SC Magazine - December 2007
Hurtling into our annual Reboot edition, I became conscious of the break-neck speed at which 2007 has come to its end.
The latest from the boardrooms of the IT security industry.
The Colorado Rockies baseball club blamed a cyberattack for downing its online ticket sales operation before the World Series in October. The Rockies lost to ...
Those fighting the battle against privacy violations, spyware and other malicious attacks via the internet have a new weapon: the Identity Theft Enforcement and Restitution ...
Of what are you most proud?Professionally, I'm most proud of where our project is today, considering where it was four years ago. It's not an ...
Now, as we close the calendar year and take a break from our academics for the holidays, I find time to think about what it ...
Government agencies and industry organizations alike are embracing the cultural shift toward a mobile workforce. However, managers often point to mobile workers as a data ...
By Patrick McGregor, CEO, BitArmor, and Pate Dane, CEO, MyPublicInfo
It seems like such a short time ago that we formed the PCI Security Standards Council and embarked on our goal to improve payment security ...
Send your comments, praise or criticisms to scfeedbackUS@haymarketmedia.com. We reserve the right to edit letters.
This is a very special issue to me and the team at SC Labs because it is based on a year of seeing the good ...
We handed out crystal balls to several analysts, consultants, professors and CSOs and asked them to answer questions about next year.
The thought-leaders who had the biggest impact on IT security throughout 2007.
The end of yet another year sees in this final 2007 edition of SC Magazine our annual roundup of top thinkers, interesting happenings, business developments ...
On the hunt for more innovative solutions to holistically safeguard organizations' growing networks, Peter Stephenson pinpoints the product categories and solutions you might consider next ...
Of the classifications we looked at, access control is among the most multidimensional. We defined access control fairly broadly as including identification, authentication and authorization. ...
The VP-II S vascular hand scanner provided by Identica fits perfectly into our look forward for the year. This device takes biometrics to a whole ...
If you are trying to log into a network protected by Bradford Networks' NAC Director, you'll have an agent on your computer or you won't ...
Like all of our selections for this issue, Passlogix told us that they were innovators because they look at problems in new ways. What is ...
When the phrase identity management comes up it is almost enough to make any administrator cringe. Between managing users, making sure they are in the ...
The analysis and testing products are the toys in our lab. The five products we've selected form the standards against which we test other products.
There may — will, according to Mu Security — come a time when signature-based vulnerability assessment by itself is no longer a viable testing option.
Iconsider the term "ethical hacking" an oxymoron, but it has become a part of the information assurance lexicon whether I agree or not. However, the ...
Every now and then we see, as Monty Python used to say "...something completely different." The RazorThreat Threat Analysis Console is just such a product. ...
SIM/SEM — security information management or security event management — often is characterized as being log correlation and analysis. LogLogic entered the market as an ...
Occasionally one gets to see a set of products whose only connection is that they take really hard problems in a particular application space and ...
The perimeter defense group is a small one and there's a very good reason for that. Nowhere in the information security product space is there ...
The unified threat management (UTM) market is a fast growing segment of the security market and vendors are trying to cram more and more security ...
It's just an intrusion prevention system (IPS), right? Well, not exactly. NitroSecurity is another of those companies that we've been watching for a long time. ...
Wireless is not the future. It is now. Organizations are demanding wireless connectivity and IT departments are struggling to deploy it, while security managers are ...
Why bother to protect the network if we cannot protect the information on it? If we think carefully about the entire notion of an information ...
We have characterized GTB Inspector as "email security," but, really, that requires a bit of rethinking about what we mean by the term. There are, ...
In discussing innovation with people from PGP, we made a very interesting discovery. What we classically think of as PGP encryption actually is only a ...
A major challenge in today's large networks is the build-up of unseen malware, spyware and botnets. The Mi5 Networks Webgate is a tool that helps ...
This group is ubiquitous in that it defines the security platform on which all other tools sit. Essentially, the security infrastructure is the child of ...
As we pointed out earlier in this month's issue, eSoft has the UTM for everyone. However, in some cases, a UTM is not what is ...
Years ago, when BigFix was a new entry in the market, it was thought of as a patch management product. Over time the system has ...
It's not enterprise security management anymore. According to visionaries from Archer Technologies, the old notion of enterprise security management has given way to risk and ...
New specifications can help avoid mobile security issues, says Janne Uusilehto.
Jan. 11-19, 2008
April 22-24
June 22-27