February 2009 20 2 Issue of SCMagazine
The shared creation and release of such critical programming errors and the detailed fixes for them will prompt a huge change in the way organizations ...
Threat of the month
2 minutes on
The internet is about to get more social. Facebook recently announced the rollout of its new Connect service, which allows users to take their identities ...
With today's technologies, it's easier than ever to make a document, presentation, spreadsheet or video available to anyone anywhere -- so much so that someone ...
One of the greatest challenges organizations face in maintaining security is managing security gear from all the many different security and network equipment providers.
Given the issues that we face daily, given our liability, legal and regulatory environments, the seriousness of what we do, and the effect it has ...
Botnets are the bed bugs of security, says MAAWG's Michael O'Reirdan, reports Dan Kaplan.
One of the biggest challenges for any multinational company is navigating the matrix of regional regulatory requirements, reports Greg Masters.
The pool of venture capital for IT security is dwindling, but spending for security is rising. This creates opportunities, reports Deb Radcliff.
As attacks continue to evolve, signature-based anti-virus solutions evolve with them, reports Chuck Miller.
As companies like Deutsche Telekom have learned, attackers are going after databases, reports Deb Radcliff.
The IDsentrie 1000 from A10 Networks is a well-rounded identity management device. This appliance has many features to help streamline managing existing users and adding ...
The Avatier Identity Management Suite, or AIMS, takes a full service approach to user lifecycle management.
Evidian Enterprise SSO is the single sign-on piece of Evidian’s much larger IAM (Identity and Access Management) Suite.
The Imprivata OneSign appliance is a one-stop user management and provisioning shop. This product can be set up to take on many roles. OneSign seamlessly ...
The Passlogix v-GO Access Accelerator Suite includes in one group the full gamut of the v-GO line. This suite includes six components that work together ...
The Quest One Identity Solution from Quest Software is an interesting product. It can use not only an existing Active Directory structure to manage users ...
Celo from Commerce Media is a tokenless, two-factor authentication product that can be deployed either as an in-house or hosted solution.
BlackShield ID is a web services based strong authentication server providing integrated provisioning and management.
Deepnet Security Limited’s Unified Authentication Platform v3.11 is a single integrated security platform for provisioning, managing and verifying all types of user and host authentication ...
For organizations challenged with securing removable media, the Stealth MXP provides an easy-to-use answer.
The Defender v5.3 from Quest Software provides strong two-factor authentication through a variety of token options.
Rohos Logon Key v2.5 converts any USB flash drive into a security token for a computer, and it allows access to a Windows or Mac ...
The RSA SecurID Appliance, running the RSA Authentication Manager software v7.1, provides centralized authentication while administering and managing policies for the enterprise.
StrikeForce Technologies ProtectID is a multifactor authentication platform using out-of-band phone (PIN, OTP via SMS, OTP via voice), OTP via email, hard token and OATH ...
Aladdin’s eToken PRO is a strong and cost-effective two-factor authentication password management solution.
Entrust IdentityGuard v9.1 provides an enterprise platform enabling strong authentication for the Windows desktop, remote access deployments, as well as VPN and web-based applications.
The notion of true multifactor authentication is based on the concept of combining into a single authentication mechanism something you have, something you know and ...
As we work our way through this rocky economic climate, establishing security in a way that ensures trust is going to be critical in maintaining ...
We're always happy to hear from you, our readers. Please send your comments, praise or criticisms to scfeedbackUS@haymarketmedia.com. We reserve the right to edit letters.
SC Magazine Articles
- Three zero-days found in iOS, Apple suggests users update their iPhone
- MedSec goes its own way with medical device flaw
- Juniper confirms leaked "NSA exploits" affect its firewalls, no patch released yet
- Ransomware: The evolution of cybercrime, a roundtable
- Researchers find seven classes of vulnerabilities in iOS sandbox security feature
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Wendy's POS breach 'considerably' bigger than first thought
- No hacking required: Israeli researchers show how to steal data through PC components
- Don't connect your charging cell to a computer or you may get hacked!
- Six senators urge Obama to prioritize cybercrime at G20 summit
- Creating a buzz: USBee software causes air-gapped computers to leak data via USB connections
- Privacy advocates upset over FAA drone regulations, citizen takes action
- Voter database hack in Illinois by foreign intruder compromises info of 200K
- Fantom and FairWare ransomware discovered