August 2012 Issue of SCMagazine
Yahoo presumably took no measures to ensure sensitive stuff like customer account credentials were kept safe and sound.
Anonymous, WikiLeaks, DNSChanger, Stratfor, global cyber crime ring...and other breaking news.
The evasiveness of Flame may have been what prevented traditional AV technology from catching it sooner.
The threat of the month for August is the MS zero-day.
Personnel moves, government contracts and other news in the security industry.
2 minutes on
Security veteran Howard Schmidt filled a spot few others reportedly wanted: the role of U.S. cyber security coordinator. Two-and-a-half years later, he's leaving the job, ...
Skills in Demand
IT business continuity (BC) and disaster recovery (DR) specialists have been in great and continuously growing demand, says Prescient Solutions' Jerry Irvine.
Me and my job
Walter Strycharz Jr., a senior IS auditor at the University System of Maryland, discusses some of the concerns, challenges and achievements he has experienced.
Many of today's applications are designed to work over any port, which increases chances they won't be blocked by firewalls.
The increasing connectedness of infrastructure increases the cascading effect an attack can have on other infrastructure sectors and capabilities.
Consensus needs to be developed around how critical infrastructure is defined, says Mark Clancy, managing director and CISO for The Depository Trust & Clearing Corp.
Many view information sharing as an elusive quest, hampered by various roadblocks. But Georgia Tech researchers want to tear down these hurdles with a new ...
Security metrics remain elusive for many organizations, but key performance indicators, or KPIs, are achievable measurements that can help guide business planning and strategy.
Businesses may no longer be able to turn away employees who want to bring their smartphones and tablets to work, and connect to the corporate ...
Only through collaboration can government and the private sector thwart cyber attacks, says Raymond Choo.
Endpoint security today is responding to the needs of the enterprise in ways it has not in the past, says Technology Editor Peter Stephenson.
Group Test 1
Endpoint Security from Check Point offers up a lot of functionality that can be customized for the needs of the environment.
The Endpoint DLP Suite from DeviceLock offers full control over devices, peripherals and ports throughout the enterprise.
Endpoint Security from ESET focuses on malware prevention and overall system security to mitigate threats throughout the enterprise.
GFI EndPointSecurity 2012 provides administrators a simple way to lock down computers across the enterprise network to ensure only authorized removable media devices are used ...
Administrators can use this product to remotely scan and search remote machines for personal information. It then can remediate possible compliance violations by shredding, redacting, ...
Total Protection for Endpoint from McAfee offers just what the name says: a full-scale suite of tools to protect and secure endpoints throughout the enterprise ...
The Endpoint Protection Suite can leverage already existing Microsoft Active Directory or Novell eDirectory structures to manage policies based on users or computers, thus offering ...
Administrators can use this product to quickly and easily manage many types of both hardware- and software-based encryption throughout the enterprise.
StormShield is designed to enhance endpoint security through user control, system level security, data protection and network connectivity.
Bit9 Parity is a policy-driven whitelisting solution for managing the applications and devices that can run on Windows computers.
Kaspersky Endpoint Security 8 provides a centralized solution for managing corporate network anti-virus security systems based on Kaspersky Lab applications included in Kaspersky Open Space ...
Lumension Endpoint Management and Security Suite (LEMSS) is an application that serves as a platform for other applications that protect a network from security risks.
Protect On Q (POQ) from Quarri Technologies is a security software solution that empowers organizations to protect browser-delivered content from compromise on the endpoint.
Sophos Endpoint Protection v10 provides a single, automated console for Windows, Mac, Unix, Linux and virtual platforms to centrally manage anti-virus, firewall, intrusion prevention, web ...
Symantec Endpoint Protection 12 is a client-server solution that protects laptops, desktops, Mac computers and servers in a network against malware.
Trend Micro Enterprise Security for Endpoints is a centrally managed security suite for desktops, laptops and mobile devices.
Sign up to our newsletters
SC Magazine Articles
- Skype targeted by T9000 backdoor trojan
- CISO salaries and demand for cyber-skills skyrockets, surprising no-one
- Student SSNs exposed in University of Central Florida breach
- Malwarebytes says sorry for multiple AV bugs, still unpatched
- Ransomware and POS attackers to zero in on small businesses, retailers