The promise of Windows 8
When the latest version of the most popular operating system (OS) in the world is released in October, researchers in search of vulnerabilities will flock to the shiny, new platform.
When the latest version of the most popular operating system (OS) in the world is released in October, researchers in search of vulnerabilities will flock to the shiny, new platform.
Debate» Sharing security data is the best way to raise the cost of entry and lower ROI for criminals and spies.
Also know as mass malware packs, crimeware packs are the “Threat of the Month” in the June issue of SC Magazine.
Risk is a multilayered function derived from threat, vulnerability and impact.
Leading news concerning Microsoft’s sharing program, CISPA passed by the U.S. House, the Global Payments data breach debacle, and more.
A round-up of new launches, mergers and acquisitions, personnel moves and other company news.
Security professionals with specific infrastructure experience are needed to lead teams comprised of security operations, security engineering and threat intelligence.
Me and my job: Matthew Dosmann, lieutenant colonel, U.S. Army
Today’s firms must identify people who have knowledge from disparate areas, says Tracey Wilen-Daugenti.
Sites such as Facebook and Twitter contain seemingly infinite amounts of personal data, so it’s no wonder criminals have turned their focus there. But social media providers and end-users can protect themselves.