June 2012 Issue of SCMagazine

June 2012 Issue of SCMagazine

June 2012

Editorial

How mobile security breeds concern for companies

Mobile security problems continue to vex many an IT security officer.

Update

Leading news from Microsoft, Oracle, Global Payments and more

Leading news concerning Microsoft's sharing program, CISPA passed by the U.S. House, the Global Payments data breach debacle, and more.

Univ. of Washington students win collegiate cyber contest

A round-up of new launches, mergers and acquisitions, personnel moves and other company news.

Threat of the month

Crimeware packs are the "Threat of the Month"

Also know as mass malware packs, crimeware packs are the "Threat of the Month" in the June issue of SC Magazine.

2 minutes on

The promise of Windows 8

When the latest version of the most popular operating system (OS) in the world is released in October, researchers in search of vulnerabilities will flock ...

Skills in Demand

Skills in demand: Infrastructure security engineers

Security professionals with specific infrastructure experience are needed to lead teams comprised of security operations, security engineering and threat intelligence.

Me and my job

Me and my job: Matthew Dosmann, lieutenant colonel, U.S. Army

Me and my job: Matthew Dosmann, lieutenant colonel, U.S. Army

Debate

Debate: Sharing security data is the best way stifle cyber criminals

Debate» Sharing security data is the best way to raise the cost of entry and lower ROI for criminals and spies.

CSO's desk

Information security pros should educate elected officials

The reality of protecting our information is complicated, but IT security pros must educate lawmakers in order for them to create the proper cyber bills.

Features

Offensive line: Fighting back against hackers

The only way to gain the upper hand on today's advanced adversaries is by being proactive -- even aggressive, a tactic that can take many ...

On fertile ground: Social networking

Sites such as Facebook and Twitter contain seemingly infinite amounts of personal data, so it's no wonder criminals have turned their focus there. But social ...

Last Word

Big Data requires new skills

Today's firms must identify people who have knowledge from disparate areas, says Tracey Wilen-Daugenti.

Product opener

Managing policy and risk requires sophisticated tools

Risk is a multilayered function derived from threat, vulnerability and impact.

Group Test 1

Agiliance RiskVision v6.0 SP2

Agiliance RiskVision is a purpose-built GRC solution that brings together threat and vulnerability data, security configuration data, compliance and risk assessment information into a single, ...

Citicus ONE release 3.4

Citicus ONE uses web-based data collection forms to ensure that objective and consistent data is recording identifying risks to business applications, IT infrastructure and outsourced ...

eGestalt Technologies SecureGRC Enterprise

SecureGRC is a cloud-based automated IT security and compliance management solution. SecureGRC supports both a security centric and full blown IT-GRC platform.

LockPath Keylight Platform v2.3

LockPath’s Keylight is a family of applications that manages enterprise risk and demonstrates compliance while providing visibility into corporate risk and security controls.

McAfee Total Protection (ToPS) for Compliance v7.X

McAfee Total Protection for Compliance uses agent-based and agentless technology to audit, assess and report across managed and unmanaged systems, reducing the time and effort ...

MetricStream Risk Management Solution v6.0

MetricStream Risk Management Solution enables organizations to identify, assess, quantify, monitor and manage their enterprise, operational and IT risks through an assessment-driven offering.

Modulo Risk Manager v7.6

Modulo Risk Manager is a single, fully integrated platform for organizations to automate and unify their IT governance, risk and compliance (GRC) processes.

RedSeal Networks RedSeal v5.0

RedSeal v5.0 provides the intelligence necessary to proactively improve defenses, maintain continuous compliance and mitigate real-world risks by identifying all the available pathways of access ...

RSA Archer eGRC Suite, RSA Archer eGRC Platform v5.1.4

RSA Archer Risk Management enables users to proactively address risks to reputation, finances, operations and IT infrastructure as part of a governance, risk management and ...

Rsam eGRC Platform v7.5

The Rsam Enterprise GRC platform is a fully integrated, modularized platform supporting full GRC or individual module deployments.

Skybox Security Skybox View Enterprise Suite v6.0

The Skybox View Enterprise Suite is a set of tools for firewall management, network compliance assessment, and risk and vulnerability management. It is built on ...

Symantec Control Compliance Suite v11

The Control Compliance Suite enables enterprise IT security organizations to define security and compliance-related policies.

AlgoSec Security Management Suite

The Security Management Suite from AlgoSec provides many features for both firewall policy and risk management.

FireMon Security Manager with Policy Planner and Risk Analyzer

The FireMon Security Manager with Policy Manager and Risk Analyzer is the ultimate policy and risk management tool.

Lumension Risk Manager

Lumension Risk Manager is a piece of a larger suite called the Lumension Compliance and IT Risk Management platform.

NetIQ Secure Configuration Manager

The Secure Configuration Manager from NetIQ offers a full systems and configuration management platform to manage both risk and policy across many network assets.

NetWrix Change Reporter Suite

The Change Reporter Suite from NetWrix offers full change management across an entire network infrastructure.

New Net Technologies NNT Change Tracker Enterprise

NNT Change Tracker Enterprise from New Net Technologies offers a full suite of change management, file integrity, monitoring and policy management tools for network devices, ...

SolarWinds Network Configuration Manager

The SolarWinds Network Configuration Manager offers the ability to check all network devices, including routers, switches and firewalls, throughout the network environment against compliance and ...

Tripwire Enterprise

Tripwire Enterprise brings together policy management, change management and file integrity monitoring under one easy-to-manage platform.

Tufin Security Suite

The Tufin Security Suite is back with some of the same solid features that made it an excellent product last year, but it also has ...

Viewfinity Privilege Management

Using Viewfinity Privilege Management, administrators can control privileges for users throughout the environment and escalate privileges as needed on a case-by-case basis or as part ...

Sign up to our newsletters

POLL