August 2012 Issue of SCMagazine
Yahoo presumably took no measures to ensure sensitive stuff like customer account credentials were kept safe and sound.
Anonymous, WikiLeaks, DNSChanger, Stratfor, global cyber crime ring...and other breaking news.
The evasiveness of Flame may have been what prevented traditional AV technology from catching it sooner.
The threat of the month for August is the MS zero-day.
Personnel moves, government contracts and other news in the security industry.
2 minutes on
Security veteran Howard Schmidt filled a spot few others reportedly wanted: the role of U.S. cyber security coordinator. Two-and-a-half years later, he's leaving the job, ...
Skills in Demand
IT business continuity (BC) and disaster recovery (DR) specialists have been in great and continuously growing demand, says Prescient Solutions' Jerry Irvine.
Me and my job
Walter Strycharz Jr., a senior IS auditor at the University System of Maryland, discusses some of the concerns, challenges and achievements he has experienced.
Many of today's applications are designed to work over any port, which increases chances they won't be blocked by firewalls.
The increasing connectedness of infrastructure increases the cascading effect an attack can have on other infrastructure sectors and capabilities.
Consensus needs to be developed around how critical infrastructure is defined, says Mark Clancy, managing director and CISO for The Depository Trust & Clearing Corp.
Many view information sharing as an elusive quest, hampered by various roadblocks. But Georgia Tech researchers want to tear down these hurdles with a new ...
Security metrics remain elusive for many organizations, but key performance indicators, or KPIs, are achievable measurements that can help guide business planning and strategy.
Businesses may no longer be able to turn away employees who want to bring their smartphones and tablets to work, and connect to the corporate ...
Endpoint security today is responding to the needs of the enterprise in ways it has not in the past, says Technology Editor Peter Stephenson.
Group Test 1
Endpoint Security from Check Point offers up a lot of functionality that can be customized for the needs of the environment.
The Endpoint DLP Suite from DeviceLock offers full control over devices, peripherals and ports throughout the enterprise.
Endpoint Security from ESET focuses on malware prevention and overall system security to mitigate threats throughout the enterprise.
GFI EndPointSecurity 2012 provides administrators a simple way to lock down computers across the enterprise network to ensure only authorized removable media devices are used ...
Administrators can use this product to remotely scan and search remote machines for personal information. It then can remediate possible compliance violations by shredding, redacting, ...
Total Protection for Endpoint from McAfee offers just what the name says: a full-scale suite of tools to protect and secure endpoints throughout the enterprise ...
The Endpoint Protection Suite can leverage already existing Microsoft Active Directory or Novell eDirectory structures to manage policies based on users or computers, thus offering ...
Administrators can use this product to quickly and easily manage many types of both hardware- and software-based encryption throughout the enterprise.
StormShield is designed to enhance endpoint security through user control, system level security, data protection and network connectivity.
Bit9 Parity is a policy-driven whitelisting solution for managing the applications and devices that can run on Windows computers.
Kaspersky Endpoint Security 8 provides a centralized solution for managing corporate network anti-virus security systems based on Kaspersky Lab applications included in Kaspersky Open Space ...
Lumension Endpoint Management and Security Suite (LEMSS) is an application that serves as a platform for other applications that protect a network from security risks.
Protect On Q (POQ) from Quarri Technologies is a security software solution that empowers organizations to protect browser-delivered content from compromise on the endpoint.
Sophos Endpoint Protection v10 provides a single, automated console for Windows, Mac, Unix, Linux and virtual platforms to centrally manage anti-virus, firewall, intrusion prevention, web ...
Symantec Endpoint Protection 12 is a client-server solution that protects laptops, desktops, Mac computers and servers in a network against malware.
Trend Micro Enterprise Security for Endpoints is a centrally managed security suite for desktops, laptops and mobile devices.
Authenticating to a SaaS application in the cloud should be simple. It now Is.
Cloud-based federated identity management for “cloud identity management switch.”
Only through collaboration can government and the private sector thwart cyber attacks, says Raymond Choo.
Sign up to our newsletters
SC Magazine Articles
- Popular adult website XTube compromised, delivers malware
- Android vulnerability leaves apps open to malicious overwriting
- One in three of the top million websites are 'risky,' researchers find
- Orgs predict $53M risk, on average, from crypto key, digital cert attacks
- Hanjuan Exploit Kit leveraged in malvertising campaign
- Report: 71 percent of orgs were successfully attacked in 2014
- Self-deleting malware targets home routers to gather information
- 'PoSeidon' point-of-sale malware targets payment card information
- Amedisys notifies nearly 7,000 individuals of potential breach
- Report: More than 15,000 vulnerabilities in nearly 4,000 applications reported in 2014
- IBM will invest $3 billion in new IoT unit
- Infostealer Laziok targets energy companies
- 30 percent of practitioners say they would pay cyber extortionists to retrieve their data
- The best defense is a good offense: The importance of securing your endpoints
- British Airways says rewards accounts hacked, locked down