April 2013 Issue of SCMagazine

April 2013 Issue of SCMagazine

April 2013 cover

Editorial

Sidestepping the humdrum

Among the humdrum there are cyber events cropping up here and there that breed excitement.

Update

News briefs: Mandiant uncovers espionage, Evernote is breached, and more

This month's news briefs includes recent news on Mandiant uncovering China's cyber espionage efforts, security firm Bit9's breach, and the Obama administrations latest efforts on ...

Company news: dinCloud's new CTO, and Bluebox Security's new research team

This month's company news features new additions to the dinCloud, Tripwire, and Crocus Technology, as well as Bluebox Security's new research team that will analyze ...

Threat of the month

Threat of the month: Universal Plug and Play vulnerabilities

April's "threat of the month" are Universal Plug and Play (UPnP) vulnerabilities, which allow attackers to execute arbitrary code.

2 minutes on

Cleaning up the CVSS

Prioritization is a key part of the patching strategy of any customer, says SC Magazine's Dan Kaplan.

Skills in Demand

Skills in demand: IT-GRC data and metrics analysts

There is a growing demand for IT-GRC-focused data and metrics analysts, says security recruiter Jeff Combs of L.J. Kushner & Associates.

Me and my job

Me and my job: Blake Frantz, Center for Internet Security

A brief Q&A with Blake Frantz, director of benchmark development, security benchmarks division, Center for Internet Security (CIS).

Debate

Debate: China is the top cyber threat to the United States

In this month's debate, two experts discuss whether or not China is the top cyber threat to the United States.

Opinion

Decoding the cloud

Unfortunately, data security and regulatory compliance requirements do not evaporate in the public cloud, says Vormetric's Ashvin Kamaraju.

BlackBerry back in the game

Thanks to BYOD, gone are the days of one single mobile device manufacturer or model to support, says Dimension Data Americas' Darryl Wilson.

CSO's desk

You are an APT target

Cyber espionage is at an all-time high, and businesses across the United States are being targeted and breached, says Phillip Ferraro, CISO, DRS Integrated Defense ...

Features

Beyond BYOD

The ever-increasing use of personal devices has tested enterprise defenses, so plans must be created to meet the challenge, reports James Hale.

Deciphering cloud strategy

There are steps security pros can take to achieve greater peace of mind with cloud implementations, reports Alan Earls.

Urgent care: Safeguarding data at health care providers

Health providers have pressing reasons to now embrace security, says INTEGRIS Health's John Delano. Karen Epper Hoffman reports.

Suspect everything: Advanced threats in the network

Are there ways to catch sophisticated malware that hides in trusted processes and services? Deb Radcliff finds out.

Last Word

Cyber war, this is not

Espionage and fraud in cyber is not an armed conflict, says SystemExpert's Jonathan Gossels.

Product opener

SIEM City

This month we look at security information and event management (SIEM) tools.

Group Test 1

AlienVault Unified Security Management (AV-USM) v4.1

AlienVault’s Unified Security Management (AV-USM) platform combines open source technologies for asset discovery/inventory, vulnerability assessment, threat detection, behavioral monitoring and security intelligence/event correlation.

BlackStratus LOG Storm v4.2.0.45

LOG Storm combines log management and security information management with correlation technology, real-time monitoring and an integrated incident response system.

CorreLog Enterprise Server v5.2.0

CorreLog Enterprise Server combines real-time log management with correlation, auto-learning functions, high-speed search, ticketing and reporting services.

eIQnetworks SecureVue v3.6.3

SecureVue provides all of the elements one would expect in a SIEM.

EventTracker Enterprise v7.3

EventTracker Enterprise is comprehensive. It is designed to be scalable to address multiple locations, business units and domains using the EventTracker Stand-Alone, Collection Point and ...

GFI EventsManager 2013

GFI EventsManager collects, centralizes, normalizes, consolidates and analyzes a wide range of log types.

HP ArcSight Express

The HP ArcSight Express appliance features a full set of SIEM capabilities.

LogRhythm

The LogRhythm appliance goes way beyond traditional security event monitoring and management.

McAfee Enterprise Security Manager

The Enterprise Security Manager is the ultimate high-powered SIEM.

NetIQ Sentinel

Sentinel from NetIQ offers a lot of robust SIEM features and functions.

SolarWinds Log & Event Manager

The SolarWinds Log & Event Manager is a virtual appliance capable of collecting logs and events from almost any network-connected device and then correlating that ...

ManageEngine EventLog Analyzer

The ManageEngine EventLog Analyzer from Zoho is a small application that provides a lot of functionality.

First Look

Stopping distributed denial-of-service attacks

FortiDDoS is an appliance that examines data packets in a variety of ways to separate DDoS packets from legitimate packets.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US