January 2012 Issue of SCMagazine
Jan. 2012 issue
Nearly two-thirds of respondents to our fifth annual "Guarding Against a Data Breach" survey say their budgets related to IT security and data protection will ...
News briefs: HP LaserJet printers faulted, massive data breach at Sutter Health, Twitter purchased Whisper Systems, etc.
A flaw discovered in HP LaserJet printers could allow attackers to steal documents, a water utility pump failure was not the result of a cyber ...
2 minutes on
A recent string of alarming incidents highlights glaring shortcomings in the security of the nation's critical infrastructure.
Skills in Demand
Companies are moving into the cloud. As a result, demand for cloud security architects and engineers is growing.
Me and my job
Kevin Sanchez-Cherry, Office of the Chief Information Officer, U.S. Department of Education
When Apple announced iCloud at its Worldwide Developers Conference last June, it set acolytes abuzz with anticipation.
When it comes to real-time threats, if your executives expect you to prevent all breaches, you're overdue for a talk.
The Stop Online Piracy Act (SOPA) would block access to rogue websites without hampering security.
Michael Evans VP of marketing at Mandiant, Stuart McClure named worldwide chief technology officer at McAfee, and other announcements.
It's vital to understand how to talk about security to senior executives in order to prevent a data breach, says Dan Srebnick, CISO of the ...
Stealthy, targeted attacks are real -- as evidenced by operations such as Shady RAT and Stuxnet -- and there isn't a one-size-fits-all remedy to deal ...
Sometimes a little bit of competition is what it takes to get students on the path to careers in security. Software engineer Alex Levinson, who ...
Security conversations are as audible as ever, yet budgets remain largely flat. However, an expected influx of compliance audits may serve as the driver for ...
Data security measures have a long, storied history of meeting their demise on Capitol Hill. But two proposals have the bipartisan support that give them ...
Here at the SC Lab, we have been preparing for an exciting 2012 as we somewhat change up the format of our product pages. Owing to ...
Group Test 1
ActivIdentity 4TRESS Authentication Appliance FT2011 is a versatile server providing strong authentication to a wide range of services and online applications.
The Cryptocard Blackshield Server v3.1 is designed as an authentication service delivery platform, automating all tasks around user and token management, provisioning, reporting and billing.
DualShield v5.2 from Deepnet Security is a unified authentication platform, using the versatile authentication server model.
DigitalPersona Pro Enterprise v5.2 is a centrally managed suite of solutions – access management, data protection and secure communications – that protect data and control ...
IdentityGuard from Entrust offers a plethora of multifactor authentication methods that can be used throughout the enterprise, as well as for customer-facing web applications, such ...
PhoneFactor provides the addition of second-factor authentication using something everyone has: This product uses a phone as a token.
This product leverages an already existing Microsoft Active Directory or LDAP (lightweight directory access protocol) structure to add multifactor authentication to a host of services ...
The PINsafe from Swivel Secure takes a user’s fixed personal identification number and randomly generates a one-time login code that is sent to the user ...
The Digipass Go 7 and Identikey Server from Vasco Data Security work together to provide strong multifactor authentication throughout the enterprise.
The NetClarity NACWall Nano is NAC on steroids, sized and priced for small and midsize businesses (SMBs).
It's time to rethink the basic approach to protecting our businesses, and new technologies are leading the way, says Cisco CSO John Stewart.
SC Magazine Articles
- Yahoo breach; State-sponsored actors suspected, at least 500 million accounts affected
- Education sector bullied by ransomware and can barely defend itself, report
- Cisco warns of exploitation of new flaws linked to Shadow Brokers exploits
- DetoxCrypto ransomware imitates Malwarebytes software
- House Committee urges Obama not to pardon Snowden
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Hard Rock Hotel & Casino Las Vegas hit with POS breach
- X-ray and MRI machines among devices used as springboards for data breach attacks
- Brexit shakeup: How will the U.K.'s exit from the EU affect the technology sector?
- Hacker purportedly selling over 650,000 stolen medical records on dark web marketplace