April 2012 Issue of SCMagazine
There are a whole host of things driving budget, resources and tweaks to security/risk management programs.
News briefs: LulzSec head Sabu worked with FBI, Extension in DNSChanger servers, Sony breached again, and more
Company news: M&A activity and personnel announcements
Threat of the month
One of the most talked about threats this month is the infamous Ukash ransomware.
2 minutes on
The quest for accountability in digital communication has a new champion: Domain-Based Message Authentication, Reporting and Conformance (DMARC).
Skills in Demand
As more organizations move into the cloud, the demand for virtualization security architects is growing.
Me and my job
Me and my job: Douglas Vitale, information assurance and forensic expert for a major utility company
Douglas Vitale, information assurance and forensic expert for a major utility company.
Debate: Anti-virus is essential.
Imagine a mobile device falling into the wrong hands - resulting in the draining of bank accounts co-opting of identities.
Network monitoring solutions for the enterprise should be holistically integrated with the complete security suite...
Over the past few years, adoption of and compliance with PCI standards has made it more challenging for criminals to steal large volumes of credit ...
With data proliferating at astonishing rates, organizations are tearing into it, hoping to derive new business value, which, according to Zions CSO Preston Wood, includes ...
Much of the breach conversation over the past year has been devoted to so-called hacktivists. But nation-state adversaries, bent on looting organizations of intellectual property, ...
The FBI-led takedown of Hong Kong-based P2P site MegaUpload -- and the arrests in New Zealand of its leaders -- was a big win for ...
At a recent SC Magazine Roundtable, gov't security pros bemoaned the difficulty in obtaining resources. But instead of crying over spilled milk, they traded ideas ...
This month, we look at security information and event management (SIEM) tools.
Group Test 1
Part of the fun of doing these product reviews is that we get to see new products as they emerge into the marketplace. AlienVault’s Professional ...
When we first saw LogLogic a few years ago, it was a strong log management appliance that could do some nifty stuff, but overall was ...
Back again this year is one of the most powerful SIEMs that we have seen, and it is more powerful than ever with the new ...
The Enterprise Security Manager is a new iteration of our old friend, the NitroView from NitroSecurity. McAfee has found a real winner with this product.
The Trustwave SIEM appliance is designed to collect, normalize, analyze and store events and logs from a wide array of network devices and security products.
The CorreLog Server is a web-based solution that leverages browser technology to present an easy-to-use, multi-platform interface that stresses point-and-click simplicity for the harried network ...
EventTracker is designed to track events and track them well.
GFI Software is one of the smaller vendors in the SIEM market. However, size doesn’t matter if you build quality into a product like GFI ...
NetIQ’s Sentinel 7 looks deep into Syslogs, simple network management protocol (SNMP) incidents and other event-driven reporting mechanisms to sum up the security health of ...
SolarWinds is one of the smaller players in the SIEM market, but as a vendor specializing in system management and reporting tools, the company has ...
LCE is all about processing system logs and putting some sense to them in the form of intelligence and correlation.
The forsenic tool, FTK 4.0 with Cerberus and Visualization from AccessData, blew me away.
Be patient and give staffers a real chance to show their stuff, says Michael Potters, CEO of the Glenmont Group.
Sign up to our newsletters
SC Magazine Articles
- Popular adult website XTube compromised, delivers malware
- Android vulnerability leaves apps open to malicious overwriting
- One in three of the top million websites are 'risky,' researchers find
- Orgs predict $53M risk, on average, from crypto key, digital cert attacks
- Hanjuan Exploit Kit leveraged in malvertising campaign
- Report: 71 percent of orgs were successfully attacked in 2014
- Self-deleting malware targets home routers to gather information
- 'PoSeidon' point-of-sale malware targets payment card information
- Amedisys notifies nearly 7,000 individuals of potential breach
- Report: More than 15,000 vulnerabilities in nearly 4,000 applications reported in 2014
- The best defense is a good offense: The importance of securing your endpoints
- British Airways says rewards accounts hacked, locked down
- Documents on NSA's zero-day policy provide little insight, EFF says
- GitHub on DDoS alert, efforts to curb its largest attack continue
- Shadow data: The monster that isn't just under your bed