June 2012 Issue of SCMagazine
Mobile security problems continue to vex many an IT security officer.
Leading news concerning Microsoft's sharing program, CISPA passed by the U.S. House, the Global Payments data breach debacle, and more.
A round-up of new launches, mergers and acquisitions, personnel moves and other company news.
Threat of the month
Also know as mass malware packs, crimeware packs are the "Threat of the Month" in the June issue of SC Magazine.
2 minutes on
When the latest version of the most popular operating system (OS) in the world is released in October, researchers in search of vulnerabilities will flock ...
Skills in Demand
Security professionals with specific infrastructure experience are needed to lead teams comprised of security operations, security engineering and threat intelligence.
Me and my job
Me and my job: Matthew Dosmann, lieutenant colonel, U.S. Army
Debate» Sharing security data is the best way to raise the cost of entry and lower ROI for criminals and spies.
The reality of protecting our information is complicated, but IT security pros must educate lawmakers in order for them to create the proper cyber bills.
The only way to gain the upper hand on today's advanced adversaries is by being proactive -- even aggressive, a tactic that can take many ...
Sites such as Facebook and Twitter contain seemingly infinite amounts of personal data, so it's no wonder criminals have turned their focus there. But social ...
Today's firms must identify people who have knowledge from disparate areas, says Tracey Wilen-Daugenti.
Risk is a multilayered function derived from threat, vulnerability and impact.
Group Test 1
Agiliance RiskVision is a purpose-built GRC solution that brings together threat and vulnerability data, security configuration data, compliance and risk assessment information into a single, ...
Citicus ONE uses web-based data collection forms to ensure that objective and consistent data is recording identifying risks to business applications, IT infrastructure and outsourced ...
SecureGRC is a cloud-based automated IT security and compliance management solution. SecureGRC supports both a security centric and full blown IT-GRC platform.
LockPath’s Keylight is a family of applications that manages enterprise risk and demonstrates compliance while providing visibility into corporate risk and security controls.
McAfee Total Protection for Compliance uses agent-based and agentless technology to audit, assess and report across managed and unmanaged systems, reducing the time and effort ...
MetricStream Risk Management Solution enables organizations to identify, assess, quantify, monitor and manage their enterprise, operational and IT risks through an assessment-driven offering.
Modulo Risk Manager is a single, fully integrated platform for organizations to automate and unify their IT governance, risk and compliance (GRC) processes.
RedSeal v5.0 provides the intelligence necessary to proactively improve defenses, maintain continuous compliance and mitigate real-world risks by identifying all the available pathways of access ...
RSA Archer Risk Management enables users to proactively address risks to reputation, finances, operations and IT infrastructure as part of a governance, risk management and ...
The Rsam Enterprise GRC platform is a fully integrated, modularized platform supporting full GRC or individual module deployments.
The Skybox View Enterprise Suite is a set of tools for firewall management, network compliance assessment, and risk and vulnerability management. It is built on ...
The Control Compliance Suite enables enterprise IT security organizations to define security and compliance-related policies.
The Security Management Suite from AlgoSec provides many features for both firewall policy and risk management.
The FireMon Security Manager with Policy Manager and Risk Analyzer is the ultimate policy and risk management tool.
Lumension Risk Manager is a piece of a larger suite called the Lumension Compliance and IT Risk Management platform.
The Secure Configuration Manager from NetIQ offers a full systems and configuration management platform to manage both risk and policy across many network assets.
The Change Reporter Suite from NetWrix offers full change management across an entire network infrastructure.
NNT Change Tracker Enterprise from New Net Technologies offers a full suite of change management, file integrity, monitoring and policy management tools for network devices, ...
The SolarWinds Network Configuration Manager offers the ability to check all network devices, including routers, switches and firewalls, throughout the network environment against compliance and ...
Tripwire Enterprise brings together policy management, change management and file integrity monitoring under one easy-to-manage platform.
The Tufin Security Suite is back with some of the same solid features that made it an excellent product last year, but it also has ...
Using Viewfinity Privilege Management, administrators can control privileges for users throughout the environment and escalate privileges as needed on a case-by-case basis or as part ...
Sign up to our newsletters
SC Magazine Articles
- APT operation 'Double Tap' exploits serious Windows OLE bug
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Android malware 'NotCompatible' evolves, spawns resilient botnet
- Vulnerabilities identified in three Advantech products
- The Internet of Things (IoT) will fail if security has no context
- Operators disable firewall features to increase network performance, survey finds
- DDoS attacks cost organizations $40,000 per hour, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Study: 'High priority' issues hamper endpoint security solution implementation
- Researchers identify POS malware targeting ticket machines, electronic kiosks
- Pirated Joomla, WordPress, Drupal themes and plugins contain CryptoPHP backdoor
- DDoS attacks grew in size, threats became more complex, Q3 reports say
- Man gets 18 months in prison for accessing Subway POS devices, loading up gift cards