You searched for cyber | SC Media

Your search for cyber returned 21 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Features remove
Features remove
Feature remove
Karen Epper Hoffman remove

Your search for cyber returned 21 results

Sort Results:

Relevant Recent
Features

(Cyber)crime and punishment

For organizations that suffer a data breach, the penalty typically involves a clean up and making good on the damage to their reputation. But is that enough to encourage better security controls? Karen Epper Hoffman finds out.
2014 Women in IT Security
Features

2014 Women in IT Security: Stacey Halota

When she stepped into the job of vice president of information security and privacy at Graham Holdings Company in 2003, Stacey Halota had to carve out new territory because her position had never existed at the corporate level before.
Features

Top to bottom assurance

When chief executives flout security rules, the losses can be higher than usual. What should organizations do to help their leaders stay on track with cybersecurity? Karen Epper Hoffman reports.
Features

Going Soft: Nation-state attackers seek weaknesses in the system

When nationally backed bad actors from other countries seek areas to infiltrate, they are looking for areas where they not only can get in, but they can make a big impact. Other than critical infrastructure, nation-states may also try to wheedle their way into financial systems, mobile applications, election technology, and ultimately, IoT devices.
Next post in Features