your market intelligence analyst
Search Results
Edit Save
3,094 results
SC Magazine 09/17/2020 13:33
As the developing world follows in the steps of the West and begins entering an age of saturated connectivity, it’s important for people in leadership positions to set the tone for a culture of cybersecurity, said former chief security officer for the Department of Defense Jonathan Reiber on Thursday.
SC Magazine 09/17/2020 11:41
That anti-phishing training email your employees just received may, ironically, actually be a phishing email, according to cyber threat analysts who recently uncovered a security awareness-themed online social engineering campaign. In a blog post on Wednesday, experts at Cofense reported uncovering a phishing campaign that sends emails purporting to be a notification urging employees to…. .
SC Magazine 09/15/2020 16:54
A Windows vulnerability recently patched by Microsoft, registering a CVSS score of 10, could allow attackers instant access to Active Directory. The vulnerability (CVE-2020-1472) subverts Netlogon cryptography, providing a gateway to an enterprise’s internal network for an intruder to gain Domain Admin status with one click, according to a Secura blog post. “This flaw allows…. .
SC Magazine 09/15/2020 08:28
The internet was rocked by a very public breach on Twitter during July in which dozens of celebrity accounts were compromised. The hacked accounts announced all at once that they’d double “donations” made to their personal bitcoin account, which in reality was a cryptocurrency scheme. As more details emerged, we learned that the cybercriminals behind…. .
SC Magazine 09/14/2020 17:06
Long at the forefront of protecting sensitive information from cyberattacks, health care organizations had to pivot quickly to ensure as the COVID-19 pandemic imposed new threats on a vulnerable newly remote workforce. And adapt they did, even as bad actors exploited a fragile, fragmented infrastructure suddenly reliant on telehealth visits. The lessons learned from the…. .
SC Magazine 09/14/2020 08:39
The pandemic has fundamentally changed how security teams think about protecting the business, in many cases accelerating digital transformation projects and placing renewed emphasis on the Zero Trust model for information security. As security teams implement Zero Trust, it’s important to consider access management and control. In doing so, this reflects a larger shift in…. .

Information Technologies

IT Markets

Business Issues

Companies - Public

Companies - Venture Funded


Analyst Firms

Global Markets

Global Risk Factors

Government Agencies

Job Titles

Legal and Regulatory

Political Entities


Strategic Scenarios



On this page, you see the results of the search you have run.  You may also view the following:

  •  Click on this drop-down menu on the right hand side of the page, to choose between the machine learning-produced Insights Reports, or the listing of concepts extracted from the results, in chart or list format. 

  •  View the number of search results returned for the search in each of your collections, and click on any of those numbers to view the entire listing of results from the chosen collection.

  •  Use the search adjustment drop-downs to change the scope, sorting, and presentation of your results.

  •  Show or hide the record’s caption (content description).

  •  Show actions that can be made with the search result record.

  •  Click on the Save button after running your search, to save it so that its results will be updated each time relevant new content is added to the designated collection. You may choose to be notified via search alerts.

Click here for more info on Search Results

Click here for more info on Machine Learning applications