August 2008 Issue of SCMagazine
The rise of organized online crime will be a major challenge in the next few years, says Illena Armstrong, editor-in-chief, SC Magazine.
Compliance is an opportunity to run operations in a more consistent and predictable manner, says Harish Rao, chairman & CEO, nSolutions.
More and more companies are getting requests for FISMA control assessments, says David Lawson, director, risk management and compliance, Acumen Solutions.
The march to a near cashless society advances, says Nancy Edwards, VP/CSO, State Auto Insurance Companies.
With e-discovery laws in effect, companies find benefits to data archiving, says TLC Vision's Roger McIlmoyle.
To keep up with its expansion, Denver-based Frontier Airlines sought to centralize its firewall needs.
Small- and medium-sized enterprises are often ignored by security vendors, and contend with unsavvy users a lot.
Data breach laws have proven to be helpful to consumers, but daunting to those charged with enforcement.
Can the Federal Information Security Management Act have an upside to the government, Eric Butterman asks.
The U.S. should engage with the world to combat cyberthreats, says Howard Schmidt.
This month we look at two aspects of verification and validation: policy management and vulnerability assessment.
A Java-based web management platform that enables users to manage many key aspects of SonicWALL’s product line.
A web-based configuration and change management solution for network devices.
A series of client server and web-based components designed to assist with workstation/server configuration and vulnerability management.
A combination of client server and web-based components to help organizations manage configurations of workstations and servers.
A suite of client server and web components that are primarily used for network security device configuration management, as well as auditing to support change ...
An appliance-based security operations solution that is used to manage policies for firewalls only.
This product is the ultimate tool for finding and exploiting possible holes in a network.
This product incorporates all the great features of the Retina Scanner with added capabilities for compliance and patch management.
The GFi LANguard Network Security Scanner focuses into three areas of network security scanning.
A fairly robust vulnerability scanner that enables administrators to identify and scan all network-attached assets for three types of vulnerabilities.
This tool is customized and tailored to the environment for absolute pinpoint accuracy and in-depth vulnerability analysis.
A feature-packed vulnerability assessment and risk analysis tool that always goes beyond expectations.
Two great tools wrapped up to work together to provide an in-depth view of vulnerabilities throughout a network.
This product can be used to audit Windows, Cisco or Solaris systems, as well as Oracle and SQL database servers.
The StillSecure VAM appliance is serious vulnerability management in a single device.
The way I see these products is that we are really looking at two products. The first is Nessus and Passive Vulnerability Scanner, and the ...
Keeping web technologies out of the workplace can have a detrimental effect on morale, says Yuval Tarsi.
SC Magazine Articles
- WhatsApp in the spotlight after Turkey publishes messages of coup officers
- Trump's Russian interests and Guccifer 2.0
- WordPress Summer of Pwnage: 64 holes in 21 days
- Russian hackers take the stage at DNC convention
- Proliferation of hacker culture helped keep Anonymous from being branded terrorist org
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- CEO sacked after aircraft company grounded by whaling attack
- Some U.S. Bancorp workers' W-2 info exposed in ADP data breach
- Microsoft warns of new, self-propagating ransomware in the wild