SC Staff SC Media | Page 2 of 9

SC Staff

Most recent articles by SC Staff

Finalists: Best Database Security Solution

Protecting critical information is the number one priority for many organizations. An integral component of this is to secure corporate databases – safeguarding the mission-critical environments from data loss, data manipulation, and data leakage. Solutions recognized in this category can run the gamut, from encryption to access management to logging and monitoring. But in all…

Finalists: Best Threat Detection Technology

Threat detection techniques have necessarily graduated from more simple network-based detection solutions to technologies focused on improving detection times, alerting and mitigating attacks as they are happening. Not only can a wide range of organizations now readily fall victim to an attack, malware often infiltrates quietly, persisting in networks after leveraging various points of entry…

Finalists: Best Deception Technology

Most security experts advise against offensive tactics, or hack-back strategies, to deter malicious actors. But what businesses can do through select product offerings is lure those malicious actors away from valuable assets through technological trickery. Products recognized in this category automate the creation, deployment, and management of digital traps (decoys), lures and deceits, which are…

Finalists: Security Innovator of the Year

Innovation builds upon the best of what a sector offers today to create solutions that will transform the way businesses operate tomorrow. The individuals that drive that innovation bring to the table a specific set of skills: problem-solving expertise, technological prowess, and an ability to think in the abstract to understand what is (or could…

Finalists: Best Threat Intelligence Technology

The protection of networks and systems depends upon an awareness of the threat landscape: understanding the evolving nature of attacks and the calling cards of particularly groups, to inform defensive strategies and identify vulnerabilities before the bad actors do. Offerings recognized in this category help cybersecurity teams research and analyze cybercrime and other threat trends,…

Next post in SC Awards