May 2009 20 5 Issue of SCMagazine
Congress needs to do what's necessary to help NERC call electric power officers to task and get the power systems they own and operate secured ...
Threat of the month
2 minutes on
Some researchers believe they are getting the shaft from software developers who don't pay the flaw finders.
Me and my job
For SMEs, handling security issues is far from straightforward, says David Kelleher, communications and research analyst, GFI Software.
Corporations need better tools for securing the network from within and controlling employees, contractors and guests., says Jeff Prince chairman and CTO, ConSentry Networks.
The harsh reality is that many companies are unaware of the nature and extent of unauthorized information that is leaving their environment both electronically and ...
The Washington Post Co.'s Stacey Halota blends technical savvy with business acumen, Illena Armstrong reports.
Even with a sour economy, the data leakage prevention market is projected to grow by 50 to 75 percent this year, reports Brian Hook.
Whether you are a mom-and-pop shop or a global corporation, protecting data is a concern, reports Angela Moscaritolo.
We're always happy to hear from you, our readers. Please send your comments, praise or criticisms to scfeedbackUS@haymarketmedia.com. We reserve the right to edit letters.
Application Security’s DbProtect is an enterprise-class database security, risk and compliance suite. It combines discovery, vulnerability scanning, real-time activity monitoring, auditing and intrusion detection to ...
The Assuria Auditor is a security and compliance scanner for enterprise servers.
One of our favorite tools is back this year and it’s better than ever. Core Impact Pro 8 is the ultimate tool in vulnerability assessment ...
Cenzic Hailstorm ARC is a web application vulnerability scanner. This product can scan websites and web applications in the enterprise to see how vulnerable they ...
Retina Network Security Scanner provides multi-platform vulnerability management.
GFI LANguard provides a vulnerability assessment engine able to discover more than 15,000 vulnerabilities, including Microsoft missing patches in various languages.
The McAfee Vulnerability Manager is a full-featured, comprehensive network vulnerability scanner and network auditing tool.
The netVigilance SecureScout NX is a network vulnerability scanning tool that at first glance looks like a scanning tool from times past.
The N-Stalker Web Application Security Scanner assesses a web application against a wide range of vulnerabilities, including the application layer and infrastructure layer.
Ounce 6 provides static source code security analysis. It will analyze any application written in C/C++, Java/JSP, .NET (C#, VB .NET, ASP.NET), Classic ASP (VBScript, ...
The SAINT scanner and penetration testing software is just what it says it is.
The Network Security Inspector from Sunbelt Software is a network vulnerability scanner using a database of over 4,000 ranked multiplatform vulnerabilities.
The variety of mobile devices we use grows almost daily. Paraben’s Device Seizure provides a quick and easy way to obtain evidence from a wide ...
A previous favorite returns once again in the over-the-network forensics category.
The Online Digital Forensic Suite (OnlineDFS) provides a centralized method for investigators to collect a wide variety of data from a suspect machine over the ...
This product is valuable to both incident response as well as forensics on obstinate malware, with several features particularly useful for each.
Where a normal search engine would let you search the web, Splunk is advertised as a software solution that indexes and searches all information in ...
EventTracker is a robust security information and event log management (SIEM) tool that has a lot of useful features.
The MX 2010 provides a wide range of features. Aside from the expected log aggregating, LogLogic also provides very intuitive ways to manage a network.
The LogRhythm LR-1000-XM system is a power log aggregation tool available in hardware and software platforms, although the appliance is the most common deployment and ...
Mandiant Intelligent Response (MIR) is a bit of an odd duck and a most welcome one for incident responders and investigators.
Unified security gateway is a term we are hearing with increasing frequency. Some products that have traditionally referred to themselves as UTMs – unified threat ...
As cyberterrorist exploits evolve, fraudulent schemes become more complex, says Rich Baich, principal, and William Anderson II, manager, security & privacy group, Deloitte & Touche.
Sign up to our newsletters
SC Magazine Articles
- Long list of devices believed to be affected by NetUSB vulnerability
- CareFirst BlueCross BlueShield breached, more than one million individuals notified
- Study: Employees acknowledge risky security behavior, continue to engage in it
- Logjam attack exposes data passed over TLS connections
- Google releases Chrome 43, addresses 37 bugs
- Hackers exploit Starbucks auto-reload feature to steal from customers
- Study: Nearly all SAP systems remain unpatched and vulnerable to attacks
- Former Nuclear Regulatory Commission employee arrested for alleged spear phishing campaign
- Millions of WordPress websites vulnerable to XSS bug
- FireEye first cybersecurity firm awarded DHS SAFETY Act certification
- Thousands of Bellevue Hospital Center patients notified of data breach
- Study: 86 percent of websites contain at least one 'serious' vulnerability
- Investigation ongoing in reported multimillion member Adult FriendFinder breach
- Report: $19M breach settlement between MasterCard, Target terminated
- FTC gives thumbs up to companies that cooperate during breach probes