Archive
2020 - 2023 | 2019 - 2008 | 2003 - 2007
Highlights from 2013
- In Depth: Who should be responsible for financial fraud?; Improvements in payment protections are shifting the liability for fraud to the least-secure party. – CSO print, November, 2013; CSO online February 2014
- Suspect Everything; Advanced threats in the network. – SC Magazine, April 2013
- Delayed Reaction; Despite the ubiquity of the Trusted Platform Module, holdups exist and adoption remains slow. – SC Magazine, February, 2013
- Waking the sleeping giant: Critical infrastructure; Stuxnet was a game changer, but control systems that run the nation's infrastructure are still at risk. – SC Magazine, November, 2012
Highlights from 2012
- Cyber Cold War: Espionage and Warfare; In a historic turn, the U.S. government is asking for help in fighting an increasingly sophisticated cyber enemy. – SC Magazine, September 2012
- Code surety: Secure by design; Total security of applications is probably a pipe dream. However, starting a secure design framework today will markedly improve applications in the future. – SC Magazine, March 2012
- Cyber beacons: The challenges of new technologies; Information isn't just leaking, it's being broadcast over Web 2.0 mediums – SC Magazine, February 2012
Highlights from 2011
- Safe development: Safeguarding web applications; To secure web applications, makers must take ownership of their lifecycle management. – SC Magazine, November 2011
- Breaking the next case; Ever-evolving strategies and technologies are just some of the issues facing today's cybercrime investigator. – SC Magazine, September 2011
- Federation 2.0: An identity ecosystem; Federated identity, the process of authenticating someone across multiple IT systems and organizations, is taking on new meaning with the growth of cloud and mobile. – SC Magazine, July 2011
- Safety in the cloud: Cloud-based services; With more organizations hesitant to entrust their sensitive data to the cloud and a handful of high-profile breaches, providers are augmenting their protections capabilities. – SC Magazine, June 2011
- Embrace change; How security translates to business. – SC Magazine, May 2011
- Feeding frenzy: M&A activity in IT security; With an improving economy, security companies are being scooped up by larger firms at a brisk pace. – SC Magazine, March 2011
- Cybercrime: Narrowing the gap; The $1 trillion cybercrime industry is expertly - and competitively - run. Take a peek into the inner workings of these syndicates, and learn how enforcement is closing in on cybercrime gangs. – SC Magazine, February 2011
Highlights from 2010
- Cyberthreats: A long haul; Enterprises are under constant seige from cyberthreats that continue to evolve to new levels of sophistication. – SC Magazine, December 2010
- Good & evil: Deep packet inspection; Has the time come to take retaliatory action against digital attacks? And if so, where is the line drawn? – SC Magazine, October 2010
- Investigating cybercrime; The real-life tales of how authorities hunted down some of the nation's most dangerous digital crooks. – SC Magazine, September 2010
- Anti-hack: Retaliatory action against digital attacks; Has the time come to take retaliatory action against digital attacks? And if so, where is the line drawn? – SC Magazine, July 2010
- E-health records: Embracing privacy; There are strategies to cope with customer expectations of privacy when there are no boundaries around their data. – SC Magazine, June 2010
- Nurturing CSO Careers; Where do C-level security careers lead to and how do you maintain them? – SC Magazine, May 2010
- Global village; Testing competitions can improve code, but crowdsourcing brings new concerns to security governance. – SC Magazine, March 2010
- Cloud shift: Weighing the risks and benefits of a new technology; Can security be better in the cloud? Experts believe it can. – SC Magazine, January 2010
Highlights from 2009
- Electronic Payments: Hurricane Gonzalez; Despite the prosecution of hacker Albert Gonzalez, more needs to be done to secure credit card transactions. – SC Magazine, December 2009
- What's old is new again; Today, criminals are using amped-up techniques to tap into a perpetual cycle of fraud and identity theft. – SC Magazine, November 2009
- Targeting browsers; Web browsers of every brand and flavor are falling victim to financially motivated attacks. – SC Magazine, August 2009
- The cybercriminal underground: Commercial sophistication; Malware builds across an underground infrastructure that rivals any legitimate form of commerce. – SC Magazine, April 2009
- Database security: Protecting the crown jewels; Universities, banks, SMBs and large brands alike are waking up to the fact that their databases are no longer safe. – SC Magazine, February 2009
- Security Capital: Funding & Innovation; The pool of venture capital for IT security is dwindling,but spending for security is rising. – SC Magazine, February 2009
Highlights from 2008
- Head in the Clouds; The latest craze in cloud computing shows great promise, but it isintroducing a host of new security issues. – SC Magazine, November, 2008
- Data Classification 101; The foundation of data-centric protection is knowing what data needs what level of protection. – StateTech Magazine, October 2008
- Information and Network Protection: Finding the right mix; How to secure critical and regulated data when network defenses aren't enough. – Networkworld, October 9, 2008
- Portrait of a hacker; The underground network of criminally-oriented hackers and cyber profiteers are under more pressure from law enforcement. – SC Magazine, September 26, 2008
- Slurping the USB Port; Portable media devices are being used to lift corporate data. – SC Magazine, September 2008
- The Life and Death of a Virtual Machine; If IT managers aren't careful, the failure to manage virtual machines throughout their life cycles could erase virtualization's benefits. – Networkworld, August 2008
- A Fine Line; Institutions of higher learning encourage openness on their networks, but find they must impose controls. – SC Magazine, August 2008
- How to root out Rootkits; Find out how and where they hide, what they're hiding, and how you can (and can't) stop them. – Networkworld, August 2008
- Bugs gone bad; A wide variety of bugs can cause problems for your system. Here is a list of types of bugs and exploits that companies should keep an eye out for.; – SD Times, August 2008
- Fall In Line; Radcliff looks at how the retail sector is faring with PCI DSS. – SC Magazine, April 2008
- New security threats from every which way; As virtualization, SOA and mobility projects proliferate and converge, they open the enterprise to a rash of troublesome network security problems. – Networkworld, March 2008
- Health care update; Health care organizations must shake off their HIPAA-induced paralysis and get technical. – SC Magazine, March 2008
- Firmware: Hacking the Chip; Imagine the day when rootkits, backdoors and other hacker toolkits hide not inside the system software, but in the highly programmable firmware proliferating across the hardware components supporting our information systems. – SC Magazine, February 8, 2008
- E-voting Systems; Radcliff interviews Rush Holt, D-NJ, on his legislation to protect elections in light of scandalously insecure e-voting systems. – Computerworld, February 4, 2008
- Brace Yourself for a Data Breach; It's not a question of whether this will happen to your organization, but of when. Be ready to react. – StateTech Magazine, January 2008
- Computer Forensics Faces Private Eye Competition; Who has the right to probe digital crime? That very question may be the next battleground between the flatfooted private detective of old and the new-age computer sleuth. – Baseline Mag, January 2, 2008
Go back even further in the Archive »