February 2011 Issue of SCMagazine
No matter your view of Julian Assange, his WikiLeaks controversy is the story that just keeps on giving, says Illena Armstrong, editor-in-chief, SC Magazine.
A summary of what made news in January.
Debate: The model of 'trust but verify' is effective at mitigating the insider threat.
Company news: Verizon names Marcus Sachs as VP for national security policy, and other announcements
Threat of the month
2 minutes on
The temporary takedown in December of a handful of websites that cut ties with controversial website WikiLeaks, including Visa and MasterCard, made national news.
Skills in Demand
Companies are becoming increasingly concerned about the security of smartphones and tablets.
Me and my job
There are so many threats to deal with, says Michael Singer, executive director of security technology for AT&T Services.
Consumers have adopted personalized applications of all varieties, yet the way things stand, they must be prepared to sacrifice something at least as valuable: their ...
What does the $4 billion network security industry do when a new attack is exposed? It plays "the great malware cover-up."
The security chief of Zynga offers tips for deterring today's sophisticated attacks. They include understanding attack vectors, quantifying risk, controlling damage and being a trusted ...
Thanks to WikiLeaks and a struggling economy, the internal threat has risen to a new level of prominence. Dawn Cappelli of Carnegie Mellon describes the ...
The $1 trillion cybercrime industry is expertly - and competitively - run. Take a peek into the inner workings of these syndicates and how the ...
Still facing budgetary pressures, security execs must apply unique thinking to security spend, which might mean studying metrics, making friends and passing compliance on the ...
The idea of managing intrusions is a complicated one that it would be good to simplify if we can.
Group Test 1
Core Impact Professional is, at first blush, an extremely capable pen testing tool. But it really is a lot more.
FusionVM from Critical Watch provides a full-featured vulnerably management and configuration auditing platform that can be customized to manage vulnerabilities throughout the enterprise.
The DragonSoft Vulnerability Manager provides network scanning, vulnerability evaluation, centralized risk assessment, reports and remediation in one easy-to-use tool.
This scanner takes the combination of the Retina Network Security Scanner and the Retina Insight reporting module and puts them together in a full Compliance ...
With this product, administrators can quickly launch scans, analyze the results and deploy suggested remediation to vulnerable machines throughout the enterprise – all from one ...
With Lumension Scan, administrators can easily run comprehensive vulnerability and configuration assessment scans across the entire network environment.
This application can run vulnerability scans, detect open ports, run patch management and manage changes to Windows files, folders and registries.
The McAfee Vulnerability Manager provides a full vulnerability management tool for the large enterprise.
The Internal Scan – Cloud Edition from netVigilance provides vulnerability assessment from the outside looking in.
This appliance brings all the features of SAINTscanner, SAINTexploit and SAINTmanager into one box that is ready to go right off the shelf.
This product has been designed to scan for vulnerabilities and to try to penetrate them.
A lightweight, no-frills network vulnerability scanner.
Group Test 2
The APS from CounterSnipe is a combination of intrusion prevention software, host/application discovery, vulnerability detection and intelligent alert management.
This network intrusion prevention system delivers inline threat prevention and detection capabilities through a combination of protocol discovery and analysis, heuristics, behavior analysis and cloud-based ...
An intelligent packet-filtering system that detects sophisticated network intrusion attempts and actively records and/or stops such attempts.
A distributed appliance-based offering modeled on the Snort detection engine.
A standalone, purpose-built IPS.
ActivIdentity 4TRESS Authentication Appliance for Banking v 7.0
Mobile threats will soon be used to gain access to personal and business devices, says Sean Martin.
Sign up to our newsletters
SC Magazine Articles
- State breakdowns: Anthem breach by the numbers
- Malware on Lime Crime website, payment cards compromised
- Botnet of Joomla servers furthers DDoS-for-hire scheme
- Bug in popular WordPress plugin opens up websites to SQL injection attacks
- Report: Majority of health-related websites leak data to third parties
- State breakdowns: Anthem breach by the numbers
- Carbanak APT campaign made off with $1B from banks globally
- NIST requests final comments on ICS security guide
- Disconnect yawns between CISOs, exec leadership, study says
- Microsoft phishing emails target corporate users, deliver malware that evades sandboxes
- Infections caused by prevalent financial trojans dropped 53 percent last year
- Spammers leverage DMARC to more successfully distribute ransomware
- Laptop stolen from employee contained data on Pioneer Bank customers
- In growing market for genetic data, privacy implications prove lasting
- Natural Grocers investigating unauthorized access to POS systems