July 2012 Issue of SCMagazine
The latest evidence of cyber espionage weaponry could be a harbinger of nation-state assaults to come.
Flame, Stuxnet, breach at LinkedIn and other security news
Personnel moves, mergers and acquisitions and other developments at security companies.
Samantha Manke, security analyst at a leading manufacturing company
Increased innovation around cloud, Big Data and mobility has created sharp demand for experienced, security-focused product managers.
Threat of the month
Flame, aka Skywiper, is a sophisticated tool used to locate and steal data accessible from the infected computer. The malware uses multiple exploits to propagate ...
2 minutes on
While the characteristics of the spy virus are important to note, the question is why it went undetected for so long.
Featured Debate: HTML5 is eroding website security.
When it comes to the causes of data breaches in health care, don't forget human goof-ups.
The biggest problem with corporate information security programs and policies is the lack of standardized processes, uniform control points and comprehensive testing.
After some experience with the European EMV "chip-and-PIN" card system while on vacation, the city of New York's CISO learned something about security: Don't take ...
In 1854, an English physician was one of the first to use an epidemiological method to ID disease risk. Ben Sapiro of the Dominion of ...
The hospitality industry remains one of the most targeted by cyber criminals. That's why Thayer Lodging Group, which owns or operates 18 hotels, knew it ...
Firewalls have been an enterprise security mainstay for years. But with a majority of attacks now being launched against the web application layer of the ...
Many organizations are focusing their security efforts on deterring the external attack -- often at the expense of catching the insider threat. This could be ...
The loss of personally identifiable information (PII) by an organization can lead to customer loss, reputational harm, and fines, but before this data can be ...
It's not just data that is at risk with a mobile workforce, it's the whole shebang: data, applications, operating environments and, we hope, security.
Group Test 1
MobilEncrypt ENDPOINT from Echoworx provides versatile, on-device email encryption for Apple portable devices, Androids and BlackBerry handhelds.
SafeZone from Fixmo can be used to create a protected encrypted container on a user’s device that houses all business applications and email.
The Mobile Enterprise Compliance and Security Server, or MECS Server, from Mobile Active Defense (M.A.D.) offers a full suite of tools for mobile device security.
Good Technology enables consumers and enterprise users to say good riddance to the security problems surrounding today’s multitude of mobile devices.
AirWatch tackles the mobile device management conundrum head on with an integrated approach that keeps devices secure, while protecting enterprise resources from compromise.
Security solutions vendor Sophos is one of the newer players in the mobile device management market, yet has successfully created a full-featured offering that combines ...
This is a point solution to a point problem: voice call security from mobile phones. In addition, however, it has optional modules that secure text ...
Group Test 2
Echoworx Security Cloud manages credentialing throughout the enterprise, virtual or physical.
Today, this product focuses on the Salesforce application, but it is well-positioned to apply to any cloud-based application.
While it is true that there are a couple of remote scanning services available in the market, this one has some really unique plusses that ...
This is a killer app. The more we watched this one sort through the data that it was monitoring – over a million events and ...
Halo is a virtual security command-and-control center that lets one manage such security functions as firewall automation, file integrity monitoring, configuration security, vulnerability scanning and ...
With ProtectV everything in the user’s cloud is encrypted.
Expect a sea change in digital security over the coming years, says Richard Bejtlich.
Sign up to our newsletters
SC Magazine Articles
- State breakdowns: Anthem breach by the numbers
- Botnet of Joomla servers furthers DDoS-for-hire scheme
- New SSL/TLS vulnerability, FREAK, puts secure communications at risk
- Report: Majority of health-related websites leak data to third parties
- Researchers investigate link between Axiom spy group, Anthem breach
- Clinton's use of private email spawns security, transparency debate
- Android 'Gazon' worm proliferates through texts, infects more than 4k phones
- Ramirez: FTC focus on data security, fraud, cross device tracking
- Greenwald says Snowden invoked changes toward privacy
- Playing defense in ranks: Cybersecurity reimagined