March 2008 19 3 Issue of SCMagazine
SC Magazine - March 2008
With California's data breach notification law now being extended to cover health care organizations, businesses in this space must pay closer attention to how the ...
2 minutes on
California's extension of its data breach notification law to cover health care records promises to have significant impact on how medical organizations deal with patient ...
Me and my job
What are the occupational likes and gripes of security pro Mike Cassidy?
Interdisciplinary study has always been a focus in information assurance (IA) curriculum. Combining computer science with criminal justice, psychology, programming, policy and security is the ...
In today's digital age, what does safeguarding your assets really mean, and who is responsible and how is it achieved?
Improper implementation of SaaS can result in a technology solution that on the surface performs the required tasks of the business users, but with far ...
Northrop Grumman's Keith Ward says a new email security standard could reach beyond government users. Dan Kaplan investigates.
The integration of multiple security functions into a single device lowers operating costs of securing data resources, reports Jim Carr.
Health care organizations must shake off their HIPAA-induced paralysis and get technical.
Using a solution from Aveksa, CIGNA automates a role-based access workflow for 27,500 employees.
We are approaching a world where the demarcation between our enterprises and the public internet is becoming fuzzier and fuzzier.
Guard the greatest vulnerability point - gaps in data security - to avoid threats, says Raphael Leiteritz.
A fully loaded gateway security device at a not so fully loaded price.
Solid UTM with some extra features to create user-based policy.
A unique product at a good price, but a somewhat smaller feature set than we're used to seeing.
This continues to be a solid product and we rate it our Best Buy.
A competent UTM that needs another product to realize its potential fully.
A winner for small- and mid-sized enterprises in a very small footprint.
A useful UTM with a potentially hefty price tag.
A solid product for the larger enterprise.
A solid product with some unusual features -- a bit tough on the administrator.
A solid UTM priced right for the smaller organization.
A solid anti-malware gateway with good value.
A powerful, cost-effective anti-malware tool. Recommended.
A bit difficult to configure, this product is good for organizations that want a tightly integrated anti-malware gateway that can connect directly to Websense and ...
A powerful tool in spite of its awkward setup procedures.
This gateway has some good features but its price is a bit high.
Big capability at a big price.
Another solid anti-malware product from a market leader. Best Buy.
Sign up to our newsletters
SC Magazine Articles
- Impact of Linux bug 'grinch' spans servers, workstations, Android devices and more
- House, in rush vote, passes Intelligence Authorization Act
- More than 100K WordPress sites compromised by malware due to plugin vulnerability
- U.S. accounts for most Mac OS X attacks and websites seeded with malware
- Phishing email contains Word doc, enabling macros leads to malware infection
- White House calls Sony hack a "serious national security matter," gov't mulls proper response
- 'Spark' shares traits with Alina, JackPOS, uses AutoIt differently
- California nonprofit sues San Diego Police Department over stingray documents
- Critical 'Misfortune Cookie' bug puts millions of internet-connected routers at risk
- Securing the enterprise with the five W's of access