January 2009 20 1 Issue of SCMagazine
After the success of our inaugural SC World Congress and Expo in December, we're kicking off 2009 on a high note.
Threat of the month
2 minutes on
Some regard a new state data breach law as a model, others see it as too strict.
Compliance expenses aren't optional, but getting more from your compliance investments is a possibility.
Security teams must be integrally involved from the beginning in a discussion about transforming the enterprise to the cloud model.
Conducting security assessments of critical service providers is an essential part of an enterprise risk management program.
A slumping economy will have a bearing on spend for safeguarding critical data in more ways than expected, reports Illena Armstrong.
With federal law enforcement veteran Kathleen Kiernan leading the way, InfraGard is ready for its coming-out party, reports Dan Kaplan.
Many experts are optimistic that the Obama administration will take positive measures in cybersecurity, reports Angela Moscaritolo.
The winners of the prestigious 2009 SC Awards U.S. will be announced on Tuesday, April 21 in San Francisco.
The SC World Congress brought together IT security thought leaders and solutions from an array of vendors.
This product integrated most of the malware solutions while providing an efficient, streamlined user-friendly offering.
This product consists of several modules. There is the ERA Server, ERA Console, ERA Mirror server and client computers running ESET AV, Server Edition or ...
The F-Secure Policy Manager was easy to use and installed in about 30 minutes. The Policy Manager was capable of managing our anti-virus and client ...
This solution provides real-time protection with files being scanned when accessed, created or modified. Protection for files, web or email content is included. Protection for ...
The LANDesk Security Suite application contained both the management suite and the client agents, which was nice. The deployment, however, was reliant on multiple server-based ...
Savant Enterprise Management System (SEMS) takes a unique approach to malware protection. The product is geared to stopping the zero-hour threats. It does this by ...
The SonicWALL Email Security solution is a purpose built appliance providing gateway email content filtering and protection from viruses, spyware, trojan horses, worms and other ...
The InterScan Web Security Virtual Appliance (IWSVA) is a gateway solution providing protection for web-based threats via HTTP and FTP. The product is delivered as ...
The Web Site Firewall Model 460 is an application protection firewall, which resides on a single appliance device.
The VPN Firewall Brick is a selective, but major upgrade over the stateful inspection firewall commonly deployed in the late 1990s. It is an appliance ...
The first conference I attended was a Check Point conference in 1996. The company pioneered stateful inspection, and it seemed that a good portion of ...
WebDefend is an application firewall that protects the organization in many ways. It takes a different approach to SSL-based traffic than most other devices.
If you’ve considered SonicWALL before and didn’t take the plunge, now is the time. This offering is an appliance-based tool, which runs on a 1U ...
This appliance-based offering runs on a 1U rack-mounted device. The Secure Firewall provides eight Ethernet interfaces, which can be separately addressed and configured. The tool ...
This completely unique offering from Applicure protects IIS- or Apache-based web servers running on a Microsoft Windows machine. However, while dotDefender has unique characteristics, many ...
The cost and technical benefits of virtualization have created an internal frenzy to move more systems to a virtual environment.
We're always happy to hear from you, our readers.
SC Magazine Articles
- Three zero-days found in iOS, Apple suggests users update their iPhone
- MedSec goes its own way with medical device flaw
- Voter databases in two states breached by foreign hackers, FBI
- Juniper confirms leaked "NSA exploits" affect its firewalls, no patch released yet
- Ransomware: The evolution of cybercrime, a roundtable
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Wendy's POS breach 'considerably' bigger than first thought
- No hacking required: Israeli researchers show how to steal data through PC components
- Don't connect your charging cell to a computer or you may get hacked!
- China allows foreign tech firms to participate in creating cybersecurity standards
- Fantom and FairWare ransomware discovered
- Six senators urge Obama to prioritize cybercrime at G20 summit
- Creating a buzz: USBee software causes air-gapped computers to leak data via USB connections
- Privacy advocates upset over FAA drone regulations, citizen takes action