March 2010
A balance between basic civil rights and national security must be struck
It's critical that professionals who work with client personal information follow specific, proactive steps to ensure they're in compliance.
Résumés are a rich source of personal information that can be used for identity theft, or for spear phishing attacks that target individuals for their ...
Visibility is a critical element to both the physical and cybersecurity universes, says Ron Baklarz, CISO, Amtrak.
Mark Weatherford, California's CISO, transformed the government into an enterprise organization, Illena Armstrong reports.
A new privacy regulation in Massachusetts evokes anxiety for many, but getting in line may prove to be no big deal, reports Greg Masters.
Testing competitions can improve code, but crowdsourcing brings new concerns to security governance, reports Deb Radcliff.
The winners of the 2010 SC Awards - honoring the best products, services and people in the IT security industry - were announced at our ...
REST has emerged as a core enabling "architecture" for cloud services, says AmberPoint's Andrew Brown.
Along with profiles of the top 10 companies we selected in our recent competition, there are all sorts of unprecedented things happening in the email ...
HyTrust sees an opportunity to address an inherent weakness in managing the virtual infrastructure.
YubiKey is a simple, inexpensive authentication token that works with open source software to provide strong authentication to networks and applications over the internet.
Silver Tail Systems has two services, Forensics and Mitigation, that separately address parts of the fraud problem and together offer a solid solution to it.
This solution offers about the most secure method available today for storing sensitive files.
Purewire’s approach is that web filters control users when the users really need to be protected.
Triumfant performs remediation on the fly and can create pristine machines by taking a known good machine and using it as a donor for the ...
XyberShield combats web application attacks, such as SQL injection or cross-site scripting, by using a form of behavior profiling called XyberFrames.
A hardware appliance that provides many different security features rolled into one appliance.
A hardware appliance which offers inbound and outbound protection for downstream SMTP architectures.
An appliance-based email security solution that helps secure email both at the protocol and content layers for inbound and outbound messaging.
A software-based solution that protects inbound and outbound email messages using common threat management and encryption capabilities.
An email security and content management gateway device, which provides inbound and outbound protection against spam, viruses, data leakage and other messaging threats.
A centrally managed email security software appliance, typically deployed on certified hardware devices.
An email content management appliance that operates in a gateway mode to ensure anti-spam, anti-virus and content filtering protection for most common email architectures.
An appliance based, email security gateway which can be deployed as either a hardware device or as a virtual appliance.
An email security and email content management solution that contains several security services.
A hardware appliance that acts as an email security and content management gateway supporting downstream SMTP architectures.
An appliance-based security and content management filtering solution that is part customer-premise device and part cloud-based services.