January 2014 Issue of SCMagazine
This month's issue includes features on cloud security, emerging threats, and more insight from industry experts.
Privacy, as some of us once knew it, is a thing of the past, says Illena Armstrong, VP, editorial, SC Magazine.
The latest news and updates from PCI Security Standards Council, CryptoLocker, Edward Snowden and more.
This month's company news features new hires at Verizon Enterprise Solutions and Coalfire Systems, as well as acquisitions by Oracle and Trustwave.
Threat of the month
January's threat of the month is credentials theft, where cyber criminals seek user credentials that will enable access to valuable systems and resources.
2 minutes on
The increasing number of breaches continues to create awareness at enterprises that are increasingly bulking up their security programs.
Skills in Demand
As organizations leverage large data-sets to drive business, the legal and ethical lines around privacy are blurred. Addressing privacy and security issues around Big Data ...
Me and my job
This month's "me and my job" focuses on John Dickson, principal at Denim Group.
In this month's debate, experts discuss whether more guidance on security career opportunities for youths will alleviate the skills gap.
As more and more organizations fall victim to data leakage, it seems that as long as no financial data is compromised, consumers seemingly don't care.
Network-connected-and-configured devices can be infected by malware that provides access to patient data, monitoring systems and implanted patient devices.
I enjoy conducting security awareness training as it allows me to emphasize the importance of security to the organization, says David Sheidlower, CISO, Health Quest ...
The cloud offers reliability, cost savings and convenience, but protecting it requires modern-day defenses, reports Jim Romeo.
As attacks grow more sophisticated, some security budgets are rising...but others are not, reports Alan Earls.
We brought our one-day conference and expo back to the Windy City: Expert speakers, top vendors...and all that jazz.
The CISO role is now working with lines of business, says Arthur Lessard, CISO, Universal Music Group. Karen Epper Hoffman reports.
A critical infrastructure company in Northern California gained visibility into its network...while securing its clients, reports Greg Masters.
We're off to another year. I read recently where one security maven is referring to 2014 as the "Year of Cryptolocker."
Group Test 1
DualShield v5.7 from Deepnet Security is an authentication platform using multifactor and biometric authentication techniques.
Entrust IdentityGuard is a multifactor authentication tool that allows users to employ soft tokens, physical hardware tokens, and more.
This product offers a wide variety of strong authentication measures for several services and online applications.
The IronKey F200 Biometric Flash Drive by Imation comes in several sizes for different uses.
The strongest aspects of this product were its support, functionality and ease of use.
The SafeNet Authentication Service is overall a great product. We particularly found its functionality, set up and documentation to be strong.
SecureAuth IdP is a good choice for an authentication solution because it supports a variety of multi-platform authentication devices and the server can be setup ...
SecurEnvoy’s SecurAccess is a product for authentication using multifactor and/or biometrics.
The Swivel Appliance from Swivel Secure provides strong authentication in a variety of ways.
VASCO IDENTIKEY Authentication Server and DIGIPASS GO in combination are a physical token-based authentication tool.
iScan uses a really neat approach to vulnerability and PAN (looking for credit card, etc.) scanning.
The malicious insider or outsider does not stop on the first attempt, says Verdasys' Peter Tyrrell.
Sign up to our newsletters
SC Magazine Articles
- Zero-day in Fiat Chrysler feature allows remote control of vehicles
- 'GSMem' malware designed to infiltrate air-gapped computers, steal data
- All smartwatches are vulnerable to attack, finds study
- Fake games in Google Play redirect Android users to porn sites
- Apple App Store and iTunes buyers hit by zero-day
- United reportedly hacked by same group that breached Anthem, OPM
- HAMMERTOSS malware represents culmination of 'best practices' for cyber attackers
- Hundreds of Massachusetts General Hospital patients notified of data incident
- Majority of Android devices vulnerable to denial-of-service bug
- Security concerns raised at Windows 10 roll-out