August 2014 25 7 & 8 Issue of SCMagazine
In this special inaugural issue of SC Magazine, we take a look at the some of the notable women in IT security.
Debates about the dearth of women in IT security and, well, a lack of diversity in the field overall, seem to be edging our space ...
Though plenty of work remains to be done in closing the industry's gender gap, this inaugural issue of SC Magazine takes the step of highlighting ...
Becky is one of 10 women selected for their longstanding contributions to the IT security space. As veterans in the field, they've served as exemplary ...
Lisa Foreman has made it her mission to ensure that more women and girls not only enter the information security field, but feel at home ...
When she stepped into the job of vice president of information security and privacy at Graham Holdings Company in 2003, Stacey Halota had to carve ...
It's fair to say that Kristin Lovejoy understands IBM's information security approach inside and out, largely because she helped shape both the corporation's internal and ...
Jennifer Minella grew up in the shadow of the company she now helps run.
When the White House decided to take a stand on cybersecurity for the critical infrastructure of the country, it was Samara Moore who helped guide ...
As chief policy officer of HackerOne, Katie Moussouris oversees the company's philosophy and approach to vulnerability disclosure, advises customers and researchers, and as she puts ...
In 2010 Wendy Nather joined 451 Research as a senior analyst, and she now serves as research director for the information security practice covering many ...
As both the CTO and the SVP for products at HyTrust, as well as more recently its head of engineering and CISO, Hemma Prafullchandra is ...
As VP and CISO at Freddie Mac, Patricia Titus is responsible for the protection and integrity of the mortgage company's information assets while enabling world-class ...
These seven women are featured for their noteworthy efforts, which have impacted the field of online security and data privacy for the better.
Here's a list of five notable women to watch who have had a positive impact on the information security industry.
We asked a number of security professionals what they thought about the conditions for women in the IT security workplace today.
Targeted events help stake out space for women in the security field, reports Alan Earls.
Women bring new skill sets, but early encouragement, training in grade school and mentoring are all needed to succeed, reports James Hale.
Harassment has no place in the security industry. Neither do sexism or discrimination. But, there they are. It's time for infosec to just say no, ...
The use of social media spreads throughout the internet and cares little if the participants are Joe and Jane or the Massive Big Company. They're ...
Group Test 1
BES10 provides device management, security and application management for corporate and BYOD (bring your own device) BlackBerry, iOS and Android devices delivered through a single ...
MobileEther by iboss extends device security which marries MDM with web security in one cloud or hybrid-based platform.
The MECS (Mobile Enterprise Compliance and Security) server is a centrally managed enterprise-grade solution designed to extend security functions to corporate and personally-owned mobile devices ...
Sophos Mobile Control is an enterprise mobility management solution which offers mobile device management, mobile application management, mobile email management, mobile content management and mobile ...
Group Test 2
Avira Professional has its own console and is largely an anti-malware product.
DriveLock offers dynamic, configurable access control for mobile drives, such as floppy disk drives, CD-ROM drives and USB memory sticks.
Endpoint Protector v4 comes as a virtual appliance and is intended to provide device control, mobile device management and data leakage protection.
The tool includes an anti-virus module to scan system files, executables, dynamic-link libraries and drivers. It also scans for and removes rootkits.
Invincea provides an additional layer of security at the endpoint by adding in protection for web browsing and document use.
Kaspersky Endpoint Security for Business is an enterprise-grade endpoint security system that addresses malware, mobile device management, endpoint controls, encryption and systems management.
Addresses systems management tasks: device discovery and inventory, software distribution, patch management, software asset management (SAM), security audit and enforcement, service desk, power management and ...
Novell ZENworks Endpoint Security Management v11 hits all of the marks for a full-featured endpoint security product by addressing managing.
Safetica manages and controls data security at the endpoint through its client-server architecture and three major components: Endpoint Client, Management Server and the Safetica Management ...
Trend Micro Smart Protection Complete v11
Unifies IT operations and security through a single console, server and agent architecture to address IT risk and systems management requirements across the enterprise.
Helps enterprises manage and control endpoint security by combining a small-footprint, anti-virus agent with integrated patch management and mobile device management (MDM) capability.
Umbrella from OpenDNS, a cloud-based network security service, is easy to use and an excellent intelligence resource.
Silobreaker is a must-have collection and analysis tool for organizations that might benefit from open source intelligence (OSINT).
Many groups have striven to cultivate a more welcoming workplace, says Alison Gianotto.
SC Magazine Articles
- Yahoo breach; State-sponsored actors suspected, at least 500 million accounts affected
- Cybercriminals already able to hack ATM biometric readers
- 185M incidents bypassed perimeter defenses - report
- OVH suffers massive 1.1Tbps DDoS attack
- IoT assault, connected devices increasingly used for DDoS attacks
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- CEO sacked after aircraft company grounded by whaling attack
- DōTERRA breach exposes customer info; including SS, DOB, and addresses
- UPDATE: Petya ransomware leverages Dropbox and overwrites hard drives
- Some U.S. Bancorp workers' W-2 info exposed in ADP data breach
- Report on POS campaign provides peek into scalable tactics of cybercrime duo
- Yahoo! data breach likely exceeds 500 million records
- Boards taking more cyber seriously, driven by regulatory requirements, report finds
- Curtain closes on Ransomware Encryptor RaaS, but with master key
- BIND update fixes high-severity flaw affecting ICS, as CERT releases update to CSET tool