March 2008 19 3 Issue of SCMagazine
SC Magazine - March 2008
With California's data breach notification law now being extended to cover health care organizations, businesses in this space must pay closer attention to how the ...
2 minutes on
California's extension of its data breach notification law to cover health care records promises to have significant impact on how medical organizations deal with patient ...
Me and my job
What are the occupational likes and gripes of security pro Mike Cassidy?
Interdisciplinary study has always been a focus in information assurance (IA) curriculum. Combining computer science with criminal justice, psychology, programming, policy and security is the ...
In today's digital age, what does safeguarding your assets really mean, and who is responsible and how is it achieved?
Improper implementation of SaaS can result in a technology solution that on the surface performs the required tasks of the business users, but with far ...
Northrop Grumman's Keith Ward says a new email security standard could reach beyond government users. Dan Kaplan investigates.
The integration of multiple security functions into a single device lowers operating costs of securing data resources, reports Jim Carr.
Health care organizations must shake off their HIPAA-induced paralysis and get technical.
Using a solution from Aveksa, CIGNA automates a role-based access workflow for 27,500 employees.
We are approaching a world where the demarcation between our enterprises and the public internet is becoming fuzzier and fuzzier.
A fully loaded gateway security device at a not so fully loaded price.
Solid UTM with some extra features to create user-based policy.
A unique product at a good price, but a somewhat smaller feature set than we're used to seeing.
This continues to be a solid product and we rate it our Best Buy.
A competent UTM that needs another product to realize its potential fully.
A winner for small- and mid-sized enterprises in a very small footprint.
A useful UTM with a potentially hefty price tag.
A solid product for the larger enterprise.
A solid product with some unusual features -- a bit tough on the administrator.
A solid UTM priced right for the smaller organization.
A solid anti-malware gateway with good value.
A powerful, cost-effective anti-malware tool. Recommended.
A bit difficult to configure, this product is good for organizations that want a tightly integrated anti-malware gateway that can connect directly to Websense and ...
A powerful tool in spite of its awkward setup procedures.
This gateway has some good features but its price is a bit high.
Big capability at a big price.
Another solid anti-malware product from a market leader. Best Buy.
Guard the greatest vulnerability point - gaps in data security - to avoid threats, says Raphael Leiteritz.
SC Magazine Articles
- USAA members hit with multiple phishing attacks
- Three zero-days found in iOS, Apple suggests users update their iPhone
- MedSec goes its own way with medical device flaw
- Two-thirds of IT security pros surveyed expect a breach to hit their company, report
- Juniper confirms leaked "NSA exploits" affect its firewalls, no patch released yet
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Wendy's POS breach 'considerably' bigger than first thought
- No hacking required: Israeli researchers show how to steal data through PC components
- Don't connect your charging cell to a computer or you may get hacked!