Business email compromise (BEC) scams are one of the biggest money makers for cyber criminals. BEC attacks are also unique in that they rely on human behavior rather than sophisticated technology. Typical BEC scams use an authentic-looking email from a top executive to deceive subordinates into transferring money.   A lot of money. The FBI…
Featured, Health Care, Network Security, Ransomware, Security News

Lessons from the ransomware death: Prioritize cyber emergency preparedness

For medical facilities, and any entity that delivers critical services, the situation places security teams on high alert: ensure adequate training for the workforce and some means of network redundancy or else risk similar tragedy or even potential liability.
Next post in Ransomware