August 2014 25 7 & 8 Issue of SCMagazine
In this special inaugural issue of SC Magazine, we take a look at the some of the notable women in IT security.
Debates about the dearth of women in IT security and, well, a lack of diversity in the field overall, seem to be edging our space ...
Though plenty of work remains to be done in closing the industry's gender gap, this inaugural issue of SC Magazine takes the step of highlighting ...
Becky is one of 10 women selected for their longstanding contributions to the IT security space. As veterans in the field, they've served as exemplary ...
Lisa Foreman has made it her mission to ensure that more women and girls not only enter the information security field, but feel at home ...
When she stepped into the job of vice president of information security and privacy at Graham Holdings Company in 2003, Stacey Halota had to carve ...
It's fair to say that Kristin Lovejoy understands IBM's information security approach inside and out, largely because she helped shape both the corporation's internal and ...
Jennifer Minella grew up in the shadow of the company she now helps run.
When the White House decided to take a stand on cybersecurity for the critical infrastructure of the country, it was Samara Moore who helped guide ...
As chief policy officer of HackerOne, Katie Moussouris oversees the company's philosophy and approach to vulnerability disclosure, advises customers and researchers, and as she puts ...
In 2010 Wendy Nather joined 451 Research as a senior analyst, and she now serves as research director for the information security practice covering many ...
As both the CTO and the SVP for products at HyTrust, as well as more recently its head of engineering and CISO, Hemma Prafullchandra is ...
As VP and CISO at Freddie Mac, Patricia Titus is responsible for the protection and integrity of the mortgage company's information assets while enabling world-class ...
These seven women are featured for their noteworthy efforts, which have impacted the field of online security and data privacy for the better.
Here's a list of five notable women to watch who have had a positive impact on the information security industry.
We asked a number of security professionals what they thought about the conditions for women in the IT security workplace today.
Targeted events help stake out space for women in the security field, reports Alan Earls.
Women bring new skill sets, but early encouragement, training in grade school and mentoring are all needed to succeed, reports James Hale.
Harassment has no place in the security industry. Neither do sexism or discrimination. But, there they are. It's time for infosec to just say no, ...
The use of social media spreads throughout the internet and cares little if the participants are Joe and Jane or the Massive Big Company. They're ...
Group Test 1
BES10 provides device management, security and application management for corporate and BYOD (bring your own device) BlackBerry, iOS and Android devices delivered through a single ...
MobileEther by iboss extends device security which marries MDM with web security in one cloud or hybrid-based platform.
The MECS (Mobile Enterprise Compliance and Security) server is a centrally managed enterprise-grade solution designed to extend security functions to corporate and personally-owned mobile devices ...
Sophos Mobile Control is an enterprise mobility management solution which offers mobile device management, mobile application management, mobile email management, mobile content management and mobile ...
Group Test 2
Avira Professional has its own console and is largely an anti-malware product.
DriveLock offers dynamic, configurable access control for mobile drives, such as floppy disk drives, CD-ROM drives and USB memory sticks.
Endpoint Protector v4 comes as a virtual appliance and is intended to provide device control, mobile device management and data leakage protection.
The tool includes an anti-virus module to scan system files, executables, dynamic-link libraries and drivers. It also scans for and removes rootkits.
Invincea provides an additional layer of security at the endpoint by adding in protection for web browsing and document use.
Kaspersky Endpoint Security for Business is an enterprise-grade endpoint security system that addresses malware, mobile device management, endpoint controls, encryption and systems management.
Addresses systems management tasks: device discovery and inventory, software distribution, patch management, software asset management (SAM), security audit and enforcement, service desk, power management and ...
Novell ZENworks Endpoint Security Management v11 hits all of the marks for a full-featured endpoint security product by addressing managing.
Safetica manages and controls data security at the endpoint through its client-server architecture and three major components: Endpoint Client, Management Server and the Safetica Management ...
Trend Micro Smart Protection Complete v11
Unifies IT operations and security through a single console, server and agent architecture to address IT risk and systems management requirements across the enterprise.
Helps enterprises manage and control endpoint security by combining a small-footprint, anti-virus agent with integrated patch management and mobile device management (MDM) capability.
Umbrella from OpenDNS, a cloud-based network security service, is easy to use and an excellent intelligence resource.
Silobreaker is a must-have collection and analysis tool for organizations that might benefit from open source intelligence (OSINT).
Many groups have striven to cultivate a more welcoming workplace, says Alison Gianotto.
SC Magazine Articles
- Blasphemy! Godless malware preys on nearly 90 percent of Android devices
- 'Password attacks' continue; Citrix becomes latest victim
- Guccifer 2.0 out - Cozy Bear, Fancy Bear hacked DNC, Fidelis analysis shows
- Acer breach caused by improperly stored data
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- CEO sacked after aircraft company grounded by whaling attack
- Microsoft warns of new, self-propagating ransomware in the wild
- Wendy's POS breach 'considerably' bigger than first thought
- No hacking required: Israeli researchers show how to steal data through PC components
- Brexit shakeup: How will the U.K.'s exit from the EU affect the technology sector?
- MIRCOP ransomware blames victim for attack, demands $28K ransom
- CYBERCOM 'reluctant' to cut off Islamic State internet
- Chinese tech professional caught selling secrets
- How 154M U.S. voter records will affect Americans' security - industry reacts