May 2006 Issue of SCMagazine

Editorial

Cashing in on misconfigured systems

It's not news anymore that cyberattackers penetrating corporate networks are after money, not infamy, these days. The bread they can make from these and other ...

Update

Company news

Kevin Prince has joined Perimeter Internetworking as chief security officer. Prince will help formulate the managed network security firm's strategic and product development plans and ...

News briefs

The uproar over foreign control over American interests was blamed for the break-up of one nearly successful IT security merger. Check Point Software Technologies Ltd., ...

Debate

NBA systems are the most effective solutions for stopping worms and viruses.

2 minutes on

2 minutes on ... Is FISMA effective?

Some believe it is nothing more than a paper exercise. The government earned poor marks on information security this year. Of the 24 agencies graded, ...

Me and my job

Me and my job

How did you get into security? In my case, the question could be phrased, "How did security get into you?" I am not an infosec ...

Opinion

On colleagues and support

We all have colleagues with whom we keep in touch. We all have colleagues who we call on from time to time for help when ...

Open, transparent and safe?

Business in the Participation Age is all about engagement and collaboration. It’s about access, transparency and trust. Today, the isolationist approach to security – the ...

CSO's desk

Reduce risk through vendor onus

Many of us are struggling to extend security responsibility and accountability to third-party vendors and outsourcing companies.

Letters

Got something to say?

Send your comments, praise or criticisms to scfeedbackus@haymarketmedia.com. We reserve the right to edit letters.

Features

An integrated approach

SC Magazine is providing an exclusive look at abridged versions of various chapters included in the just-released Larstan's The Black Book on Government Security, as ...

SC Forum: It's almost here

Gain insight and contacts to help achieve your goals as an IT security professional, but act fast.

Risky business

Call it another unintentional legacy of Enron, WorldCom and other corporate accounting scandals of the past decade.

Threats for $ale

As if dealing with skyrocketing numbers of new vulnerabilities each day is not enough, the IT security world must now brace for a new challenge: ...

Avoiding a hostile host

Back in the old days, at least by malicious hacking standards, the simplest way to hijack a PC was to compromise the vulnerable entryways of ...

Cover story: If once is good, twice is better

A United States federal government agency didn't need to point out the weaknesses of username and password authentication to E*Trade Financial's CIO Greg Framke. He ...

Last Word

Backup tapes can't be neglected

In 2005, storage security losses frequently garnered a storm of media attention, with one organization losing computer backup tapes with personal information on current and ...

Sign up for our newsletters

POLL