July 2017 Issue of SCMagazine

July 2017 Issue of SCMagazine

July-August 2017


Tired issues, yet opportunity

There are decisions my female friends and I make daily that correlate to problems we face as a result of gender bias in our working ...


Cyber women on the Hill

Fixing the gender gap will be a big part of fixing the talent gap, says Joyce Brocaglia.

Never let them see you sweat: Advice from a woman in security

I've never missed an opportunity to grow in my career because of my gender, says IBM's Wendi Whitmore.


Where opportunity knocks

Despite sobering statistics, women have plenty of opportunity in cybersecurity, Teri Robinson reports.

Priming the pipeline: Education

Early education efforts is key to filling cybersecurity talent and gender gaps, reports Robert Abel.

Widening the field

The number of women in security may have stagnanted, but it need not continue to do so, reports Doug Olenick.

Female blackhats

On the Dark Web, nobody knows you're a woman, reports Bradley Barth.

Hiring practices

Women are underrepresented in cybersecurity. But, despite bias and other disadvantages, advances are being made, reports Greg Masters.

Women in IT Security: Power Players

These eight women were selected for longstanding contributions to the IT security space. As veterans in the field, they've served as exemplary women taking on ...

Women in IT Security: Influencers

We celebrate these five women for their noteworthy efforts, which have positively impacted the field of online security.

Women in IT Security: Eight Women to Watch

These eight women have moved - and continue to move - the security industry forward.

Women in IT Security: Honorable Mention

We shine a light on seven extraordinary women for their achievements in IT and information security.

Product opener

Endpoint security: Now with a different look

We found these tools an interesting and refreshingly new approach to endpoint security.

Group Test 1

Carbon Black Cb Defense

Carbon Black always has been a leader in anti-malware protection.

Comodo Advanced Endpoint Protection

Comodo Advanced Endpoint Protection provides a wealth of functionality, including auto-containment, whitelisting, host intrusion prevention, firewall, web filtering, file reputation, behavior analysis, anti-malware, cloud-based sandboxing, ...

CrowdStrike Falcon

Crowdstrike Falcon is, largely, a threat-hunting tool that ties the endpoint tightly into its threat-hunting ecosystem.

Cylance CylancePROTECT with CylanceOPTICS

CylanceOPTICS is, to put it simply, a set of sophisticated analyst tools that takes everything provided by CylancePROTECT and assists in the task of understanding ...

ESET Endpoint Security

ESET is a combination of a management server and endpoint agents.

Kaspersky Lab Endpoint Security for Business

Kaspersky Endpoint Security for Business (KESB) is a platform for securing endpoints at each layer of the network.

McAfee Endpoint Security

For its comprehensive feature set and excellent performance and support, we make this our Best Buy.


Don’t pass this one by if you are looking at anti-malware.

Symantec Endpoint Protection

Symantec Endpoint Protection (SEP) is an endpoint security platform that can use an agent on physical devices or can run in a hybrid agentless/agent-based mode ...

First Look

First Look: Bitdefender Hypervisor Introspection (HVI)

Bitdefender's Hypervisor Introspection (HVI) tool is designed to solve a difficult problem in virtual environments.

Last Word

Women, be wise: Choose cyber

The challenge is getting women to enter the field in the first place, says Kris Lovejoy, CEO at BluVector.