May 2009 20 5 Issue of SCMagazine
Congress needs to do what's necessary to help NERC call electric power officers to task and get the power systems they own and operate secured ...
Threat of the month
2 minutes on
Some researchers believe they are getting the shaft from software developers who don't pay the flaw finders.
Me and my job
For SMEs, handling security issues is far from straightforward, says David Kelleher, communications and research analyst, GFI Software.
Corporations need better tools for securing the network from within and controlling employees, contractors and guests., says Jeff Prince chairman and CTO, ConSentry Networks.
The harsh reality is that many companies are unaware of the nature and extent of unauthorized information that is leaving their environment both electronically and ...
The Washington Post Co.'s Stacey Halota blends technical savvy with business acumen, Illena Armstrong reports.
Even with a sour economy, the data leakage prevention market is projected to grow by 50 to 75 percent this year, reports Brian Hook.
Whether you are a mom-and-pop shop or a global corporation, protecting data is a concern, reports Angela Moscaritolo.
Application Security’s DbProtect is an enterprise-class database security, risk and compliance suite. It combines discovery, vulnerability scanning, real-time activity monitoring, auditing and intrusion detection to ...
The Assuria Auditor is a security and compliance scanner for enterprise servers.
One of our favorite tools is back this year and it’s better than ever. Core Impact Pro 8 is the ultimate tool in vulnerability assessment ...
Cenzic Hailstorm ARC is a web application vulnerability scanner. This product can scan websites and web applications in the enterprise to see how vulnerable they ...
Retina Network Security Scanner provides multi-platform vulnerability management.
GFI LANguard provides a vulnerability assessment engine able to discover more than 15,000 vulnerabilities, including Microsoft missing patches in various languages.
The McAfee Vulnerability Manager is a full-featured, comprehensive network vulnerability scanner and network auditing tool.
The netVigilance SecureScout NX is a network vulnerability scanning tool that at first glance looks like a scanning tool from times past.
The N-Stalker Web Application Security Scanner assesses a web application against a wide range of vulnerabilities, including the application layer and infrastructure layer.
Ounce 6 provides static source code security analysis. It will analyze any application written in C/C++, Java/JSP, .NET (C#, VB .NET, ASP.NET), Classic ASP (VBScript, ...
The SAINT scanner and penetration testing software is just what it says it is.
The Network Security Inspector from Sunbelt Software is a network vulnerability scanner using a database of over 4,000 ranked multiplatform vulnerabilities.
The variety of mobile devices we use grows almost daily. Paraben’s Device Seizure provides a quick and easy way to obtain evidence from a wide ...
A previous favorite returns once again in the over-the-network forensics category.
The Online Digital Forensic Suite (OnlineDFS) provides a centralized method for investigators to collect a wide variety of data from a suspect machine over the ...
This product is valuable to both incident response as well as forensics on obstinate malware, with several features particularly useful for each.
Where a normal search engine would let you search the web, Splunk is advertised as a software solution that indexes and searches all information in ...
EventTracker is a robust security information and event log management (SIEM) tool that has a lot of useful features.
The MX 2010 provides a wide range of features. Aside from the expected log aggregating, LogLogic also provides very intuitive ways to manage a network.
The LogRhythm LR-1000-XM system is a power log aggregation tool available in hardware and software platforms, although the appliance is the most common deployment and ...
Mandiant Intelligent Response (MIR) is a bit of an odd duck and a most welcome one for incident responders and investigators.
Unified security gateway is a term we are hearing with increasing frequency. Some products that have traditionally referred to themselves as UTMs – unified threat ...
As cyberterrorist exploits evolve, fraudulent schemes become more complex, says Rich Baich, principal, and William Anderson II, manager, security & privacy group, Deloitte & Touche.
We're always happy to hear from you, our readers. Please send your comments, praise or criticisms to scfeedbackUS@haymarketmedia.com. We reserve the right to edit letters.
SC Magazine Articles
- WhatsApp in the spotlight after Turkey publishes messages of coup officers
- Trump's Russian interests and Guccifer 2.0
- WordPress Summer of Pwnage: 64 holes in 21 days
- Russian hackers take the stage at DNC convention
- Proliferation of hacker culture helped keep Anonymous from being branded terrorist org
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- CEO sacked after aircraft company grounded by whaling attack
- Some U.S. Bancorp workers' W-2 info exposed in ADP data breach
- Microsoft warns of new, self-propagating ransomware in the wild
- Rival cyber-gang leaks private keys of Chimera ransomware
- Fear of hacking: Internet-connected cars and home security video top survey
- LastPass pushes patch for message-hijacking bug; confirms older password-stealing vulnerability
- Stampado RaaS reflective of market trends
- The Tor Project says investigation confirms Appelbaum's sexual misconduct