February 2010 Issue of SCMagazine
Awareness training really can help to make security a part of corporate cultures.
eEye Digital Security, provider of vulnerability management solutions, has appointed Kevin Hickey to CEO.
Symantec has partnered with Message Systems to combine their offerings.
The Messaging Anti-Abuse Working Group (MAAWG) has formed liaisons with the Internet Engineering Task Force and BITS.
Solutionary has teamed up with e-Cop to offer a suite of security and compliance services.
Shavlik Technologies has announced a renewed partnership with Numara Software to integrate its patch management technology into Numara Patch Manager.
FireEye, maker of network security solutions, has appointed Marc Maiffret as chief security architect.
BrinQa has named Bob Gleason director of sales for the eastern and federal regions.
Sophos has partnered with bit.ly to provide visibility into infected websites.
eEye Digital Security, provider of integrated security and vulnerability management solutions, has appointed Kevin Hickey to CEO. Hickey is the former CEO at NetPro Computing, ...
Symantec has partnered with Message Systems, provider of message management solutions and services, to combine their offerings into a suite of message security and management ...
The Messaging Anti-Abuse Working Group (MAAWG) has formed liaisons with the Internet Engineering Task Force (IETF) and BITS, a division of the Financial Services Roundtable, ...
Solutionary, provider of managed security services, has teamed up with Singapore-based e-Cop to offer a suite of security and compliance services. The companies will offer ...
Shavlik Technologies has announced a renewed partnership with Numara Software, provider of service and asset management offerings, to integrate its patch management technology into Numara ...
FireEye, maker of network security solutions, has appointed Marc Maiffret as chief security architect. Maiffret formerly served as the co-founder and CTO of eEye Digital ...
Brinqa, provider of governance, risk and compliance solutions, has named Bob Cleason director of sales for the eastern and federal regions. He will be tasked ...
Sophos, maker of anti-malware solutions, has partnered with bit.ly, a utility for shortening, sharing and tracking links, to provide visibility into infected websites through its ...
Threat of the month
2 minutes on
After months of talks with Visa, Best Buy has stopped accepting Visa's contactless debit card.
Skills in Demand
With the explosion of cybercrimes, it is no surprise that computer forensics investigators are in hot demand.
Me and my job
Profiles of IT administrators at end-user companies.
Debate: Software vendors should "partner" with pirates to fight unlicensed software use.
The majority of smart grid mesh networks present critical vulnerabilities in performance, management and especially security
2009 will be remembered as the year software-as-a-service (SaaS) evolved from a technology phenomenon into a mass-market business tool.
A new security paradigm is necessary - one rooted in the practical day-to-day concerns of protecting massive infrastructure for essential national services.
Organizations must educate end-users, says Dan Beard, chief administrative officer of the House of Representatives, reports Dan Kaplan.
When the FBI's Steven Chabinsky spoke recently to Congress, he shared a harrowing message, reports Angela Moscaritolo.
Considering the economic climate, 2009 was not terribly gloomy for the IT security space, and 2010 looks even better, reports Dan Kaplan.
An explosion in smartphones, laptops, USB sticks and other portable devices has brought new security challenges, reports Greg Masters.
At an SC Magazine Government Roundtable, much of the discussion focused on how to improve FISMA, reports Illena Armstrong.
This month you'll find answers to some important questions about the direction of both vulnerability assessment and patch management tools.
Group Test 1
Security Configuration and Vulnerability Management from BixFix goes beyond standard vulnerability management.
Core Impact is back again with a new version (Professional 10), and just when we thought this product could not get any more powerful it ...
The Retina Network Security Scanner from eEye Digital Security provides cross-platform vulnerability management.
GFI LANguard is a tool that provides comprehensive vulnerability scanning along with several built-in scanning profiles to offer install-and-play capability.
Lumension Scan is a component of the larger Lumension Vulnerability Management suite.
The McAfee Vulnerability Manager is a powerful appliance-based tool that provides vulnerability assessment, penetration testing and web application scanning along with rogue device detection and ...
SecureScout from netVigilance is a powerful vulnerability scanner packed into a surprisingly simple-to-use application.
NeXpose Enterprise Edition returns to our Group Test reviews and is now packed with features, including the ability to scan a multitude of places in ...
SAINT Scanner and SAINT Exploit are two products brought into one place for a powerhouse combination.
The professional version of the open source standard is here with a new version and new features.
BigFix Patch Management is a client server patching solution that integrates with the company's asset discovery, configuration management, endpoint protection and vulnerability management technologies to ...
Group Test 2
Novell ZENworks Patch Management is a solution that helps to analyze endpoints and deploy patches across multiple platforms in an enterprise.
Numara Patch Manager 9.1.1 is one of eight modules integrated into the Numara Asset Management Platform (AMP) solution.
Shavlik NetChk Protect 7.2 is an enterprise patch management solution based on a client-server architecture.
ZOHO Corp.’s ManageEngine Security Manager Plus (Standard Edition) is a pure-play patch management system which allows you to manage the assessment and deployment of both ...
A bird’s eye view into enterprise security configuration.
Enterprises understand their reputation is on the line when things go wrong, says Jeremiah Grossman.
SC Magazine Articles
- Yahoo breach; State-sponsored actors suspected, at least 500 million accounts affected
- Cybercriminals already able to hack ATM biometric readers
- 185M incidents bypassed perimeter defenses - report
- OVH suffers massive 1.1Tbps DDoS attack
- IoT assault, connected devices increasingly used for DDoS attacks
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- CEO sacked after aircraft company grounded by whaling attack
- DōTERRA breach exposes customer info; including SS, DOB, and addresses
- UPDATE: Petya ransomware leverages Dropbox and overwrites hard drives
- Some U.S. Bancorp workers' W-2 info exposed in ADP data breach
- End-of-support devices on networks weakening cyberdefenses, report
- Android.Lockerscreen using pseudorandom passcodes to ensure payouts
- FBI investigating hacked mobile phones of Democratic officials
- 70% of IDTMs want UK gov to do more so young people enter tech field
- 69% of office professionals in the UK hoard data