Cybersecurity news, analysis and the SC Media print magazine archive.

In Depth

Anonymity: cybersecurity’s double-edged sword

The ability to remain undetected while committing computer network intrusions provides the raison d’être for the IT security professional. This cat and mouse game keeps millions of professionals and hackers employed because attackers successfully cover their tracks on a daily basis, experts tell SC Media.  It’s no wonder the hacktivist collective called themselves “Anonymous” when…

SLA: What they are and why you need them

The late singer-songwriter Jim Croce gave us sage advice about life: “You don’t step on Superman’s Cape. You don’t spit into the wind. You don’t take the mask off the old Lone Ranger and you don’t mess around with Jim.” The same can be said for something much more mundane: signing a contract with a…

Ransomware trap: Escaping

Before you shell out some virtual currency to unencrypt your data, consider the fact that there’s no guarantee that ransomware attackers will proceed to unlock it.

Next post in In Depth