February 2011 Issue of SCMagazine
No matter your view of Julian Assange, his WikiLeaks controversy is the story that just keeps on giving, says Illena Armstrong, editor-in-chief, SC Magazine.
A summary of what made news in January.
Debate: The model of 'trust but verify' is effective at mitigating the insider threat.
Company news: Verizon names Marcus Sachs as VP for national security policy, and other announcements
Threat of the month
2 minutes on
The temporary takedown in December of a handful of websites that cut ties with controversial website WikiLeaks, including Visa and MasterCard, made national news.
Skills in Demand
Companies are becoming increasingly concerned about the security of smartphones and tablets.
Me and my job
There are so many threats to deal with, says Michael Singer, executive director of security technology for AT&T Services.
Consumers have adopted personalized applications of all varieties, yet the way things stand, they must be prepared to sacrifice something at least as valuable: their ...
What does the $4 billion network security industry do when a new attack is exposed? It plays "the great malware cover-up."
The security chief of Zynga offers tips for deterring today's sophisticated attacks. They include understanding attack vectors, quantifying risk, controlling damage and being a trusted ...
Thanks to WikiLeaks and a struggling economy, the internal threat has risen to a new level of prominence. Dawn Cappelli of Carnegie Mellon describes the ...
The $1 trillion cybercrime industry is expertly - and competitively - run. Take a peek into the inner workings of these syndicates and how the ...
Still facing budgetary pressures, security execs must apply unique thinking to security spend, which might mean studying metrics, making friends and passing compliance on the ...
The idea of managing intrusions is a complicated one that it would be good to simplify if we can.
Group Test 1
Core Impact Professional is, at first blush, an extremely capable pen testing tool. But it really is a lot more.
FusionVM from Critical Watch provides a full-featured vulnerably management and configuration auditing platform that can be customized to manage vulnerabilities throughout the enterprise.
The DragonSoft Vulnerability Manager provides network scanning, vulnerability evaluation, centralized risk assessment, reports and remediation in one easy-to-use tool.
This scanner takes the combination of the Retina Network Security Scanner and the Retina Insight reporting module and puts them together in a full Compliance ...
With this product, administrators can quickly launch scans, analyze the results and deploy suggested remediation to vulnerable machines throughout the enterprise – all from one ...
With Lumension Scan, administrators can easily run comprehensive vulnerability and configuration assessment scans across the entire network environment.
This application can run vulnerability scans, detect open ports, run patch management and manage changes to Windows files, folders and registries.
The McAfee Vulnerability Manager provides a full vulnerability management tool for the large enterprise.
The Internal Scan – Cloud Edition from netVigilance provides vulnerability assessment from the outside looking in.
This appliance brings all the features of SAINTscanner, SAINTexploit and SAINTmanager into one box that is ready to go right off the shelf.
This product has been designed to scan for vulnerabilities and to try to penetrate them.
A lightweight, no-frills network vulnerability scanner.
Group Test 2
The APS from CounterSnipe is a combination of intrusion prevention software, host/application discovery, vulnerability detection and intelligent alert management.
This network intrusion prevention system delivers inline threat prevention and detection capabilities through a combination of protocol discovery and analysis, heuristics, behavior analysis and cloud-based ...
An intelligent packet-filtering system that detects sophisticated network intrusion attempts and actively records and/or stops such attempts.
A distributed appliance-based offering modeled on the Snort detection engine.
A standalone, purpose-built IPS.
ActivIdentity 4TRESS Authentication Appliance for Banking v 7.0
Mobile threats will soon be used to gain access to personal and business devices, says Sean Martin.
Sign up to our newsletters
SC Magazine Articles
- Long list of devices believed to be affected by NetUSB vulnerability
- Website observed serving 83 executable files, more than 50 percent malware
- Scammers target oil companies with sneaky attack
- CareFirst BlueCross BlueShield breached, more than one million individuals notified
- TeslaCrypt used to extort over $76K in recent months
- Hackers exploit Starbucks auto-reload feature to steal from customers
- Study: Nearly all SAP systems remain unpatched and vulnerable to attacks
- Former Nuclear Regulatory Commission employee arrested for alleged spear phishing campaign
- Millions of WordPress websites vulnerable to XSS bug
- FireEye first cybersecurity firm awarded DHS SAFETY Act certification
- FTC gives thumbs up to companies that cooperate during breach probes
- Researchers publish developer guidance for medical device security
- Senate gears up for Saturday USA Freedom Act vote; House breaks for recess
- Researchers observe SVG files being used to distribute ransomware
- Federal prosecutors charge Chinese nationals with trade secret theft