SC Media

@SCMagazine

The official Twitter feed for all things IT security.

NYC
Joined November 2008

Tweets

You blocked @SCMagazine

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @SCMagazine

  1. Pinned Tweet
    Nov 5

    entries are now open! Submit your entries for cybersecurity's most prestigious and competitive honor now:

    Undo
  2. Undo
  3. 33 minutes ago

    Bad actors treat small and mid-sized companies as points-of-access to get to larger targets they may do business with. Find out more by attending this upcoming virtual conference.

    Undo
  4. 2 hours ago

    REMINDER: The last day to apply to be a judge for is tomorrow, December 11! Submit your application now:

    Undo
  5. 19 hours ago

    According to a report from , outside counsel is often on speed dial for breaches. At , the # of these cases handled in 2020 jumped 60% from the year before.

    Undo
  6. 22 hours ago

    Think you're the da Vinci of data protection? Prove it. Submit your entries for cybersecurity's most competitive honor now:

    Undo
  7. 23 hours ago

    Thoughts on breach from CISO : "We will never prevent nation-state actors from compromising targets..Still, anything the security team can do to slow them down increases the organization’s ability to detect and respond

    Undo
  8. Dec 9

    The effort from attempts to tackle, in part, the long held, industry-wide problem of vulnerabilities in dependencies.

    Undo
  9. Dec 9

    . founder : 'They need to show some traction. We’re hoping that we can give folks the ability to hire some folks, make a difference and take their career to the next level.'

    Undo
  10. Dec 8
    Undo
  11. Dec 8

    As critical infrastructure companies invest in , you might say they're investing in themselves. Interesting breakdown here from

    Undo
  12. Dec 8
    Undo
  13. Dec 8

    Said Tal Goldstein of the : 'The private sector is on the frontend of this fight; they see what’s going on, they have information, they have the capacity, the ability and the skills to investigate and understand attacks...'

    Undo
  14. Dec 8

    Compete in cybersecurity's most prestigious honor now. Submit your entries for today:

    Undo
  15. Dec 8

    Big discovery from . Said Brad Ree, CTO of industry standards group : "The issue is manufacturers with limited or no transparency into supply chains. This, and similar problems, will impact companies potentially for years"

    Undo
  16. Dec 7

    The urged the defense industrial base in particular to ensure networks are protected from a vulnerability, but all companies and organizations are potential targets

    Undo
  17. Dec 7

    A new report from spotlights not only the losses from cybercrime, but failure by companies to adequately prepare

    Undo
  18. Dec 7

    Says Kasey Clark of : “Without the ability to successfully restore systems and maintain business continuity, organizations’ options become severely limited.”

    Undo
  19. Dec 5
    Undo
  20. Dec 4
    Undo
  21. Dec 4

    Upon discovering the iPhone vulnerability, 's researcher was able to create a “wormable radio-proximity exploit” to "gain complete control over any iPhone in my vicinity”

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·