August 2012 Issue of SCMagazine
Yahoo presumably took no measures to ensure sensitive stuff like customer account credentials were kept safe and sound.
Anonymous, WikiLeaks, DNSChanger, Stratfor, global cyber crime ring...and other breaking news.
The evasiveness of Flame may have been what prevented traditional AV technology from catching it sooner.
The threat of the month for August is the MS zero-day.
Personnel moves, government contracts and other news in the security industry.
2 minutes on
Security veteran Howard Schmidt filled a spot few others reportedly wanted: the role of U.S. cyber security coordinator. Two-and-a-half years later, he's leaving the job, ...
Skills in Demand
IT business continuity (BC) and disaster recovery (DR) specialists have been in great and continuously growing demand, says Prescient Solutions' Jerry Irvine.
Me and my job
Walter Strycharz Jr., a senior IS auditor at the University System of Maryland, discusses some of the concerns, challenges and achievements he has experienced.
Many of today's applications are designed to work over any port, which increases chances they won't be blocked by firewalls.
The increasing connectedness of infrastructure increases the cascading effect an attack can have on other infrastructure sectors and capabilities.
Consensus needs to be developed around how critical infrastructure is defined, says Mark Clancy, managing director and CISO for The Depository Trust & Clearing Corp.
Many view information sharing as an elusive quest, hampered by various roadblocks. But Georgia Tech researchers want to tear down these hurdles with a new ...
Security metrics remain elusive for many organizations, but key performance indicators, or KPIs, are achievable measurements that can help guide business planning and strategy.
Businesses may no longer be able to turn away employees who want to bring their smartphones and tablets to work, and connect to the corporate ...
Endpoint security today is responding to the needs of the enterprise in ways it has not in the past, says Technology Editor Peter Stephenson.
Group Test 1
Endpoint Security from Check Point offers up a lot of functionality that can be customized for the needs of the environment.
The Endpoint DLP Suite from DeviceLock offers full control over devices, peripherals and ports throughout the enterprise.
Endpoint Security from ESET focuses on malware prevention and overall system security to mitigate threats throughout the enterprise.
GFI EndPointSecurity 2012 provides administrators a simple way to lock down computers across the enterprise network to ensure only authorized removable media devices are used ...
Administrators can use this product to remotely scan and search remote machines for personal information. It then can remediate possible compliance violations by shredding, redacting, ...
Total Protection for Endpoint from McAfee offers just what the name says: a full-scale suite of tools to protect and secure endpoints throughout the enterprise ...
The Endpoint Protection Suite can leverage already existing Microsoft Active Directory or Novell eDirectory structures to manage policies based on users or computers, thus offering ...
Administrators can use this product to quickly and easily manage many types of both hardware- and software-based encryption throughout the enterprise.
StormShield is designed to enhance endpoint security through user control, system level security, data protection and network connectivity.
Bit9 Parity is a policy-driven whitelisting solution for managing the applications and devices that can run on Windows computers.
Kaspersky Endpoint Security 8 provides a centralized solution for managing corporate network anti-virus security systems based on Kaspersky Lab applications included in Kaspersky Open Space ...
Lumension Endpoint Management and Security Suite (LEMSS) is an application that serves as a platform for other applications that protect a network from security risks.
Protect On Q (POQ) from Quarri Technologies is a security software solution that empowers organizations to protect browser-delivered content from compromise on the endpoint.
Sophos Endpoint Protection v10 provides a single, automated console for Windows, Mac, Unix, Linux and virtual platforms to centrally manage anti-virus, firewall, intrusion prevention, web ...
Symantec Endpoint Protection 12 is a client-server solution that protects laptops, desktops, Mac computers and servers in a network against malware.
Trend Micro Enterprise Security for Endpoints is a centrally managed security suite for desktops, laptops and mobile devices.
Authenticating to a SaaS application in the cloud should be simple. It now Is.
Cloud-based federated identity management for “cloud identity management switch.”
Only through collaboration can government and the private sector thwart cyber attacks, says Raymond Choo.
Sign up to our newsletters
SC Magazine Articles
- Malware on Lime Crime website, payment cards compromised
- State breakdowns: Anthem breach by the numbers
- Florida law enforcement docs show widespread stingray use, secrecy
- After Superfish-Lenovo incident, Facebook probes larger issue of SSL-sniffing adware
- Older vulnerabilities a top enabler of breaches, according to report
- Carbanak APT campaign made off with $1B from banks globally
- BMW issues security patch for bug allowing attackers physical access into vehicles
- State breakdowns: Anthem breach by the numbers
- NIST requests final comments on ICS security guide
- Disconnect yawns between CISOs, exec leadership, study says
- Researchers investigate link between Axiom spy group, Anthem breach
- Top Android tablets for children riddled with security lapses, study finds
- Bulk Reef Supply website compromised, credit cards at risk
- Medical identity theft up 22 percent in 2014, annual report says
- Report: Majority of health-related websites leak data to third parties