February 2010 Issue of SCMagazine
Awareness training really can help to make security a part of corporate cultures.
eEye Digital Security, provider of vulnerability management solutions, has appointed Kevin Hickey to CEO.
Symantec has partnered with Message Systems to combine their offerings.
The Messaging Anti-Abuse Working Group (MAAWG) has formed liaisons with the Internet Engineering Task Force and BITS.
Solutionary has teamed up with e-Cop to offer a suite of security and compliance services.
Shavlik Technologies has announced a renewed partnership with Numara Software to integrate its patch management technology into Numara Patch Manager.
FireEye, maker of network security solutions, has appointed Marc Maiffret as chief security architect.
BrinQa has named Bob Gleason director of sales for the eastern and federal regions.
Sophos has partnered with bit.ly to provide visibility into infected websites.
eEye Digital Security, provider of integrated security and vulnerability management solutions, has appointed Kevin Hickey to CEO. Hickey is the former CEO at NetPro Computing, ...
Symantec has partnered with Message Systems, provider of message management solutions and services, to combine their offerings into a suite of message security and management ...
The Messaging Anti-Abuse Working Group (MAAWG) has formed liaisons with the Internet Engineering Task Force (IETF) and BITS, a division of the Financial Services Roundtable, ...
Solutionary, provider of managed security services, has teamed up with Singapore-based e-Cop to offer a suite of security and compliance services. The companies will offer ...
Shavlik Technologies has announced a renewed partnership with Numara Software, provider of service and asset management offerings, to integrate its patch management technology into Numara ...
FireEye, maker of network security solutions, has appointed Marc Maiffret as chief security architect. Maiffret formerly served as the co-founder and CTO of eEye Digital ...
Brinqa, provider of governance, risk and compliance solutions, has named Bob Cleason director of sales for the eastern and federal regions. He will be tasked ...
Sophos, maker of anti-malware solutions, has partnered with bit.ly, a utility for shortening, sharing and tracking links, to provide visibility into infected websites through its ...
Threat of the month
2 minutes on
After months of talks with Visa, Best Buy has stopped accepting Visa's contactless debit card.
Skills in Demand
With the explosion of cybercrimes, it is no surprise that computer forensics investigators are in hot demand.
Me and my job
Profiles of IT administrators at end-user companies.
Debate: Software vendors should "partner" with pirates to fight unlicensed software use.
The majority of smart grid mesh networks present critical vulnerabilities in performance, management and especially security
2009 will be remembered as the year software-as-a-service (SaaS) evolved from a technology phenomenon into a mass-market business tool.
A new security paradigm is necessary - one rooted in the practical day-to-day concerns of protecting massive infrastructure for essential national services.
Organizations must educate end-users, says Dan Beard, chief administrative officer of the House of Representatives, reports Dan Kaplan.
When the FBI's Steven Chabinsky spoke recently to Congress, he shared a harrowing message, reports Angela Moscaritolo.
Considering the economic climate, 2009 was not terribly gloomy for the IT security space, and 2010 looks even better, reports Dan Kaplan.
An explosion in smartphones, laptops, USB sticks and other portable devices has brought new security challenges, reports Greg Masters.
At an SC Magazine Government Roundtable, much of the discussion focused on how to improve FISMA, reports Illena Armstrong.
This month you'll find answers to some important questions about the direction of both vulnerability assessment and patch management tools.
Group Test 1
Security Configuration and Vulnerability Management from BixFix goes beyond standard vulnerability management.
Core Impact is back again with a new version (Professional 10), and just when we thought this product could not get any more powerful it ...
The Retina Network Security Scanner from eEye Digital Security provides cross-platform vulnerability management.
GFI LANguard is a tool that provides comprehensive vulnerability scanning along with several built-in scanning profiles to offer install-and-play capability.
Lumension Scan is a component of the larger Lumension Vulnerability Management suite.
The McAfee Vulnerability Manager is a powerful appliance-based tool that provides vulnerability assessment, penetration testing and web application scanning along with rogue device detection and ...
SecureScout from netVigilance is a powerful vulnerability scanner packed into a surprisingly simple-to-use application.
NeXpose Enterprise Edition returns to our Group Test reviews and is now packed with features, including the ability to scan a multitude of places in ...
SAINT Scanner and SAINT Exploit are two products brought into one place for a powerhouse combination.
The professional version of the open source standard is here with a new version and new features.
BigFix Patch Management is a client server patching solution that integrates with the company's asset discovery, configuration management, endpoint protection and vulnerability management technologies to ...
Group Test 2
Novell ZENworks Patch Management is a solution that helps to analyze endpoints and deploy patches across multiple platforms in an enterprise.
Numara Patch Manager 9.1.1 is one of eight modules integrated into the Numara Asset Management Platform (AMP) solution.
Shavlik NetChk Protect 7.2 is an enterprise patch management solution based on a client-server architecture.
ZOHO Corp.’s ManageEngine Security Manager Plus (Standard Edition) is a pure-play patch management system which allows you to manage the assessment and deployment of both ...
A bird’s eye view into enterprise security configuration.
Enterprises understand their reputation is on the line when things go wrong, says Jeremiah Grossman.
Sign up to our newsletters
SC Magazine Articles
- RSA Conference 2015: Prepare for the IoT before it's too late, Sorebo warns
- Study: Open Source Software use increasing in enterprises but without vulnerability monitoring
- 'Aaron's Law' returns to Congress
- RSA 2015: Tension continues to grow between govt, cryptographers
- CozyDuke APT group believed to have targeted White House and State Department
- Study: Conficker declared top threat of 2014, but N. America targeted mainly by AnglerEK
- RSA 2015: Straight talk about encryption, bulk surveillance and IoT
- RSA 2015: In the healthcare industry, security must innovate with business
- RSA 2015: Unintended use of aircraft systems next challenge for counterterrorism community
- RSA 2015: Bug hunting and responsible vulnerability disclosure