July 2013 Issue of SCMagazine
From botnets and cyber attacks on the retail industry, to in-depth reporting on privacy today, our July issue is filled with insightful news.
There's a larger story than Edward Snowden, the 29-year-old whistleblower who released classified documents that contained details about the NSA's massive surveillance of U.S. citizens.
Hackers ransacked the servers of Drupal.org, international authorities shut down Liberty Reserve, and other news around the security industry.
M&A activity and personnel announcements around the security industry, including the acquisitions of Websense and Vigilant, Secunia's new CEO, and more.
Threat of the month
July's "threat of the month" is SCADA "sport fishing," which could enable attackers to manipulate a water supply and make it undrinkable.
2 minutes on
As journalists come under attack from the government, an encrypted online dropbox co-created by the late Aaron Swartz can ensure anonymity.
Skills in Demand
There is increased demand for defensive-minded security pros with the ability to manage perimeter security technologies. These roles can be found in security teams that ...
Me and my job
For this month's "Me and My Job" we speak with Stephen Fridakis, senior IT security officer for the Food and Agriculture Organization of the United ...
Experts in this month's debate discuss Java. Is it time to stop using the popular software?
Targeted attacks are easy and cheap, but not always anonymous, says Norman ASA's Snorre Fagerland.
There is no doubt that threats have evolved from vandalism and hobby-based malware to financially motivated crime and now state-sponsored espionage and attacks against government ...
Our educational institutions continue to set the pace in BYOD.
Cyber attacks continue to grow and evolve in sophistication. Consequently, it's sometimes difficult to tell who the good guys are when everyone is in the ...
Thanks to willing accomplices and easy-to-use technology, the threat from linked computers is expanding, reports Karen Epper Hoffman.
Technological vulnerability and valuable data make retailers the latest target for malware attacks, says Jenny Craig CIO Abe Lietz. Karen Epper Hoffman investigates.
A battle rages between advertisers and privacy advocates over access to online behavior. Ryan Goldberg reports.
Speak in business terms and convey risk when attempting to gain funding for implementations from management, reports Stephen Lawton.
An organizing solution was found to manage mobile devices being used in Florida's Hillsborough School District, reports Greg Masters.
Securing mobile devices - and, by extension, our enterprises - is the topic of this month's Group Test.
Group Test 1
Acronis activEcho provides document-sharing features, and hosts everything within one’s own private network.
The BEAM Mobility Platform from Bitzer Mobile allows IT departments to enforce data leakage protection policies while offering secure access to internal applications – without ...
Incorporating 256-bit AES encryption, two-factor authentication support and a secure sandbox model into an easy-to-deploy application, SafeZone is a great choice for administrators who want ...
Combining full mobile device management (MDM) with end-to-end encryption, Good for Enterprise from Good Technology offers an expansive suite of products, which allow administrators to ...
Kaspersky Security 10 for Mobile integrates mobile device management into the company’s security suite.
TrustCall for iPhone from KoolSpan offers hardware-based encrypted calling between off-the-shelf iPhones.
The MECS Server provides full-on, tamper-proof firewall and compliance policy that is pushed down to mobile devices connected either via mobile network or Wi-Fi.
ZENworks Mobile Management from Novell allows for full control of a mobile device from both a security and policy perspective.
Sophos Mobile Control provides a full set of features and functionality for management and control of a broad range of mobile devices.
Authentify has a good solution that addresses security and simplicity of management.
To defend against evolving threats, prepare and maintain vigilance, says DTCC's Parthiv Shah.