You searched for hackers/ | Page 642 of 643 | SC Media

Your search for hackers/ returned 6430 results

Your search for hackers/ returned 6430 results

Sort Results:

Relevant Recent
Security News

Sweet charity

When Jim Thie showed up in Americus, Ga. one day last year to interview for the chief information officer job at Habitat for Humanity International, he quickly figured out he was a long way from the corporate world.
Network Security, SC Security Ops Center, Security News

Endpoints: Same as they ever were, but different too

The numbers are in and they are terrible. The FBI reports that more than 4,000 ransomware attacks occur daily and industry research has found there are 230,000 new malware samples produced every day. During the past six years, the Breach Level Index reports that 15 billion data records have been lost or stolen. That translates…
Security News

Equal? Not quite

Amid all the hoopla of Hillary Clinton making history by snagging the Democratic nomination for president, it's important to remember it only took 44 years from the time that Shirley Chisholm, the first African-American woman elected to Congress, made her unsuccessful but groundbreaking run at the presidency for a woman to ascend to the top of a major party's ticket.
Network Security

How’s he doing, so far?

The cybersecurity and privacy communities have an abundance of advice for Donald Trump as he plots his cyber strategy.
Data Breach

Apache Struts vulnerability likely behind Equifax breach, Congress launches probes

The Equifax breach, now believed to have been accomplished through the exploitation of a vulnerability in open-source server software Apache Struts disclosed earlier this month, has rained down criticism on the credit information company for poor security practices and has prompted at least three congressional committees to consider probing the incident. Jeff Williams, cofounder and…
Office mobility: Consumerization of devices
Features

Office mobility: Consumerization of devices

No longer with the option of saying "no" to its employees, organizations are finding that solutions and techniques exist for managing and securing the mobile devices workers wish to connect to the corporate network.
Cyberespionage: Raids from afar
Features

Cyberespionage: Raids from afar

The Google-China attacks, revealed in January, kicked off a year in which the threat of cybespionage to steal corporate and government secrets firmly entrenched itself as part of the security battle zone.
Rep. Zoe Lofgren wants to "prevent the kind of abusive prosecution directed at Aaron Swartz."
Features

The great divide: Reforming the CFAA

Aaron Swartz's death inspired Rep. Zoe Lofgren to want to reform the federal anti-hacking law, but some security pros worry this would sterilize a potent enforcement weapon, reports Dan Kaplan.
Document security: Minding your documents
Opinions

Document security: Minding your documents

With today's technologies, it's easier than ever to make a document, presentation, spreadsheet or video available to anyone anywhere -- so much so that someone could send it absent-mindedly, without realizing the consequences until it was too late. This is why it's critical that employees are given unambiguous guidance on protecting documents with proper classification labeling and access control
Next post in Features