February 2008 19 2 Issue of SCMagazine
SC Magazine - February 2008
In conversations with industry contacts this past week, I heard the same thing: in many companies, information security is being absorbed into various business units.
What are the occupational likes and gripes of security pro Bert Talley?
Brian Cohen has been named president and chief executive officer of Steelbox Networks
What is it?A computer's DNS settings help it map hostnames to IP addresses. A computer can be reconfigured to use these malicious DNS servers through ...
Malware authors exploited the assassination of former Pakistani Prime Minister Benazir Bhutto to spread malware. Attackers set up fake blogs and webpages, which claimed to ...
2 minutes on
Hackers are employing a new and sophisticated strategy that attempts to lure victims to their malware-infested websites by capitalizing on users' inherent trust in internet ...
Smart companies are looking more intently at what it takes to better control their policies around data management, not only today, but five or even ...
Does anyone today really believe that they can keep their personal information entirely confidential? While some people have personal preferences about how much personal information ...
There is both good news and bad news for IT security professionals appealing to their higher-ups for more resources.
Are multifactor solutions enough to protect today's financial customers?
Attacks on the firmware that sits within computers and enterprise networks is closer than you think.
Some retailers are slow to embrace the new objectives required by the payment card industry.
IT pros need to move fast as RFID and Bluetooth threats move from the drawing board to the real world.
Contracted third parties and other insiders create a bevy of risks for companies looking to secure data.
As the experience of one insurance broker proves, securing mobile devices requires a two-pronged approach.
John Penrod, CISO of The Weather Channel, discusses how the IT pro can manage business risk.
This month our reviews section is unplugged. We look at security for portable devices, as well as security for wireless systems.
A solid, multifunction product with transparent ease of use and excellent administration.
An easy to use and deploy product with a somewhat higher price tag than we'd like.
For its strong feature set, ease of use and good value, we rate DeviceWall our Best Buy.
A very strong product overall, but we wish that it was a bit more feature-rich.
For its overall capability and excellent value, we designate this our Recommended product.
A solid, but somewhat limited product that gets the greatest value when integrated with the fill ZENworks suite.
A middle-of-the-road product with a bit of good functionality.
For its excellent value, ease of use and performance, we rate this product our Best Buy.
If you are a ZENworks shop, you need this product. Be sure that you have complimentary wireless security functionality in the form of other products, ...
A solid offering especially when used with APs that have good blocking capabilities built in.
For its ease of use and good value, we rate this Recommended.
Tapping suite extends monitoring capability
Protects web applications in both directions.
SC Magazine Articles
- Blasphemy! Godless malware preys on nearly 90 percent of Android devices
- 'Password attacks' continue; Citrix becomes latest victim
- Guccifer 2.0 out - Cozy Bear, Fancy Bear hacked DNC, Fidelis analysis shows
- Acer breach caused by improperly stored data
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- CEO sacked after aircraft company grounded by whaling attack
- Microsoft warns of new, self-propagating ransomware in the wild
- Wendy's POS breach 'considerably' bigger than first thought
- No hacking required: Israeli researchers show how to steal data through PC components
- Brexit shakeup: How will the U.K.'s exit from the EU affect the technology sector?
- MIRCOP ransomware blames victim for attack, demands $28K ransom
- CYBERCOM 'reluctant' to cut off Islamic State internet
- Chinese tech professional caught selling secrets
- How 154M U.S. voter records will affect Americans' security - industry reacts