You searched for cyber | SC Media

Your search for cyber returned 27 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Features remove
Cybersecurity remove

Your search for cyber returned 27 results

Sort Results:

Relevant Recent
Blame game: Cyber espionage
Features

Blame game: Cyber espionage

Nation-states are extricating intellectual property from U.S. government entities and private corporations, reports David Cotriss.
Cyber Warfare: The next Cold War
Features

Cyber Warfare: The next Cold War

Much of the breach conversation over the past year has been devoted to so-called hacktivists. But nation-state adversaries, bent on looting organizations of intellectual property, are another breed entirely.
Bumper crop: Cyber security legislation
Features

Bumper crop: Cyber security legislation

Data security measures have a long, storied history of meeting their demise on Capitol Hill. But two proposals have the bipartisan support that give them at least a shot at passage in 2012.
Features, Security News, Women in Security

The company you keep

A new take on the old adage “you’re known by the company you keep,” might aptly apply to women in security who’ve found success, progress and opportunities in organizations that know their value. Take Emily Mossburg, who has been forging a path in cybersecurity for more than 20 years where she’s now a principal at…
Features, Security News

Follow the cybersecurity money

Venture capitalists have poured money into cybersecurity in recent years – their investments offer a glimpse at what products, solutions and startups are on the horizon.  Lee Sustar reports. For anyone who’s made it through the twin expo floors at the annual RSA Conference – past the big-name vendors with magicians, fast-talking comedians, flashy free…
Ransomware, Security News

Cybersecurity: Poised for a giant leap forward

Cybersecurity has enjoyed good health but is an industry itching for innovation and transformation – and the next big thing, Teri Robinson reports. When Neil Armstrong climbed down the ladder on the Apollo 11 lunar module, the Eagle, and toed the moon’s surface, as he so aptly stated, his small step simultaneously represented a giant…
Case study: Malware checkout
Features

Case study: Malware checkout

The hospitality industry remains one of the most targeted by cyber criminals. That's why Thayer Lodging Group, which owns or operates 18 hotels, knew it was time to get serious about endpoint security.
Cyberespionage: Raids from afar
Features

Cyberespionage: Raids from afar

The Google-China attacks, revealed in January, kicked off a year in which the threat of cybespionage to steal corporate and government secrets firmly entrenched itself as part of the security battle zone.
Offensive line: Fighting back against hackers
Features

Offensive line: Fighting back against hackers

The only way to gain the upper hand on today's advanced adversaries is by being proactive -- even aggressive, a tactic that can take many forms, says Joel Yonts, CISO of an automotive supply company.
Features

The era of the big research lab is over, as market pressures gain influence over product development

Imagining what a high-tech security research center looks like might trigger for some people a vision of a huge laboratory with teams of scientists working diligently to create the next firewall or encryption device. That may be the right image for movies — or even accurate for many organizations these last few decades — but it is not the case for most of today's information security technology developers.
Next post in Features