January 2013 Issue of SCMagazine
As we start 2013 off, I'm pretty sure that information security leaders everywhere are glad to hear all those predictions about their budgets getting a ...
This month's news briefs include President Obama issuing guidance for the information security threat posed by insiders, charges in Butterfly botnet case and hack of ...
Debate: Bug bounty programs - offering monetary rewards to researchers - help make companies more secure.
The first "Threat of the Month" for 2013 are virtualized application vulnerabilities.
Vormetric's new CEO, Apple's newest security researcher, and more of the latest security company news.
2 minutes on
Stretched across websites, carefully placed beside content and at times popping out of nowhere to steal one's attention, we can run from online advertisements, but ...
Skills in Demand
As threats grow in complexity, many organizations rely on managed security service providers to handle security operations center (SOC) capabilities.
Me and my job
This issue's "Me and my job," features Alex Nehlebaeff, information security manager at Harley-Davidson Financial Services.
The proposed Cyber Intelligence Sharing and Protection Act (CISPA) is galvanizing government and industry over whether we need federally mandated security legislation and what it ...
Bring-your-own-device (BYOD) has emerged as an institution in corporate America today - but does the acronym stand for bring your own device or bring your ...
If no one can guarantee an organization is hack-proof, then perhaps it's time for a more practical approach - cyber liability insurance.
For those organizations at risk to a nation-state attack, preparation should come with the expectation of compromise, as well as knowledge that the damage can ...
Cloud computing still is trying to overcome the trust and reliability issues that has made it a questionable proposition for many organizations.
Compliance brings with it the stigma of cost, complexity and confusion, but viewing it from a risk point-of-view may help make it more tolerable.
Rodney Dangerfield couldn't get any respect, and neither can CISOs, who still struggle for recognition within the C-suite. But ignore them at your own risk, ...
A highly regulated debt collector from the U.K. needed to achieve compliance, but it wanted to scrap all of the point solutions on which it ...
The notion of authentication is one that is so familiar to most of us that it hardly bears discussing. Or does it?
Group Test 1
With its DualShield, Deepnet Security offers a product that can add that extra layer of security to those applications – at a reasonable price point.
As long as one is using Active Directory, DigitalPersona Pro Enterprise may just be the solution for large-scale deployment of multifactor authentication services.
With its IdentityGuard product, Entrust integrates physical and logical, mobile and cloud security, all at a surprisingly low price point.
Companies looking for a turn-key, out-of-band authentication solution need look no further than PhoneFactor.
The SafeNet Authentication Service offers an entirely cloud-based multifactor authentication platform for the enterprise.
The Swivel Appliance from Swivel Secure is driven by PINsafe, which allows users to combine PINs with randomly generated security strings to provide robust strong ...
The IDENTIKEY Authentication Server and DIGIPASS GO 7 from VASCO pair together to provide solid, out-of-the-box, strong authentication to applications throughout the enterprise environment.
TeleSign 2FA is a full application programming interface (API) and software development kit (SDK) that allows an enterprise to integrate two-factor authentication into its existing ...
DesktopDirect is a simple - though not at all simplistic - RDP gateway.
If we want the best minds, we can no longer look to only half the population, says Karen Purcell.
Sign up to our newsletters
SC Magazine Articles
- State breakdowns: Anthem breach by the numbers
- Malware on Lime Crime website, payment cards compromised
- Florida law enforcement docs show widespread stingray use, secrecy
- Botnet of Joomla servers furthers DDoS-for-hire scheme
- Bug in popular WordPress plugin opens up websites to SQL injection attacks
- State breakdowns: Anthem breach by the numbers
- Carbanak APT campaign made off with $1B from banks globally
- BMW issues security patch for bug allowing attackers physical access into vehicles
- NIST requests final comments on ICS security guide
- Disconnect yawns between CISOs, exec leadership, study says
- Natural Grocers investigating unauthorized access to POS systems
- Proposed Consumer Privacy Bill of Rights Act doesn't go far enough, critics say
- Data at risk for about 50,000 current and former Uber drivers
- North Carolina credit union notification says laptop containing data missing
- Skills in demand: Application security engineers