August 2011 Issue of SCMagazine

August 2011 Issue of SCMagazine

August 2011

Editorial

Accounting for transaction assurance

With data breaches becoming an everyday occurrence, technologies that help to minimize online fraud are more indispensable than ever, says Illena Armsttrong, editor-in-chief, SC Magazine.

Update

News briefs: LulzSec takedown, phisher sentenced

LulzSec takedown, leader of global phishing ring sentenced, a new botnet termed "practically indestructible," and more news from the past month or so.

Briefs: Company news

Mercy Caprara named CFO at HyTrust, Chris Hoff joins Juniper Networks, and other company news.

Threat of the month

2 minutes on

Preparing for the inevitable: Cyber risk insurance

A dizzying string of high-profile data breaches this year, coupled with the staggering cost resulting from such exposures, have ratcheted up demand for cyber risk ...

Skills in Demand

Skills in demand: Security engineers capable of managing and delivering projects

With evolving technology and emerging threats, companies are struggling to find security engineers capable of managing and delivering projects, says Jeff Combs, director, Acumin Consulting.

Me and my job

Me and my job: Convincing execs that business continuity is more than backing-up data

Working in the security office is actually an ideal spot for the business continuity professional, says Stieven Weidner manager, business continuity, Catholic Health East.

Debate

Debate: Increased penalties for violations of the Computer Fraud and Abuse Act should be enacted into law.

Debate: Increased penalties for violations of the Computer Fraud and Abuse Act should be enacted into law.

Opinion

Benefits of DIY risk assessment

Enterprises can achieve ROI by doing an in-house risk assessment, says Kris Rowley, CISO of the state of Vermont.

APTs: New term, old problem

Let's forgo the APT hysteria long enough to make sure we're doing a good job on the fundamentals.

Simple best practices for VoIP

As the prevalence of voice-over-internet protocol (VoIP) has grown among business users, so has its popularity among hackers.

CSO's desk

Sweat the small stuff: A sound information security posture includes the old and the new

A sound information security posture includes the old but effective combination of security infused at the people, process and technology levels, says Ron Baklarz, CISO ...

Features

Flexible stance: SC Canada infosec pro of the year

Mark Fabro has successfully married tech knowledge and C-level chops to help elevate his role -- and awareness around SCADA security -- to the next ...

Foreign office threats: Protecting operations overseas

Amid a hodgepodge of national laws, calls for a global data exchange standard grow louder as sensitive data traverses national boundaries.

Forensic intel: How digitial investigations have matured

Forensics enables organizations to investigate and better understand a breach, but it also can extract insight that can be used to prevent future compromises.

Last Word

It's time to tell clients the truth

What customers want to hear is that they can solve any problem by simply writing out a purchase order. And we in the security industry ...

Product opener

Safeguarding email from "vampires"

There were some definite trends that we observed this month. The first is that we are getting fewer physical appliances in favor of virtual ones.

Group Test 1

Comodo Secure Email

The Comodo Secure Email application comes as a free product. However, to use it in a corporate PKI environment, one needs to install commercial certificates, ...

Cryptzone Secured eMail

Cryptzone’s Secured eMail is a client-server application that runs on the company’s simple encryption platform (SEP).

TrustTone Stealth

TrustTone Stealth provides an email application layer encryption gateway deployed as an inline proxy.

PGP Universal Gateway Email

Organizations with the PGP Universal Server will simply need to add the Mail module.

Trend Micro Email Encryption

Trend Micro Email Encryption is a virtual appliance that can be installed on a physical or virtual server.

Group Test 2

Astaro Security Gateway

The Astaro Security Gateway appliance (mail applications only) comes to us again, this time highlighting some of its email content functionality.

Axway MailGate

The MailGate from Axway provides full email content management, as well as digital rights management and a little bit of policy compliance, all wrapped up ...

Barracuda Networks Spam & Virus Firewall

The Spam and Virus Firewall from Barracuda Networks provides a range of email content management functionality.

Fortinet FortiMail-100C

The FortiMail-100C appliance from Fortinet allows for deployment in transparent or gateway mode, or as a functioning email server all on its own

M86 Security MailMarshal Email Content Manager

The MailMarshal Email Content Manager from M86 Security takes an interesting approach to email content management.

McAfee Email Protection

McAfee Email Protection incorporates email content management with data leakage prevention and compliance standards.

Proofpoint Enterprise Protection and Enterprise Privacy Suites

The Proofpoint Enterprise Protection and Enterprise Privacy Suites work together to provide solid email content management and compliance to the large-scale entity.

SECNAP Rule18

The Rule18 security and privacy appliance is a full-functioned email gateway complete with encryption and content management.

SonicWALL Email Security Appliance 4300

The Email Security Appliance 4300 from SonicWALL provides solid features and functionality to manage email-based threats coming in and going out of the enterprise.

Sophos Virtual Email Appliance

The Virtual Email Appliance from Sophos provides solid, easy-to-use email content management and protection.

Trend Micro InterScan Messaging Security

The InterScan Messaging Security virtual appliance from Trend Micro provides a hybrid email security and content management platform with integration alongside of cloud-based email filtering.

WatchGuard XCS 770R

The WatchGuard Extensible Content Security, or XCS, appliance offers a vast feature set for managing email content, protecting the enterprise from email-based threats and protecting ...

Threat Report

ThreatReport: Global cybercriminal activity

Cybercriminal activity across the globe, plus a roundup of security-related news.

Advertisement

How to Prevent Insider Threats!

POLL