April 2007 18 4 Issue of SCMagazine

April 2007 18 4 Issue of SCMagazine

Editorial

Editorial: Evolving the views of security today

How are information security priorities decided? While some organizations have definitive security projects that enable business initiatives, others approach the question of securing corporate assets ...

Update

Company news

Here are the latest corporate happenings in the IT security industry:

Debate

Will high-assurance certs increase consumer confidence and curb identity theft?

News briefs

Here is a roundup of the latest IT security news included in April's SC Magazine:

2 minutes on

2 minutes on...anonymous web browsing

Ever the champion of privacy rights online, the Electronic Frontier Foundation (EFF) announced late in 2006 that it was picking up the banner of yet ...

Me and my job

Me and my job

Mark Adams, corporate security officer, BlueCross-BlueShield of Nebraska, answers some quick questions about his job.

Opinion

Say yes to innovation

For security professionals, saying yes, or offering workable alternative solutions, is especially hard. When asked to consider new technologies, we instinctively want to just say ...

Avoid the rearview mirror

Is your organization protecting yesterday's infrastructure from yesterday's threats? Vulnerability evolves not only in response to external drivers like viruses, but also network change. The ...

CSO's desk

CSOs, broaden your organizational focus

When you lead a security function for your organization, especially if your title begins with a "c," you are no longer a security professional, primarily. ...

Letters

Got something to say?

Send your comments, praise or criticisms to scfeedbackUS@haymarketmedia.com. We reserve the right to edit letters.

Features

Product section: Managed security services and forensic tools

Many years ago, I built a simple framework for information security. This framework, called intrusion management was a structure for analyzing and managing intrusions. I ...

SC Magazine 2007 Awards

There were no red carpets or stretch limos, but like the Oscars, the 10th annual SC Magazine Awards honored the industry's best.

CSOs on the state of the industry

With each passing day, the role of information security chief becomes increasingly complex and critical to an organization's success. Decisions these leaders make on a ...

Cooperation among departments key to organizational security

As Oracle's Wynn White strolled the floor during this year's RSA Conference, he noticed something odd: No longer was he only surrounded by techies, researchers, ...

Cover story: Some enterprises benefiting from the convergence of physical and information security assets

The most mature information security programs cant always protect against theft of information if the perpetrator has access to the server room. Without the proper ...

Money matters: SC Magazine/EC-Council Salary Survey 2007

The heyday of massive salaries, extravagant raises and unrestrained bonuses that this industry experienced at the start of the 21st century has long since passed ...

Last Word

USB devices — the lean, mean and portable threat

The hotel you're staying in is great. It even has a computer center for you to surf the internet or tweak the last of the ...

Product Reviews

Paraben P2 Enterprise Shuttle

Beam me up, Scotty, there’s a new over-the-network forensics tool in the lab. The Paraben P2 Enterprise Shuttle is a tool that accesses computers remotely ...

SecureWorks

SecureWorks submitted for review a co-location offering, which used two rack mount devices to monitor connections after the connection passed through the lab Check Point ...

Guidance Software EnCase Forensic v. 6

Of the straight (not over-the-network) computer forensic tools we examined, EnCase has made the most noticeable changes since last year. However, a few changes simply ...

Solutionary ActiveGuard

Solutionary provides a complete outsourced offering. It includes hosting, managed firewall and managed intrusion prevention.

AccessData Forensic Tool Kit v 1.70

AccessData is one of the venerable developers of computer forensic software. The company’s biggest strength is that it is — and has been since its ...

WetStone Technologies Gargoyle Investigator

It’s got a really ugly logo, but it performs beautifully. Gargoyle Investigator Forensic Pro Edition is a specialized tool for detecting various types of rogue ...

Technology Pathways ProDiscover IR v 4.9

ProDiscover IR is an over-the-network computer forensics tool. It connects to any computer that has the ProDiscover agent and performs a suite of forensic tests ...

DataTraveler Secure PE

The Kingston DataTraveler Secure Privacy Edition is a USB thumb drive that encrypts everything on it all the time.

Alert Logic Threat Manager

Alert Logic submitted for review a co-location offering, which used a single rack mount device to monitor connections passed through the lab Check Point Firewall-1 ...

LogRhythm LR1000 v. 3.5

This is one of those "almost there" products that will, we are certain, give competitors a run for their money fairly soon. The LR1000 is ...

Paraben Device Seizure v. 1.1

This is what Paraben is noted for - Device Seizure is a neat little product that lets you seize and perform forensic analysis on cell ...

WetStone Technologies LiveWire Investigator v. 3.1.1C

Live forensics is an emerging field and, although there are a lot of good reasons to use it, there still are caveats. At least two ...

Yoggie Security Systems, Ltd. Yoggie Gatekeeper Pro

Nervous about your laptop security? Go get a Yoggie.

Sign up for our newsletters

POLL