March 2008 19 3 Issue of SCMagazine
SC Magazine - March 2008
With California's data breach notification law now being extended to cover health care organizations, businesses in this space must pay closer attention to how the ...
2 minutes on
California's extension of its data breach notification law to cover health care records promises to have significant impact on how medical organizations deal with patient ...
Me and my job
What are the occupational likes and gripes of security pro Mike Cassidy?
Interdisciplinary study has always been a focus in information assurance (IA) curriculum. Combining computer science with criminal justice, psychology, programming, policy and security is the ...
In today's digital age, what does safeguarding your assets really mean, and who is responsible and how is it achieved?
Improper implementation of SaaS can result in a technology solution that on the surface performs the required tasks of the business users, but with far ...
Northrop Grumman's Keith Ward says a new email security standard could reach beyond government users. Dan Kaplan investigates.
The integration of multiple security functions into a single device lowers operating costs of securing data resources, reports Jim Carr.
Health care organizations must shake off their HIPAA-induced paralysis and get technical.
Using a solution from Aveksa, CIGNA automates a role-based access workflow for 27,500 employees.
We are approaching a world where the demarcation between our enterprises and the public internet is becoming fuzzier and fuzzier.
A fully loaded gateway security device at a not so fully loaded price.
Solid UTM with some extra features to create user-based policy.
A unique product at a good price, but a somewhat smaller feature set than we're used to seeing.
This continues to be a solid product and we rate it our Best Buy.
A competent UTM that needs another product to realize its potential fully.
A winner for small- and mid-sized enterprises in a very small footprint.
A useful UTM with a potentially hefty price tag.
A solid product for the larger enterprise.
A solid product with some unusual features -- a bit tough on the administrator.
A solid UTM priced right for the smaller organization.
A solid anti-malware gateway with good value.
A powerful, cost-effective anti-malware tool. Recommended.
A bit difficult to configure, this product is good for organizations that want a tightly integrated anti-malware gateway that can connect directly to Websense and ...
A powerful tool in spite of its awkward setup procedures.
This gateway has some good features but its price is a bit high.
Big capability at a big price.
Another solid anti-malware product from a market leader. Best Buy.
Guard the greatest vulnerability point - gaps in data security - to avoid threats, says Raphael Leiteritz.
Sign up to our newsletters
SC Magazine Articles
- Study: 86 percent of websites contain at least one 'serious' vulnerability
- CareFirst BlueCross BlueShield breached, more than one million individuals notified
- Report: $19M breach settlement between MasterCard, Target terminated
- Logjam attack exposes data passed over TLS connections
- Google releases Chrome 43, addresses 37 bugs
- Hackers exploit Starbucks auto-reload feature to steal from customers
- Study: Nearly all SAP systems remain unpatched and vulnerable to attacks
- Former Nuclear Regulatory Commission employee arrested for alleged spear phishing campaign
- Millions of WordPress websites vulnerable to XSS bug
- FireEye first cybersecurity firm awarded DHS SAFETY Act certification
- Senate fails to pass USA Freedom Act; McConnell moves for revote of Patriot Act extension
- Android ransomware distributed to English speakers in spam campaign
- Site operator sentenced to 13 months for facilitating prostitution
- ISA presses for data to shape cyber security policy, encourages use of NIST framework
- Former Jacobi Medical Center employee improperly emails patient data