January 2013 Issue of SCMagazine
As we start 2013 off, I'm pretty sure that information security leaders everywhere are glad to hear all those predictions about their budgets getting a ...
This month's news briefs include President Obama issuing guidance for the information security threat posed by insiders, charges in Butterfly botnet case and hack of ...
Debate: Bug bounty programs - offering monetary rewards to researchers - help make companies more secure.
The first "Threat of the Month" for 2013 are virtualized application vulnerabilities.
Vormetric's new CEO, Apple's newest security researcher, and more of the latest security company news.
2 minutes on
Stretched across websites, carefully placed beside content and at times popping out of nowhere to steal one's attention, we can run from online advertisements, but ...
Skills in Demand
As threats grow in complexity, many organizations rely on managed security service providers to handle security operations center (SOC) capabilities.
Me and my job
This issue's "Me and my job," features Alex Nehlebaeff, information security manager at Harley-Davidson Financial Services.
The proposed Cyber Intelligence Sharing and Protection Act (CISPA) is galvanizing government and industry over whether we need federally mandated security legislation and what it ...
Bring-your-own-device (BYOD) has emerged as an institution in corporate America today - but does the acronym stand for bring your own device or bring your ...
If no one can guarantee an organization is hack-proof, then perhaps it's time for a more practical approach - cyber liability insurance.
For those organizations at risk to a nation-state attack, preparation should come with the expectation of compromise, as well as knowledge that the damage can ...
Cloud computing still is trying to overcome the trust and reliability issues that has made it a questionable proposition for many organizations.
Compliance brings with it the stigma of cost, complexity and confusion, but viewing it from a risk point-of-view may help make it more tolerable.
Rodney Dangerfield couldn't get any respect, and neither can CISOs, who still struggle for recognition within the C-suite. But ignore them at your own risk, ...
A highly regulated debt collector from the U.K. needed to achieve compliance, but it wanted to scrap all of the point solutions on which it ...
The notion of authentication is one that is so familiar to most of us that it hardly bears discussing. Or does it?
Group Test 1
With its DualShield, Deepnet Security offers a product that can add that extra layer of security to those applications – at a reasonable price point.
As long as one is using Active Directory, DigitalPersona Pro Enterprise may just be the solution for large-scale deployment of multifactor authentication services.
With its IdentityGuard product, Entrust integrates physical and logical, mobile and cloud security, all at a surprisingly low price point.
Companies looking for a turn-key, out-of-band authentication solution need look no further than PhoneFactor.
The SafeNet Authentication Service offers an entirely cloud-based multifactor authentication platform for the enterprise.
The Swivel Appliance from Swivel Secure is driven by PINsafe, which allows users to combine PINs with randomly generated security strings to provide robust strong ...
The IDENTIKEY Authentication Server and DIGIPASS GO 7 from VASCO pair together to provide solid, out-of-the-box, strong authentication to applications throughout the enterprise environment.
TeleSign 2FA is a full application programming interface (API) and software development kit (SDK) that allows an enterprise to integrate two-factor authentication into its existing ...
DesktopDirect is a simple - though not at all simplistic - RDP gateway.
If we want the best minds, we can no longer look to only half the population, says Karen Purcell.
Sign up to our newsletters
SC Magazine Articles
- Website observed serving 83 executable files, more than 50 percent malware
- Long list of devices believed to be affected by NetUSB vulnerability
- Scammers target oil companies with sneaky attack
- TeslaCrypt used to extort over $76K in recent months
- CareFirst BlueCross BlueShield breached, more than one million individuals notified
- Hackers exploit Starbucks auto-reload feature to steal from customers
- Study: Nearly all SAP systems remain unpatched and vulnerable to attacks
- Former Nuclear Regulatory Commission employee arrested for alleged spear phishing campaign
- Millions of WordPress websites vulnerable to XSS bug
- FireEye first cybersecurity firm awarded DHS SAFETY Act certification
- FTC gives thumbs up to companies that cooperate during breach probes
- Researchers publish developer guidance for medical device security
- Senate gears up for Saturday USA Freedom Act vote; House breaks for recess
- Researchers observe SVG files being used to distribute ransomware
- Federal prosecutors charge Chinese nationals with trade secret theft