February 2008 19 2 Issue of SCMagazine
SC Magazine - February 2008
In conversations with industry contacts this past week, I heard the same thing: in many companies, information security is being absorbed into various business units.
What are the occupational likes and gripes of security pro Bert Talley?
Brian Cohen has been named president and chief executive officer of Steelbox Networks
What is it?A computer's DNS settings help it map hostnames to IP addresses. A computer can be reconfigured to use these malicious DNS servers through ...
Malware authors exploited the assassination of former Pakistani Prime Minister Benazir Bhutto to spread malware. Attackers set up fake blogs and webpages, which claimed to ...
2 minutes on
Hackers are employing a new and sophisticated strategy that attempts to lure victims to their malware-infested websites by capitalizing on users' inherent trust in internet ...
Smart companies are looking more intently at what it takes to better control their policies around data management, not only today, but five or even ...
Does anyone today really believe that they can keep their personal information entirely confidential? While some people have personal preferences about how much personal information ...
There is both good news and bad news for IT security professionals appealing to their higher-ups for more resources.
Are multifactor solutions enough to protect today's financial customers?
Attacks on the firmware that sits within computers and enterprise networks is closer than you think.
Some retailers are slow to embrace the new objectives required by the payment card industry.
IT pros need to move fast as RFID and Bluetooth threats move from the drawing board to the real world.
Contracted third parties and other insiders create a bevy of risks for companies looking to secure data.
As the experience of one insurance broker proves, securing mobile devices requires a two-pronged approach.
John Penrod, CISO of The Weather Channel, discusses how the IT pro can manage business risk.
This month our reviews section is unplugged. We look at security for portable devices, as well as security for wireless systems.
A solid, multifunction product with transparent ease of use and excellent administration.
An easy to use and deploy product with a somewhat higher price tag than we'd like.
For its strong feature set, ease of use and good value, we rate DeviceWall our Best Buy.
A very strong product overall, but we wish that it was a bit more feature-rich.
For its overall capability and excellent value, we designate this our Recommended product.
A solid, but somewhat limited product that gets the greatest value when integrated with the fill ZENworks suite.
A middle-of-the-road product with a bit of good functionality.
For its excellent value, ease of use and performance, we rate this product our Best Buy.
If you are a ZENworks shop, you need this product. Be sure that you have complimentary wireless security functionality in the form of other products, ...
A solid offering especially when used with APs that have good blocking capabilities built in.
For its ease of use and good value, we rate this Recommended.
Tapping suite extends monitoring capability
Protects web applications in both directions.
Sign up to our newsletters
SC Magazine Articles
- Anonymous hacks, 'Rickrolls' ISIS
- IBM, Oracle, Cisco certification manager breached, info accessed
- Hilton Worldwide confirms malware on POS targeted payment card info
- Algebraic Eraser, the algorithm running the 'Internet of Things' is broken...again
- Sony hackers remained hidden for months due to a new toolset: Damballa