August 2014 25 7 & 8 Issue of SCMagazine

August 2014 25 7 & 8 Issue of SCMagazine

In this special inaugural issue of SC Magazine, we take a look at the some of the notable women in IT security.

Editorial

A long-overdue change

Debates about the dearth of women in IT security and, well, a lack of diversity in the field overall, seem to be edging our space ...

Features

2014 Women in IT Security: Making headway

Though plenty of work remains to be done in closing the industry's gender gap, this inaugural issue of SC Magazine takes the step of highlighting ...

2014 Women in IT Security: Becky Bace

Becky is one of 10 women selected for their longstanding contributions to the IT security space. As veterans in the field, they've served as exemplary ...

2014 Women in IT Security: Lisa Foreman

Lisa Foreman has made it her mission to ensure that more women and girls not only enter the information security field, but feel at home ...

2014 Women in IT Security: Stacey Halota

When she stepped into the job of vice president of information security and privacy at Graham Holdings Company in 2003, Stacey Halota had to carve ...

2014 Women in IT Security: Kristin Lovejoy

It's fair to say that Kristin Lovejoy understands IBM's information security approach inside and out, largely because she helped shape both the corporation's internal and ...

2014 Women in IT Security: Jennifer Minella

Jennifer Minella grew up in the shadow of the company she now helps run.

2014 Women in IT Security: Samara Moore

When the White House decided to take a stand on cybersecurity for the critical infrastructure of the country, it was Samara Moore who helped guide ...

2014 Women in IT Security: Katie Moussouris

As chief policy officer of HackerOne, Katie Moussouris oversees the company's philosophy and approach to vulnerability disclosure, advises customers and researchers, and as she puts ...

2014 Women in IT Security: Wendy Nather

In 2010 Wendy Nather joined 451 Research as a senior analyst, and she now serves as research director for the information security practice covering many ...

2014 Women in IT Security: Hemma Prafullchandra

As both the CTO and the SVP for products at HyTrust, as well as more recently its head of engineering and CISO, Hemma Prafullchandra is ...

2014 Women in IT Security: Patricia Titus

As VP and CISO at Freddie Mac, Patricia Titus is responsible for the protection and integrity of the mortgage company's information assets while enabling world-class ...

2014 Women of influence

These seven women are featured for their noteworthy efforts, which have impacted the field of online security and data privacy for the better.

2014 Women to Watch

Here's a list of five notable women to watch who have had a positive impact on the information security industry.

Insider outlook: Q&A on the status of women in IT security

We asked a number of security professionals what they thought about the conditions for women in the IT security workplace today.

Meetings of the mind: Women at the Podium

Targeted events help stake out space for women in the security field, reports Alan Earls.

A glass cliff: Gender gap

Women bring new skill sets, but early encouragement, training in grade school and mentoring are all needed to succeed, reports James Hale.

What's sex got to do with it?

Harassment has no place in the security industry. Neither do sexism or discrimination. But, there they are. It's time for infosec to just say no, ...

Last Word

Backing diversity lowers the bar?

Many groups have striven to cultivate a more welcoming workplace, says Alison Gianotto.

Product opener

Mobile devices are the new endpoints...and both need protecting

The use of social media spreads throughout the internet and cares little if the participants are Joe and Jane or the Massive Big Company. They're ...

Group Test 1

BlackBerry Enterprise Service 10

BES10 provides device management, security and application management for corporate and BYOD (bring your own device) BlackBerry, iOS and Android devices delivered through a single ...

MobileEther v2.0 by iboss

MobileEther by iboss extends device security which marries MDM with web security in one cloud or hybrid-based platform.

MECS Server v1.9.4.2 by Mobile Active Defense

The MECS (Mobile Enterprise Compliance and Security) server is a centrally managed enterprise-grade solution designed to extend security functions to corporate and personally-owned mobile devices ...

Sophos Mobile Control v4.0

Sophos Mobile Control is an enterprise mobility management solution which offers mobile device management, mobile application management, mobile email management, mobile content management and mobile ...

Group Test 2

Avira Endpoint Security

Avira Professional has its own console and is largely an anti-malware product.

CenterTools DriveLock v7.3

DriveLock offers dynamic, configurable access control for mobile drives, such as floppy disk drives, CD-ROM drives and USB memory sticks.

CoSoSys Endpoint Protector v4

Endpoint Protector v4 comes as a virtual appliance and is intended to provide device control, mobile device management and data leakage protection.

Fortinet FortiClient 5.0 for Windows v5.0.9

The tool includes an anti-virus module to scan system files, executables, dynamic-link libraries and drivers. It also scans for and removes rootkits.

Invincea Platform v3.3/4.0

Invincea provides an additional layer of security at the endpoint by adding in protection for web browsing and document use.

Kaspersky Endpoint Security for Business

Kaspersky Endpoint Security for Business is an enterprise-grade endpoint security system that addresses malware, mobile device management, endpoint controls, encryption and systems management.

Dell KACE K1000 Systems Management Appliance v6.0

Addresses systems management tasks: device discovery and inventory, software distribution, patch management, software asset management (SAM), security audit and enforcement, service desk, power management and ...

Novell ZENworks Endpoint Security Management v11

Novell ZENworks Endpoint Security Management v11 hits all of the marks for a full-featured endpoint security product by addressing managing.

Safetica Technologies Safetica v5

Safetica manages and controls data security at the endpoint through its client-server architecture and three major components: Endpoint Client, Management Server and the Safetica Management ...

Trend Micro Smart Protection Complete v11

Trend Micro Smart Protection Complete v11

Lumension Endpoint Management and Security Suite (LEMSS) v8.0

Unifies IT operations and security through a single console, server and agent architecture to address IT risk and systems management requirements across the enterprise.

First Look

Bits and bytes in intelligence: Umbrella from OpenDNS

Umbrella from OpenDNS, a cloud-based network security service, is easy to use and an excellent intelligence resource.

Soft intelligence is important too: Silobreaker

Silobreaker is a must-have collection and analysis tool for organizations that might benefit from open source intelligence (OSINT).

Sign up to our newsletters

POLL