March 2008 19 3 Issue of SCMagazine
SC Magazine - March 2008
With California's data breach notification law now being extended to cover health care organizations, businesses in this space must pay closer attention to how the ...
2 minutes on
California's extension of its data breach notification law to cover health care records promises to have significant impact on how medical organizations deal with patient ...
Me and my job
What are the occupational likes and gripes of security pro Mike Cassidy?
Interdisciplinary study has always been a focus in information assurance (IA) curriculum. Combining computer science with criminal justice, psychology, programming, policy and security is the ...
In today's digital age, what does safeguarding your assets really mean, and who is responsible and how is it achieved?
Improper implementation of SaaS can result in a technology solution that on the surface performs the required tasks of the business users, but with far ...
Northrop Grumman's Keith Ward says a new email security standard could reach beyond government users. Dan Kaplan investigates.
The integration of multiple security functions into a single device lowers operating costs of securing data resources, reports Jim Carr.
Health care organizations must shake off their HIPAA-induced paralysis and get technical.
Using a solution from Aveksa, CIGNA automates a role-based access workflow for 27,500 employees.
We are approaching a world where the demarcation between our enterprises and the public internet is becoming fuzzier and fuzzier.
A fully loaded gateway security device at a not so fully loaded price.
Solid UTM with some extra features to create user-based policy.
A unique product at a good price, but a somewhat smaller feature set than we're used to seeing.
This continues to be a solid product and we rate it our Best Buy.
A competent UTM that needs another product to realize its potential fully.
A winner for small- and mid-sized enterprises in a very small footprint.
A useful UTM with a potentially hefty price tag.
A solid product for the larger enterprise.
A solid product with some unusual features -- a bit tough on the administrator.
A solid UTM priced right for the smaller organization.
A solid anti-malware gateway with good value.
A powerful, cost-effective anti-malware tool. Recommended.
A bit difficult to configure, this product is good for organizations that want a tightly integrated anti-malware gateway that can connect directly to Websense and ...
A powerful tool in spite of its awkward setup procedures.
This gateway has some good features but its price is a bit high.
Big capability at a big price.
Another solid anti-malware product from a market leader. Best Buy.
Guard the greatest vulnerability point - gaps in data security - to avoid threats, says Raphael Leiteritz.
SC Magazine Articles
- 185M incidents bypassed perimeter defenses - report
- OVH suffers massive 1.1Tbps DDoS attack
- Case study: Hawaiian Telcom says aloha to AlienVault security management
- OpenSSL patches 14 vulns, including high-severity flaw that can be exploited for DoS attacks
- Yahoo! data breach likely exceeds 500 million records
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- CEO sacked after aircraft company grounded by whaling attack
- DōTERRA breach exposes customer info; including SS, DOB, and addresses
- Some U.S. Bancorp workers' W-2 info exposed in ADP data breach
- Federal court bucks trend, rules general liability insurance covers data breach