Log4j vulnerability response for banks: 'This is not a quick process'
Amid Log4j vulnerability response, assessing third- (and fourth- and fifth-) party risk
Threat hunting in the age of work-from-home
Incorporating security into the software development process
Zero-trust principles in the age of SolarWinds attack
We are officially one month out from #RiskSec Conference and this is our #MondayMood! Join us in Philly for a day of cybersecurity, networking, and a look at the future threat landscape: https://risksecconference.com/social
Ruckus routers, connected devices found vulnerable
Tripwire researcher Craig Young said a series of flaws he recently found in Ruckus routers making them vulnerable to several security issues is representative of the security problems found in many consumer connected devices.
Web servers running on HTTP/2 found with multiple denial-of-se...
In an analysis of five separate manufacturers' web servers running on the new HTTP/2 protocol, cybersecurity firm Imperva found that all five were vulnerable to at least one of four high-profile denial-of-service vulnerabilities.
#BlackHat2016 Companies shouldn't be in position to pay ransom...
Ransomware is a brilliant attack because it hits the sweet spot - the value of what they're taking away from you is more than what they're asking for, Zscaler CSO Michael Sutton told SCMagazine.com.
Designer ransomware threats are in fashion with cybercriminals
At #BlackHat2016, SCMagazine.com caught up with Sophos's John Shier to discuss these "designer" attacks.
RSA 2016 VIDEO: Medical facilities ripe for the picking by cyb...
The cyber defenses offered up by many medical facilities are so poor that attackers are able to breach them using outdated hacking tools, according to a new study by ESET.
Dell report: C-suite doesn't allot enough budget for security,...
RSA 2016: Enterprises, bad guys all turning to cloud
The cloud is creating numerous security challenges that Intel's Brian Dye said could be resolved by taking specific steps.
RSA 2016: Interview with Patrick Sweeney at Dell Security
SC Magazine Associate Editor Teri Robinson talks cybersecurity with Dell Security Vice President of Product Management and Marketing Patrick Sweeney.
SC Director's Cut with Akamai VP of Engineering Ohad Parush
Check out our interview with Akamai's VP of Engineering Ohad Parush.
Ray Rothrock: "Assume attackers are in your system"
As cyber attacks increase, IT departments continue to be challenged by older techniques, such as targeted phishing attacks because the attacks bypass perimeter defenses and are difficult to prevent. Ray Rothrock, CEO of RedSeal Networks, spoke with SCMagazine.com on how to mitigate risks.
Malwarebytes receives $50M funding
Malwarebytes received a $50 million Series B funding round from Fidelity Management and Research Co.
Combating social engineering doesn't need to hinder employees
Find out why Bruce McCulley, senior information security specialist, U.S. Senate-Sergeant at Arms, says that combating social engineering doesn't need to hinder employees at SCMagazine.com
SCNY VIDEO: Becky Bace talks IoT security
Check out what Chief Strategist Becky Bace has to say about IoT security at SCMagazine.com
IoT exploding, industry has opportunity to secure
Check out the full version at SCMagazine.com | http://bit.ly/1M2Nfzn
Consumers need to up password security: Darren Guccione of Kee...
Former WH cybersecurity exec stresses info sharing
The Android problem
In this interview, Harry Sverdlove, CTO of Bit9, describes to SC Magazine Executive Editor Dan Kaplan what the bring-your-own-device revolution means for organizations, and how they should best address the threat posed by endpoints such as the Android.
Deterring Hacktivism
SC Magazine Managing Editor Greg Masters chats with Carl Herberger, vice president of security solutions at Radware, about the risk posed by politically and ideologically motivated attacks, known as hacktivism.
Hacking SCADA
Security researcher Dillon Beresford speaks to the press at the Black Hat conference in Las Vegas following his presentation which demonstrated how to hack into Siemens industrial control systems.
Tracking the advanced persistent threat
Researcher Joe Stewart discusses his research into tracing the origin of the advanced persistent threat.
The internet's changing face
An interview from SC Congress Canada 2011 with Ron Deibert and Rafal Rohozinski from The Munk School for Global Affairs at the University of Toronto.
Rethinking security
In an interview with SC Magazine Managing Editor Greg Masters, David Koretz, CEO of web application security start-up Mykonos Software, explains why the industry needs a rethink. He says security products traditionally have produced too much data, which leads to stress on customers and too many false positives. And even with this preponderance of information, solutions still are missing threats, as evidenced by zero-day attacks that evade malware detection technology. Koretz explains why a shift in focus, plus increased education for college students, may make all the difference.