March 2014 Issue of SCMagazine

March 2014 Issue of SCMagazine

This month's issue includes our selection of CSO of the Year, plus features on zero-day vulnerabilities, DDoS attacks, SMBs facing cyber challenges, and contributed articles that give insight on the state of information security.

Editorial

Online safety for kids of all ages

In the aftermath of the Target breach, there is a huge need for all the people who are engaging with technology to understand more about ...

Update

News briefs: Android malware and massive retail breaches

Breaches at Target and other major retailers as well as Coca-Cola, Android mobile devices infected with malware, and other news.

Company news: New additions at Rapid7 and Vaultive

This month's company news includes new hires at Rapid7 and Vaultive, as well as Palo Alto Networks acquiring security firm in Silicon Valley.

Threat of the month

Threat of the month: Java vulnerabilities

For March's threat of the month, Secunia's Kasper Lindgaard believes Java vulnerabilities should be at the top of everyone's radar.

2 minutes on

The breach notification debate

After breaches of major retailers, the discussion regarding a potential federal breach notification law was brought back to the forefront among government leaders.

Skills in Demand

Skills in demand: Pen testers

Recent breaches have highlighted the need for talented technologists with the ability to assess vulnerabilities long before they are under attack.

Me and my job

Me and my job: John Gibson, senior IT security officer, tTech Ltd.

John Gibson discusses the challenges and rewards of his security role at tTech Ltd. as the senior IT security officer.

Debate

Debate: The Internet of Things is an enterprise problem

In this month's debate, experts discuss the possible issues that the Internet of Things presents for the industry.

Opinion

The fallacy of targeted attacks

It's time to admit that the bad guys can always make a first move, says Damballa's Manos Antonakakis.

Time for a charge card overhaul

We've all been breached, but there are steps we can take to evolve the system, says security strategist Dan Srebnick.

Mobile: Behind the headlines

Has mobile malware changed through time as dramatically as the headlines might imply?

Beyond the hype of industry trends

Cloud computing is becoming a reality that will need to be addressed by every security department.

CSO's desk

Driving the mission forward

The needs of the organizations we protect are complex and the response required due to the criticality of the services we provide tends to put ...

Features

CSO of the Year: Forrest Smith, CISO, Nissan Americas

The entire organization needs to support security initiatives, says Forrest Smith, CISO, Nissan Americas.

Breaking protocol: DDoS attacks

A spate of recent DDoS attacks forced banks to change their threat response - and that's a good thing, reports Teri Robinson.

Budget issues: The SMB dilemma

Small and midsized businesses are not exempt from cyber attack, reports James Hale.

Less than zero: Zero-day vulnerabilities

Organizations are struggling with how to more quickly account for and guard against zero-day vulnerabilities, reports Karen Epper Hoffman.

Case studies

Case study: Easing learning

Connection issues prompted an educational service in Illinois to find a solution to speed distribution of teaching materials. Greg Masters reports.

Product opener

UTMs are still defining themselves

A few years back, I boldly predicted that UTMs would merge into a single product type with gateways and SIEMs. Boy, did I get that ...

Group Test 1

Check Point Next Generation Threat Prevention Appliance

The Threat Prevention Appliance from Check Point Technologies provides a solid security platform that can be customized with the addition of several software blades.

Cyberoam Technologies Pvt Ltd CR200iNG-XP

The CR200iNG-XP from Cyberoam Technologies offers full-scale, best-of-breed protection including an intrusion prevention system, gateway anti-virus, spam prevention at the gateway, web content filtering and ...

Dell SonicWALL NSA 4600

The NSA 4600 from Dell SonicWALL incorporates next-generation firewall technology combined with a multi-core hardware platform to provide robust protection at the perimeter of even ...

Fortinet FortiGate-140D-POE

The FortiGate-140D-POE from Fortinet offers a built-in firewall, intrusion prevention system, application control, web and email filtering and anti-virus in one solid appliance.

SecPoint Protector P800

The Protector UTM appliance from SecPoint offers a full set of features packed into a single device.

VASCO aXsGUARD Gatekeeper

This product provides a complete secure remote access platform that incorporates many perimeter security functions.

WatchGuard XTM 545

The XTM 545 from WatchGuard provides an excellent mix of best-of-breed functions and an easy-to-manage platform for robust perimeter security.

Group Test 2

Bitdefender GravityZone

Take a security server in your virtual environment, add tools on each of the virtual servers you want to protect, throw in a control center ...

5nine Cloud Security for Hyper-V

This is the only virtual security product of its type exclusive to Microsoft Hyper-V.

HyTrust CloudControl

This is a security automation product for use in a VMware environment.

Intigua 2.6

Virtual management for virtual environments.

PrivateCore vCage

Secures servers with software-based attestation, full-memory encryption and OS hardening, providing a foundation for trusted computing.

First Look

Digital forensic incident response in a box

CIRT from AccessData Group is a full lifecycle forensic tool - from detecting to analyzing to remediating - and it's all in a single package.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US