You searched for breach/ | Page 876 of 880 | SC Media

Your search for breach/ returned 8794 results

Your search for breach/ returned 8794 results

Sort Results:

Relevant Recent
In Depth

Building a better bug bounty

When Microsoft temporarily doubled its maximum bug bounty prize to $30,000 earlier this month, it was hard to not to notice the timing. After all, the software giant had just been burned twice by Google Project Zero researchers who publicly disclosed Windows vulnerabilities before they could be patched. This was not the first time Google…
Features

Whatever happened to Apple versus FBI?

SC Media throws it back to February 2016 when Apple and the FBI squared off for a contest that never happened. The immediate issue was temporarily resolved, but the controversy never died. Teri Robinson reports.
Security News

Raising information exchange

SC Magazine is providing an exclusive look at abridged versions of various chapters included in the just-released Larstan’s "The Black Book on Government Security," as part of an agreement with Larstan Publishing. This month’s excerpt will be available in an extended form on https://www.scmagazine.com.
Security News

A five step process for achieving measurable returns on security investments

What do the president of the United States and a Fortune 1000 CIO have in common? For starters, both are responsible for mitigating immense security threats, maintaining budgets and justifying expenditures to governing committees for approval. They are also accountable for the failure or success of security in their respective domains.
CSO of the year
Features

CSO of the year

Security, just like quality, is job number one. In fact, for Dan Lohrmann, chief information security officer with the state of Michigan, security has become a part of him.
Features

Women of influence

These eight women are featured for their noteworthy efforts, which have impacted the field of online security and data privacy for the better.
Page

Terms and Conditions

Last updated April 1, 2020 Introduction This Agreement (“Agreement”) governs your use of the website and mobile applications operated by CyberRisk Alliance LLC, and the related services (collectively, the “Service”). CyberRisk Alliance’s Privacy Policy, and additional terms and conditions of use applicable to specific areas of the Service may also be posted in such areas…
SC Corporate News, Security News

The winners of the 2020 SC Awards Honored in the U.S.

Trust AwardBest Authentication TechnologyForgeRockForgeRock Identity Platform All journeys have a beginning, middle and an end, and it’s the job of the ForgeRock Identity Platform to ensure that every authentication journey, from start to finish, remains safe for the client and easy for the user. The platform’s Intelligent Authentication feature delivers the unique ability to visually map user authentication journeys with a drag-and-drop interface…
Next post in SC Corporate News