August 2011
With data breaches becoming an everyday occurrence, technologies that help to minimize online fraud are more indispensable than ever, says Illena Armsttrong, editor-in-chief, SC Magazine.
LulzSec takedown, leader of global phishing ring sentenced, a new botnet termed "practically indestructible," and more news from the past month or so.
Mercy Caprara named CFO at HyTrust, Chris Hoff joins Juniper Networks, and other company news.
Sun/Oracle Java SE
A dizzying string of high-profile data breaches this year, coupled with the staggering cost resulting from such exposures, have ratcheted up demand for cyber risk ...
With evolving technology and emerging threats, companies are struggling to find security engineers capable of managing and delivering projects, says Jeff Combs, director, Acumin Consulting.
Working in the security office is actually an ideal spot for the business continuity professional, says Stieven Weidner manager, business continuity, Catholic Health East.
Debate: Increased penalties for violations of the Computer Fraud and Abuse Act should be enacted into law.
Enterprises can achieve ROI by doing an in-house risk assessment, says Kris Rowley, CISO of the state of Vermont.
Let's forgo the APT hysteria long enough to make sure we're doing a good job on the fundamentals.
As the prevalence of voice-over-internet protocol (VoIP) has grown among business users, so has its popularity among hackers.
A sound information security posture includes the old but effective combination of security infused at the people, process and technology levels, says Ron Baklarz, CISO ...
Mark Fabro has successfully married tech knowledge and C-level chops to help elevate his role -- and awareness around SCADA security -- to the next ...
Amid a hodgepodge of national laws, calls for a global data exchange standard grow louder as sensitive data traverses national boundaries.
Forensics enables organizations to investigate and better understand a breach, but it also can extract insight that can be used to prevent future compromises.
What customers want to hear is that they can solve any problem by simply writing out a purchase order. And we in the security industry ...
There were some definite trends that we observed this month. The first is that we are getting fewer physical appliances in favor of virtual ones.
The Comodo Secure Email application comes as a free product. However, to use it in a corporate PKI environment, one needs to install commercial certificates, ...
Cryptzone’s Secured eMail is a client-server application that runs on the company’s simple encryption platform (SEP).
TrustTone Stealth provides an email application layer encryption gateway deployed as an inline proxy.
Organizations with the PGP Universal Server will simply need to add the Mail module.
Trend Micro Email Encryption is a virtual appliance that can be installed on a physical or virtual server.
The Astaro Security Gateway appliance (mail applications only) comes to us again, this time highlighting some of its email content functionality.
The MailGate from Axway provides full email content management, as well as digital rights management and a little bit of policy compliance, all wrapped up ...
The Spam and Virus Firewall from Barracuda Networks provides a range of email content management functionality.
The FortiMail-100C appliance from Fortinet allows for deployment in transparent or gateway mode, or as a functioning email server all on its own
The MailMarshal Email Content Manager from M86 Security takes an interesting approach to email content management.
McAfee Email Protection incorporates email content management with data leakage prevention and compliance standards.
The Proofpoint Enterprise Protection and Enterprise Privacy Suites work together to provide solid email content management and compliance to the large-scale entity.
The Rule18 security and privacy appliance is a full-functioned email gateway complete with encryption and content management.
The Email Security Appliance 4300 from SonicWALL provides solid features and functionality to manage email-based threats coming in and going out of the enterprise.
The Virtual Email Appliance from Sophos provides solid, easy-to-use email content management and protection.
The InterScan Messaging Security virtual appliance from Trend Micro provides a hybrid email security and content management platform with integration alongside of cloud-based email filtering.
The WatchGuard Extensible Content Security, or XCS, appliance offers a vast feature set for managing email content, protecting the enterprise from email-based threats and protecting ...
Cybercriminal activity across the globe, plus a roundup of security-related news.