January 2014 Issue of SCMagazine
This month's issue includes features on cloud security, emerging threats, and more insight from industry experts.
Privacy, as some of us once knew it, is a thing of the past, says Illena Armstrong, VP, editorial, SC Magazine.
The latest news and updates from PCI Security Standards Council, CryptoLocker, Edward Snowden and more.
This month's company news features new hires at Verizon Enterprise Solutions and Coalfire Systems, as well as acquisitions by Oracle and Trustwave.
Threat of the month
January's threat of the month is credentials theft, where cyber criminals seek user credentials that will enable access to valuable systems and resources.
2 minutes on
The increasing number of breaches continues to create awareness at enterprises that are increasingly bulking up their security programs.
Skills in Demand
As organizations leverage large data-sets to drive business, the legal and ethical lines around privacy are blurred. Addressing privacy and security issues around Big Data ...
Me and my job
This month's "me and my job" focuses on John Dickson, principal at Denim Group.
In this month's debate, experts discuss whether more guidance on security career opportunities for youths will alleviate the skills gap.
As more and more organizations fall victim to data leakage, it seems that as long as no financial data is compromised, consumers seemingly don't care.
Network-connected-and-configured devices can be infected by malware that provides access to patient data, monitoring systems and implanted patient devices.
I enjoy conducting security awareness training as it allows me to emphasize the importance of security to the organization, says David Sheidlower, CISO, Health Quest ...
The cloud offers reliability, cost savings and convenience, but protecting it requires modern-day defenses, reports Jim Romeo.
As attacks grow more sophisticated, some security budgets are rising...but others are not, reports Alan Earls.
We brought our one-day conference and expo back to the Windy City: Expert speakers, top vendors...and all that jazz.
The CISO role is now working with lines of business, says Arthur Lessard, CISO, Universal Music Group. Karen Epper Hoffman reports.
A critical infrastructure company in Northern California gained visibility into its network...while securing its clients, reports Greg Masters.
The malicious insider or outsider does not stop on the first attempt, says Verdasys' Peter Tyrrell.
We're off to another year. I read recently where one security maven is referring to 2014 as the "Year of Cryptolocker."
Group Test 1
DualShield v5.7 from Deepnet Security is an authentication platform using multifactor and biometric authentication techniques.
Entrust IdentityGuard is a multifactor authentication tool that allows users to employ soft tokens, physical hardware tokens, and more.
This product offers a wide variety of strong authentication measures for several services and online applications.
The IronKey F200 Biometric Flash Drive by Imation comes in several sizes for different uses.
The strongest aspects of this product were its support, functionality and ease of use.
The SafeNet Authentication Service is overall a great product. We particularly found its functionality, set up and documentation to be strong.
SecureAuth IdP is a good choice for an authentication solution because it supports a variety of multi-platform authentication devices and the server can be setup ...
SecurEnvoy’s SecurAccess is a product for authentication using multifactor and/or biometrics.
The Swivel Appliance from Swivel Secure provides strong authentication in a variety of ways.
VASCO IDENTIKEY Authentication Server and DIGIPASS GO in combination are a physical token-based authentication tool.
iScan uses a really neat approach to vulnerability and PAN (looking for credit card, etc.) scanning.
Sign up to our newsletters
SC Magazine Articles
- APT operation 'Double Tap' exploits serious Windows OLE bug
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Android malware 'NotCompatible' evolves, spawns resilient botnet
- Vulnerabilities identified in three Advantech products
- The Internet of Things (IoT) will fail if security has no context
- Operators disable firewall features to increase network performance, survey finds
- DDoS attacks cost organizations $40,000 per hour, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Study: 'High priority' issues hamper endpoint security solution implementation
- Researchers identify POS malware targeting ticket machines, electronic kiosks
- Pirated Joomla, WordPress, Drupal themes and plugins contain CryptoPHP backdoor
- DDoS attacks grew in size, threats became more complex, Q3 reports say
- Man gets 18 months in prison for accessing Subway POS devices, loading up gift cards