February 2011 Issue of SCMagazine
No matter your view of Julian Assange, his WikiLeaks controversy is the story that just keeps on giving, says Illena Armstrong, editor-in-chief, SC Magazine.
A summary of what made news in January.
Debate: The model of 'trust but verify' is effective at mitigating the insider threat.
Company news: Verizon names Marcus Sachs as VP for national security policy, and other announcements
Threat of the month
2 minutes on
The temporary takedown in December of a handful of websites that cut ties with controversial website WikiLeaks, including Visa and MasterCard, made national news.
Skills in Demand
Companies are becoming increasingly concerned about the security of smartphones and tablets.
Me and my job
There are so many threats to deal with, says Michael Singer, executive director of security technology for AT&T Services.
Consumers have adopted personalized applications of all varieties, yet the way things stand, they must be prepared to sacrifice something at least as valuable: their ...
What does the $4 billion network security industry do when a new attack is exposed? It plays "the great malware cover-up."
The security chief of Zynga offers tips for deterring today's sophisticated attacks. They include understanding attack vectors, quantifying risk, controlling damage and being a trusted ...
Thanks to WikiLeaks and a struggling economy, the internal threat has risen to a new level of prominence. Dawn Cappelli of Carnegie Mellon describes the ...
The $1 trillion cybercrime industry is expertly - and competitively - run. Take a peek into the inner workings of these syndicates and how the ...
Still facing budgetary pressures, security execs must apply unique thinking to security spend, which might mean studying metrics, making friends and passing compliance on the ...
The idea of managing intrusions is a complicated one that it would be good to simplify if we can.
Group Test 1
Core Impact Professional is, at first blush, an extremely capable pen testing tool. But it really is a lot more.
FusionVM from Critical Watch provides a full-featured vulnerably management and configuration auditing platform that can be customized to manage vulnerabilities throughout the enterprise.
The DragonSoft Vulnerability Manager provides network scanning, vulnerability evaluation, centralized risk assessment, reports and remediation in one easy-to-use tool.
This scanner takes the combination of the Retina Network Security Scanner and the Retina Insight reporting module and puts them together in a full Compliance ...
With this product, administrators can quickly launch scans, analyze the results and deploy suggested remediation to vulnerable machines throughout the enterprise – all from one ...
With Lumension Scan, administrators can easily run comprehensive vulnerability and configuration assessment scans across the entire network environment.
This application can run vulnerability scans, detect open ports, run patch management and manage changes to Windows files, folders and registries.
The McAfee Vulnerability Manager provides a full vulnerability management tool for the large enterprise.
The Internal Scan – Cloud Edition from netVigilance provides vulnerability assessment from the outside looking in.
This appliance brings all the features of SAINTscanner, SAINTexploit and SAINTmanager into one box that is ready to go right off the shelf.
This product has been designed to scan for vulnerabilities and to try to penetrate them.
A lightweight, no-frills network vulnerability scanner.
Group Test 2
The APS from CounterSnipe is a combination of intrusion prevention software, host/application discovery, vulnerability detection and intelligent alert management.
This network intrusion prevention system delivers inline threat prevention and detection capabilities through a combination of protocol discovery and analysis, heuristics, behavior analysis and cloud-based ...
An intelligent packet-filtering system that detects sophisticated network intrusion attempts and actively records and/or stops such attempts.
A distributed appliance-based offering modeled on the Snort detection engine.
A standalone, purpose-built IPS.
ActivIdentity 4TRESS Authentication Appliance for Banking v 7.0
Mobile threats will soon be used to gain access to personal and business devices, says Sean Martin.
SC Magazine Articles
- Yahoo breach; State-sponsored actors suspected, at least 500 million accounts affected
- Cybercriminals already able to hack ATM biometric readers
- 185M incidents bypassed perimeter defenses - report
- OVH suffers massive 1.1Tbps DDoS attack
- IoT assault, connected devices increasingly used for DDoS attacks
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- CEO sacked after aircraft company grounded by whaling attack
- DōTERRA breach exposes customer info; including SS, DOB, and addresses
- UPDATE: Petya ransomware leverages Dropbox and overwrites hard drives
- Some U.S. Bancorp workers' W-2 info exposed in ADP data breach
- Report on POS campaign provides peek into scalable tactics of cybercrime duo
- Yahoo! data breach likely exceeds 500 million records
- Boards taking more cyber seriously, driven by regulatory requirements, report finds
- Curtain closes on Ransomware Encryptor RaaS, but with master key
- BIND update fixes high-severity flaw affecting ICS, as CERT releases update to CSET tool