December 2005 Issue of SCMagazine

Editorial

Call me a silly optimist

When pondering the top information security thinkers of the year, a slew of names came to the minds of our editorial staff. In considering who ...

Update

Debate

Signature-based solutions are not necessary to organizations' security infrastructures.

2 minutes on ... multi-factor authentication

A recent news story jumped off the page at George Waller.

Company news

Former ceo of Hewlett-Packard Carly Fiorina has joined Cybertrust’s board. Fiorina said in a statement that “information security will be a key driver of growth ...

Me and my job

How did you get into security? I came from the physics field to begin with. I jumped in here about 11 years ago. I started as ...

News Briefs

Sony-BMG Entertainment has been under fire from a blogger-fueled media storm after the discovery of spyware-like technology in its CDs. Windows security expert Mark Russinovich ...

Opinion

Defend against cyberwarfare

Most of the national and international TV news is taken up with the “war on terror” or the “war in Iraq.” In our area (metro ...

Good password management

Perhaps the single most important thing to remember when creating a new password is to make it hard to guess, but easy to remember. That’s ...

CSO's desk

Getting organized to gain support

If your days are anything like mine, there is no shortage of people who you must keep apprised of your company’s information security and risk ...

30 seconds on

Demonstrate value: A lifecycle of IT security risk management should demonstrate that you can mitigate risk with what products you are deploying. This evidence will ...

Letters

Got something to say?

Send your comments, praise or criticisms to scfeedbackus@haymarketmedia.com

Features

The top 5 inlfuential IT security thinkers

SC Magazine’s U.S. and U.K. editorial teams spotlight some of the noteworthy people, major merger/acquisitions and leading compliance worries of yet another eventful year in ...

Others who are making a difference

Richard Clarke, founder and ceo of Good Harbor Consulting, for continuing to unabashedly criticize anyone who is failing to comprehend the security requirements that go ...

The year of compliance

At the start of the year, most of the talk centered on how IT security would be affected by new federal legislation, such as Sarbanes-Oxley ...

Merger mania takes hold

With Symantec, Microsoft and Cisco continuing to buy up smaller players to bolster their product portfolios, 2005 was a boon year for consolidation in the ...

Relying on the logs to recover

When bad things happen to good networks — and no enterprise is completely immune from attacks on its IT infrastructure anymore — how the good ...

10 steps to safety

So your systems have been compromised — a distributed denial of service (DDoS) attack shut your network down or a worm infected dozens of your ...

Is your SAN or NAS an Achilles heel?

IT security has long been the focus of corporate attention, while storage security has been — perhaps unnoticeably — absent from the limelight. So it ...

5 steps for ensuring storage network security

The Storage Security Industry Forum (the security forum in SNIA) recommends a five-step review for improved storage network security.

Spyware and users are your top demons

As usual, the SC Magazine readership survey has proven to be a most revealing exercise. Now in its fourth year, the end-of-year survey gives an ...

Last Word

Protecting your investment in VoIP

Within the next two years, most businesses will either pilot or start widescale deployments of voice over IP (VoIP). Why? To extend the capabilities of ...

Advertisement

How to Prevent Insider Threats!

POLL