April 2010 Issue of SCMagazine
Threat of the month
2 minutes on
Google found itself in hot water with privacy advocates over Buzz, its new social networking platform.
Skills in Demand
You can translate your domain expertise into "big dollars" by migrating to a sales engineer position, says Michael Potters, CEO, The Glenmont Group.
Me and my job
Today's corporate networks are loaded with information with the potential to generate significant profit on the black market, says TippingPoint's David Endler.
Adopting cloud-based services gives organizations many benefits, but it also opens them up to many risks and vulnerabilities, says Fortinet's Anthony James.
Signature-based software just can't keep up with today's malware, says The Washington Post Co.'s Stacey Halota.
Are organizations ready to move their most sensitive enterprise applications to the cloud? Dan Kaplan investigates.
It can be easy to overlook the spirited volunteerism in the IT space, says Jake Kouns of the Open Security Foundation. Dan Kaplan reports.
During an SC Magazine Financial Services Roundtable, leading information security pros discussed how they are refining IT security tactics, and more, reports Illena Armstrong.
This month we look at the best ways to manage various forms of viruses, worms, and more.
Group Test 1
There are a number of factors to consider before bringing an anti-malware gateway into your environment, says Peter Stephenson.
The Anchiva 206 Web Gateway enforces web surfing policies and protects against web- and email-borne threats.
The Barracuda Web Filter 310 provides solid protection against web-based threats, such as viruses, worms and spyware.
The M86 Secure Web Gateway provides proactive prevention of crimeware, malware and data leakage using real-time code analysis and optional anti-virus modules.
The McAfee Email and Web Security Appliance uses a multitude of scanning techniques to analyze both web and email traffic for threats.
A full function transparent inline filter deployed at the internet gateway for seamless anti-malware control across both web and email protocols.
A full function anti-malware gateway as well as a web filter and application control gateway.
The Sophos Web Appliance uses a highly advanced system of technologies to catch and defend against web threats.
Offers protection against many malware-based threats – including viruses, spyware and phishing – in one soft appliance.
The Trend Micro Enterprise Security for Gateways is driven by the InterScan Web Security Virtual Appliance.
This appliance can handle thousands of concurrent web, email and FTP sessions and scan for all types of threats and malware.
Group Test 2
Michael Lipinski reviews technologies used to provide a central point for mitigation of the threat of malware.
The product delivers anti-spam, anti spyware, firewall, web shield, LinkScanner and anti-rootkit protection.
A robust business security and management solution that delivers proactive protection from viruses, spyware, rootkits, spam, trojan threats, phishing and other malware.
Provides automatic, centrally managed, real-time protection against online threats, such as browser exploits, viruses, spyware, riskware, zero-day attacks, rootkits and other forms of malicious code ...
A suite of products that offers security coverage for all types of network endpoints – from mobile devices to servers.
A decentralized management approach allows the endpoint device to control the execution of applications.
An anti-virus and anti-spyware product that is managed from a central console.
This tool from Passlogix is policy-driven and centrally managed making it a true enterprise-class product, says Peter Stephenson.
A lot's been done to secure the nation's critical assets, but challenges remain, says the DoD's Robert Lentz.
SC Magazine Articles
- Three zero-days found in iOS, Apple suggests users update their iPhone
- MedSec goes its own way with medical device flaw
- Juniper confirms leaked "NSA exploits" affect its firewalls, no patch released yet
- Ransomware: The evolution of cybercrime, a roundtable
- Researchers find seven classes of vulnerabilities in iOS sandbox security feature
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Wendy's POS breach 'considerably' bigger than first thought
- No hacking required: Israeli researchers show how to steal data through PC components
- Don't connect your charging cell to a computer or you may get hacked!
- Six senators urge Obama to prioritize cybercrime at G20 summit
- Creating a buzz: USBee software causes air-gapped computers to leak data via USB connections
- Privacy advocates upset over FAA drone regulations, citizen takes action
- Voter database hack in Illinois by foreign intruder compromises info of 200K
- Fantom and FairWare ransomware discovered