How are information security priorities decided? While some organizations have definitive security projects that enable business initiatives, others approach the question of securing corporate assets ...
Here are the latest corporate happenings in the IT security industry:
Will high-assurance certs increase consumer confidence and curb identity theft?
Here is a roundup of the latest IT security news included in April's SC Magazine:
Ever the champion of privacy rights online, the Electronic Frontier Foundation (EFF) announced late in 2006 that it was picking up the banner of yet ...
Mark Adams, corporate security officer, BlueCross-BlueShield of Nebraska, answers some quick questions about his job.
For security professionals, saying yes, or offering workable alternative solutions, is especially hard. When asked to consider new technologies, we instinctively want to just say ...
Is your organization protecting yesterday's infrastructure from yesterday's threats? Vulnerability evolves not only in response to external drivers like viruses, but also network change. The ...
When you lead a security function for your organization, especially if your title begins with a "c," you are no longer a security professional, primarily. ...
Send your comments, praise or criticisms to scfeedbackUS@haymarketmedia.com. We reserve the right to edit letters.
Many years ago, I built a simple framework for information security. This framework, called intrusion management was a structure for analyzing and managing intrusions. I ...
There were no red carpets or stretch limos, but like the Oscars, the 10th annual SC Magazine Awards honored the industry's best.
With each passing day, the role of information security chief becomes increasingly complex and critical to an organization's success. Decisions these leaders make on a ...
As Oracle's Wynn White strolled the floor during this year's RSA Conference, he noticed something odd: No longer was he only surrounded by techies, researchers, ...
The most mature information security programs cant always protect against theft of information if the perpetrator has access to the server room. Without the proper ...
The heyday of massive salaries, extravagant raises and unrestrained bonuses that this industry experienced at the start of the 21st century has long since passed ...
The hotel you're staying in is great. It even has a computer center for you to surf the internet or tweak the last of the ...
Beam me up, Scotty, there’s a new over-the-network forensics tool in the lab. The Paraben P2 Enterprise Shuttle is a tool that accesses computers remotely ...
SecureWorks submitted for review a co-location offering, which used two rack mount devices to monitor connections after the connection passed through the lab Check Point ...
Of the straight (not over-the-network) computer forensic tools we examined, EnCase has made the most noticeable changes since last year. However, a few changes simply ...
Solutionary provides a complete outsourced offering. It includes hosting, managed firewall and managed intrusion prevention.
AccessData is one of the venerable developers of computer forensic software. The company’s biggest strength is that it is — and has been since its ...
It’s got a really ugly logo, but it performs beautifully. Gargoyle Investigator Forensic Pro Edition is a specialized tool for detecting various types of rogue ...
ProDiscover IR is an over-the-network computer forensics tool. It connects to any computer that has the ProDiscover agent and performs a suite of forensic tests ...
The Kingston DataTraveler Secure Privacy Edition is a USB thumb drive that encrypts everything on it all the time.
Alert Logic submitted for review a co-location offering, which used a single rack mount device to monitor connections passed through the lab Check Point Firewall-1 ...
This is one of those "almost there" products that will, we are certain, give competitors a run for their money fairly soon. The LR1000 is ...
This is what Paraben is noted for - Device Seizure is a neat little product that lets you seize and perform forensic analysis on cell ...
Live forensics is an emerging field and, although there are a lot of good reasons to use it, there still are caveats. At least two ...
Nervous about your laptop security? Go get a Yoggie.