March 2008 19 3 Issue of SCMagazine
SC Magazine - March 2008
With California's data breach notification law now being extended to cover health care organizations, businesses in this space must pay closer attention to how the ...
2 minutes on
California's extension of its data breach notification law to cover health care records promises to have significant impact on how medical organizations deal with patient ...
Me and my job
What are the occupational likes and gripes of security pro Mike Cassidy?
Interdisciplinary study has always been a focus in information assurance (IA) curriculum. Combining computer science with criminal justice, psychology, programming, policy and security is the ...
In today's digital age, what does safeguarding your assets really mean, and who is responsible and how is it achieved?
Improper implementation of SaaS can result in a technology solution that on the surface performs the required tasks of the business users, but with far ...
Northrop Grumman's Keith Ward says a new email security standard could reach beyond government users. Dan Kaplan investigates.
The integration of multiple security functions into a single device lowers operating costs of securing data resources, reports Jim Carr.
Health care organizations must shake off their HIPAA-induced paralysis and get technical.
Using a solution from Aveksa, CIGNA automates a role-based access workflow for 27,500 employees.
We are approaching a world where the demarcation between our enterprises and the public internet is becoming fuzzier and fuzzier.
A fully loaded gateway security device at a not so fully loaded price.
Solid UTM with some extra features to create user-based policy.
A unique product at a good price, but a somewhat smaller feature set than we're used to seeing.
This continues to be a solid product and we rate it our Best Buy.
A competent UTM that needs another product to realize its potential fully.
A winner for small- and mid-sized enterprises in a very small footprint.
A useful UTM with a potentially hefty price tag.
A solid product for the larger enterprise.
A solid product with some unusual features -- a bit tough on the administrator.
A solid UTM priced right for the smaller organization.
A solid anti-malware gateway with good value.
A powerful, cost-effective anti-malware tool. Recommended.
A bit difficult to configure, this product is good for organizations that want a tightly integrated anti-malware gateway that can connect directly to Websense and ...
A powerful tool in spite of its awkward setup procedures.
This gateway has some good features but its price is a bit high.
Big capability at a big price.
Another solid anti-malware product from a market leader. Best Buy.
Guard the greatest vulnerability point - gaps in data security - to avoid threats, says Raphael Leiteritz.
Sign up to our newsletters
SC Magazine Articles
- Popular adult website XTube compromised, delivers malware
- Android vulnerability leaves apps open to malicious overwriting
- One in three of the top million websites are 'risky,' researchers find
- Orgs predict $53M risk, on average, from crypto key, digital cert attacks
- Hanjuan Exploit Kit leveraged in malvertising campaign
- Report: 71 percent of orgs were successfully attacked in 2014
- Self-deleting malware targets home routers to gather information
- 'PoSeidon' point-of-sale malware targets payment card information
- Amedisys notifies nearly 7,000 individuals of potential breach
- Report: More than 15,000 vulnerabilities in nearly 4,000 applications reported in 2014
- The best defense is a good offense: The importance of securing your endpoints
- British Airways says rewards accounts hacked, locked down
- Documents on NSA's zero-day policy provide little insight, EFF says
- GitHub on DDoS alert, efforts to curb its largest attack continue
- Shadow data: The monster that isn't just under your bed