Security friction: The balance of consumer demand and consumer protection
How do companies balance innovation with the need to protect sensitive data? We’re pleased to share this session from our last event: https://bit.ly/3T27Rvw. Register now to join us at SC Finance eConference December 13th-14th: https://bit.ly/3fruR9D
Set your brand apart from the crowd.
Are you looking for ways to differentiate your vulnerability management solution in the cybersecurity space? Let us help you stand out. Our custom research will help add value to your technology solution by giving you a greater understanding into enterprise-level needs. Let’s talk. Email us at: [email protected]
#randsomware #cyberattack #customresearch #businessintelligence #datandinsights #technology #cybersecurity
Set your brand apart from the crowd.
Are you looking for ways to differentiate your #technology solution in the #cybersecurity space?
Let us help you stand out. Our custom research capabilities can help you develop authoritative thought leadership while aligning your solution to our calendar of research topics. Learn more: https://bit.ly/3w3SN8b
#customresearch #businessintelligence #datandinsights
Have you nominated your top MSSP of 2022? Now’s your chance. Complete the survey and help influence our research and annual survey: https://bit.ly/3uVirLx
#MSP #cybersecurity #managedsecurity #managedserviceprovider
Have you nominated your top MSSP of 2022? Now’s your chance. Complete the survey and help influence our research and annual survey: https://bit.ly/3uVirLx
#MSP #cybersecurity #managedsecurity #managedserviceprovider
Log4j vulnerability response for banks: 'This is not a quick process'
The process of examining ones own exposure to the #Log4j vulnerability is methodical and slow, said a panel of security leaders that spoke during the SC Finance eConference, only days after the world learned of the threat that emerged as pervasive across systems. http://ow.ly/NPXT50HhQng
Amid Log4j vulnerability response, assessing third- (and fourth- and fifth-) party risk
Freddie Mac Chief Information Security Officer Betty Elliott and ProcessUnity CEO Sean Cronin spoke to SC Media Jill Aitoro about the critical response to the #Log4j vulnerability involving partners and suppliers. http://ow.ly/a9sq50HhPkv
Threat hunting in the age of work-from-home
The digital transformation triggered by the pandemic meant many organizations scrambled to enable employees to work from home. “Speed is the natural enemy of security,” Casey Ellis, the founder, chairman and CTO of Bugcrowd told SC Media Senior Reporter Joe Uchill during a virtual conference by CyberRisk Alliance. MORE: http://ow.ly/Xnbt50Gsef0
Incorporating security into the software development process
Larry Maccherone, who led DevSecOps transformation at Comcast, discusses how to ensure developers incorporate security into their work without diminishing creativity and innovation. Read more here: http://ow.ly/AiyD50GnPo9 #cybersecurity
Zero-trust principles in the age of SolarWinds attack
As Microsoft’s director of identity security, Alex Weinert had a front-row seat into the SolarWinds investigation, which he called the most sophisticated attack he or anyone on his team had ever seen during an SC Media eSummit on zero trust. Learn more here: http://ow.ly/HdCO50G88F6
johnstrand1.mp4
WATCH: Black Hills Information Security owner John Strand discusses how installing patches can help protect against ransomware during an SC Media eSummit. Learn more here: http://ow.ly/jkJJ50G53CW
We are officially one month out from #RiskSec Conference and this is our #MondayMood! Join us in Philly for a day of cybersecurity, networking, and a look at the future threat landscape: https://risksecconference.com/social
Ruckus routers, connected devices found vulnerable
Tripwire researcher Craig Young said a series of flaws he recently found in Ruckus routers making them vulnerable to several security issues is representative of the security problems found in many consumer connected devices.
#BlackHat2016 Companies shouldn't be in position to pay ransom...
Ransomware is a brilliant attack because it hits the sweet spot - the value of what they're taking away from you is more than what they're asking for, Zscaler CSO Michael Sutton told SCMagazine.com.
Designer ransomware threats are in fashion with cybercriminals
At #BlackHat2016, SCMagazine.com caught up with Sophos's John Shier to discuss these "designer" attacks.
RSA 2016 VIDEO: Medical facilities ripe for the picking by cyb...
The cyber defenses offered up by many medical facilities are so poor that attackers are able to breach them using outdated hacking tools, according to a new study by ESET.
Dell report: C-suite doesn't allot enough budget for security,...
RSA 2016: Enterprises, bad guys all turning to cloud
The cloud is creating numerous security challenges that Intel's Brian Dye said could be resolved by taking specific steps.
RSA 2016: Interview with Patrick Sweeney at Dell Security
SC Magazine Associate Editor Teri Robinson talks cybersecurity with Dell Security Vice President of Product Management and Marketing Patrick Sweeney.
SC Director's Cut with Akamai VP of Engineering Ohad Parush
Check out our interview with Akamai's VP of Engineering Ohad Parush.
Ray Rothrock: "Assume attackers are in your system"
As cyber attacks increase, IT departments continue to be challenged by older techniques, such as targeted phishing attacks because the attacks bypass perimeter defenses and are difficult to prevent. Ray Rothrock, CEO of RedSeal Networks, spoke with SCMagazine.com on how to mitigate risks.
Malwarebytes receives $50M funding
Malwarebytes received a $50 million Series B funding round from Fidelity Management and Research Co.
Combating social engineering doesn't need to hinder employees
Find out why Bruce McCulley, senior information security specialist, U.S. Senate-Sergeant at Arms, says that combating social engineering doesn't need to hinder employees at SCMagazine.com
IoT exploding, industry has opportunity to secure
Check out the full version at SCMagazine.com | http://bit.ly/1M2Nfzn
Consumers need to up password security: Darren Guccione of Kee...
Former WH cybersecurity exec stresses info sharing
The Android problem
In this interview, Harry Sverdlove, CTO of Bit9, describes to SC Magazine Executive Editor Dan Kaplan what the bring-your-own-device revolution means for organizations, and how they should best address the threat posed by endpoints such as the Android.