April 2012 Issue of SCMagazine
There are a whole host of things driving budget, resources and tweaks to security/risk management programs.
News briefs: LulzSec head Sabu worked with FBI, Extension in DNSChanger servers, Sony breached again, and more
Company news: M&A activity and personnel announcements
Threat of the month
One of the most talked about threats this month is the infamous Ukash ransomware.
2 minutes on
The quest for accountability in digital communication has a new champion: Domain-Based Message Authentication, Reporting and Conformance (DMARC).
Skills in Demand
As more organizations move into the cloud, the demand for virtualization security architects is growing.
Me and my job
Me and my job: Douglas Vitale, information assurance and forensic expert for a major utility company
Douglas Vitale, information assurance and forensic expert for a major utility company.
Debate: Anti-virus is essential.
Imagine a mobile device falling into the wrong hands - resulting in the draining of bank accounts co-opting of identities.
Network monitoring solutions for the enterprise should be holistically integrated with the complete security suite...
Over the past few years, adoption of and compliance with PCI standards has made it more challenging for criminals to steal large volumes of credit ...
With data proliferating at astonishing rates, organizations are tearing into it, hoping to derive new business value, which, according to Zions CSO Preston Wood, includes ...
Much of the breach conversation over the past year has been devoted to so-called hacktivists. But nation-state adversaries, bent on looting organizations of intellectual property, ...
The FBI-led takedown of Hong Kong-based P2P site MegaUpload -- and the arrests in New Zealand of its leaders -- was a big win for ...
At a recent SC Magazine Roundtable, gov't security pros bemoaned the difficulty in obtaining resources. But instead of crying over spilled milk, they traded ideas ...
This month, we look at security information and event management (SIEM) tools.
Group Test 1
Part of the fun of doing these product reviews is that we get to see new products as they emerge into the marketplace. AlienVault’s Professional ...
When we first saw LogLogic a few years ago, it was a strong log management appliance that could do some nifty stuff, but overall was ...
Back again this year is one of the most powerful SIEMs that we have seen, and it is more powerful than ever with the new ...
The Enterprise Security Manager is a new iteration of our old friend, the NitroView from NitroSecurity. McAfee has found a real winner with this product.
The Trustwave SIEM appliance is designed to collect, normalize, analyze and store events and logs from a wide array of network devices and security products.
The CorreLog Server is a web-based solution that leverages browser technology to present an easy-to-use, multi-platform interface that stresses point-and-click simplicity for the harried network ...
EventTracker is designed to track events and track them well.
GFI Software is one of the smaller vendors in the SIEM market. However, size doesn’t matter if you build quality into a product like GFI ...
NetIQ’s Sentinel 7 looks deep into Syslogs, simple network management protocol (SNMP) incidents and other event-driven reporting mechanisms to sum up the security health of ...
SolarWinds is one of the smaller players in the SIEM market, but as a vendor specializing in system management and reporting tools, the company has ...
LCE is all about processing system logs and putting some sense to them in the form of intelligence and correlation.
The forsenic tool, FTK 4.0 with Cerberus and Visualization from AccessData, blew me away.
Be patient and give staffers a real chance to show their stuff, says Michael Potters, CEO of the Glenmont Group.
Sign up to our newsletters
SC Magazine Articles
- Oracle PeopleSoft attack could enable big data breaches
- Zero-day in Fiat Chrysler feature allows remote control of vehicles
- Cyber attack on U.S. power grid could rack up $1 trillion in losses, study says
- All smartwatches are vulnerable to attack, finds study
- 'GSMem' malware designed to infiltrate air-gapped computers, steal data
- Report delves into RAT videos on YouTube
- Tor Project, Library Freedom Project to establish Tor exit nodes in libraries
- PagerDuty requires password change for all customers following breach
- Cisco: Attackers innovating, evading defenses in first half of 2015
- Does Windows 10 Wi-Fi Sense spell end of private wireless networks?