June 2009 Issue of SCMagazine

June 2009 Issue of SCMagazine

June 09

Editorial

Is the CISO gaining influence?

Information security is still in its formative years. But, as executive leaders' understanding of the need to integrate security strategies into their business plans matures, ...

2 minutes on

Oracle's big purchase of Sun

With the dust settling after Oracle's acquisition in April of Sun Microsystems, onlookers are left wondering how the companies will integrate and what it might ...

Opinion

Get in line with EU rules

U.S. companies with European subsidiaries are likely to encounter data protection difficulties when requesting personal information from Europe.

The weakest link means risk

Hackers can quickly figure out the weakest link in the network.

CSO's desk

Security pros must speak in one voice

The role of a security professional in the vendor review process is to help identify which vendors are "critical" to the security of information assets.

Letters

Letters

We're always happy to hear from you, our readers. Please send your comments, praise or criticisms to scfeedbackUS@haymarketmedia.com. We reserve the right to edit letters.

Features

Health care security: Record setting

Security can't take a backseat in health care, says Bryan Cline at the Children's Hospital of Philadelphia, reports Dan Kaplan.

Protecting privacy

Consumers are willing to offer up personal information, provided they recognize a specific benefit for that interaction, reports Chuck Miller.

Mobile education: Niagara College Canada and Top Layer

Niagara College Canada found a way of ensuring its network security while not interfering with student and staff needs, reports Greg Masters.

Selling your vision

A new event at SC World Congress invites young vendors to tout their wares. Trident Capital's Becky Bace provides advice on participating.

A night to remember

The 2009 SC Awards gala was an occasion to gather with security colleagues and to toast 31 winners.

Last Word

A content tsunami is coming

How will the providers, carriers and end-users of today protect content, asks Gal Salomon.

Product Reviews

ACTAtek Combination Model

The ACTAtek Combination Model is a Linux, web-based biometrics and RFID smart card system for access control, time attendance and payroll systems.

DigitalPersona Pro

DigitalPersona Pro is a system that integrates fingerprint-based authentication into an already existing Microsoft Active Directory database.

L-1 Identity Solutions V-Station 4G

The V-Station gets a brand new look and new features with the latest version. The V-Station 4G is a device that controls access to secure ...

Sensible Vision FastAccess Enterprise

FastAccess Enterprise from Sensible Vision offers users the ability to use a webcam on their computer for facial recognition-based authentication.

ACTAtek TimeSheet

ACTAtek TimeSheet is a standalone solution providing time clocking to payslip, or the tool can be employed as part of the ACTAtek total solution, which ...

HID Global HID on the Desktop

HID on the Desktop provides on-card data storage for secure credentials for both iCLASS and Crescendo cards.

Vasco Data Security Digipass CertiID

Digipass CertiID is a middleware solution to provide user applications access to cryptographic operations based on hardware tokens.

SPYRUS En-Sign v7.0.0.7

En-Sign v7.0.0.7 from Spyrus provides an easy-to-use interface for managing security devices and digital certificates.

Open Domain Sphinx Solutions Sphinx Enterprise v4.1.9

Sphinx Enterprise software v4.1.9 stores logon data for Windows, websites and apps on a smart card. It can be used out-of-the-box with most major card ...

First Look

The end of DNS attacks?

This month’s First Look is one of those products that really holds a unique and important place in the pantheon of information assurance tools

Sign up for our newsletters

POLL