0610 cover
Optimism, no matter how dosed with skepticism, feels right following the appointment of Howard Schmidt as the nation's cyber coordinator, says SC Magazine Editor-in-Chief Illena ...
This threat refers to a plethora of password-stealing trojans targeting gamers.
Commercial bank account holders are not offered the same degree of liability protection as financial institutions, reports Dan Kaplan.
As companies align information security policies with the objectives of their businesses, the demand for security architects is increasing.
Users reject security advice because it requires too much effort for too little reward.
How private are your online activities, asks Connect in Private's James MacDonald.
Security professionals must stop being afraid of every "new" technology that comes along, says Hurricane Labs' Bill Mathews.
Businesses that accept payment cards understand they need to make safeguarding customer data a top priority, says Bruce Rutherford, chairman, PCI Security Standards Council.
Priorities for national cybersecurity are where they need to be, says Howard Schmidt, White House cybersecurity coordinator. Illena Armstrong reports.
Strengthening change and configuration management practices is critical to any organization, reports Angela Moscaritolo.
There are strategies to cope with customer expectations of privacy when there are no boundaries around their data, reports Deb Radcliff.
Leave behind technological baggage and build business, says Verdasys' Emeric Miszti.
When the stakes are as high as they are today, relative to protecting organizational information and data, having risk and policy management capability is worth ...
The BigFix Enterprise Suite is a large, full-scale suite that can be customized with several components above policy management-type components.
The Secure Configuration Manager from NetIQ allows for easy detection of misconfigured systems throughout the enterprise environment.
This product provides full-scale reporting and management of system health, availability, performance, users, compliance, configuration, changes to systems and asset management all in one place.
This product allows administrators to manage assets while preventing unauthorized changes to systems and keeping up compliance according to standards.
Provides a solid network configuration and change management platform that gives network administrators the ability to stay on top of network device configurations throughout the ...
Tripwire Enterprise uses both agent-based and agent-less approaches to assess and maintain server and device configurations and keep them inline with both company and federal ...
An appliance-based approach to managing and configuring firewalls and network infrastructure, including routers, switches, load balancers and web proxies.
Encryption Director from Venafi focuses on ensuring that encryption technologies used throughout the enterprise meet compliance needs.
This tool is a browser-based automated GRC solution that gathers data from security solutions, scanners and SIEM products and aggregates this data for use with ...
Citicus ONE establishes an efficient and continuous process for measuring and managing information risk and compliance across the organization.
Lightwave Security’s SecureAware is a risk and compliance management and reporting platform supporting industry-standard frameworks.
An IT governance and compliance-tracking solution that integrates risk scoring with business level policies and industry and security standards.
Near real-time risk management solutions that use network and vulnerability data to determine risk and provide prioritized remediation recommendations.
A comprehensive, seventh-generation risk and compliance management solution providing assessments, audit, compliance, control testing, enterprise risk management and incident management.
A security assessment tool that empowers network administrators and security auditors to inspect vulnerabilities in Windows-based systems.
An operational risk management platform that collects data from various network assessment tools and security products, normalizes that data into a single, common-view user interface, ...
There is quite a bit to be said for combining some NOC and SOC resources, and that is where AccelOps enters the picture, says Peter ...