You searched for privilege escalation | SC Media

Your search for privilege escalation returned 13 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Features remove

Your search for privilege escalation returned 13 results

Sort Results:

Relevant Recent
Ransomware, Security News

Talkin’ about an EVOLUTION…

In cybersecurity terms, is there anything more Darwin-esque than ransomware? Small variations in targets, attacks, points of entry, payout and even attacker priorities have saved it from extinction and increased its ability to compete, survive and reproduce just as Charles Darwin contended organisms developed. Unfortunately, though, those attacks have evolved into a greater menace for…
Features

Dissecting an APT attack

Basic network hygiene and improved visibility can go a long way, as we might learn from the likes of Ashley Madison and Anthem. Danny Bradbury reports.
Prime pickings: Application security
Features

Prime pickings: Application security

Applications provide the path to an organization's coveted assets. And even if they're not public-facing, they still can be a ripe target. We talk to Marcus Prendergast, CSO of ITG, for this month's cover story.
Cyber cold war: Espionage and warfare
Features

Cyber cold war: Espionage and warfare

When the history of the cyber arms race is written, the first chapter surely will be devoted to Stuxnet. But now that these sophisticated strikes have started, there are plenty of questions to answer.
Features

Cover story: Some enterprises benefiting from the convergence of physical and information security assets

The most mature information security programs cant always protect against theft of information if the perpetrator has access to the server room. Without the proper physical controls over the data centers and facilities which contain the information technology hardware, it is easy enough for an imposter to steal assets the old-fashioned way — with the five-finger discount.
Security News

Forging a national cyber security strategy

In the face of growing threats to its cyber assets, America requires a cohesive and comprehensive plan to protect its vital and most sensitive data. Here, one of the leading decision makers in the federal government IT arena coveys overarching priorities for securing the country's cyberspace.
Next post in Security News