May 2013 Issue of SCMagazine
Misogyny in business, overall, is a problem. In IT and IT security, it's a bigger one, says SC Magazine's Illena Armstrong.
This month's news briefs cover recent headlining bits on the malware that struck South Korean companies, a new law requiring federal agencies to review IT ...
This month's company news include a new CTO at Easy Solutions, ForeScout's new CFO, and the new vice president of marketing at Tufin Technologies.
Threat of the month
For our May issue's "threat of the month," we focused on pdf.exe.zip files, an old-style email executable attachment attack.
2 minutes on
As nations engage with one another in shadowy conflicts taking place in the digital sphere, experts are questioning whether treaties and rules that were created ...
Skills in Demand
For moving core apps to the cloud or implementing new systems in companies' internal environments, IT project managers are in great demand.
Me and my job
Marty Edwards' job is to coordinate efforts between the government and the private sector.
In this month's debate, experts discuss if advanced malware is still a persistent challenge after administrator rights are removed.
Employees lack the training to collect and preserve email and electronic evidence.
Are we creating a cyber professional salary bubble that will eventually burst, asks Holly Ridgeway, SVP and CISO enterprise systems at PNC.
Aaron Swartz's death inspired Rep. Zoe Lofgren to want to reform the federal anti-hacking law, but some security pros worry this would sterilize a potent ...
With data-mining firms harvesting personal information from online activity, privacy advocates, if not yet consumers, are alarmed, reports James Hale.
Over the past year, there have been numerous creative features added to just about every digital forensic tool that we reviewed.
Group Test 1
There are three products in AccessData’s forensic suite that every digital forensic investigator needs: Mobile Phone Examiner (MPE) Plus, Forensic Toolkit (FTK) and AD Triage.
The Triage-G2 Pro is a competent product offering a solid user experience.
The Cellebrite UFED Touch Ultimate is a fully equipped mobile forensic tool that enables quick and easy data acquisition from more than 8,000 mobile devices.
Both Mac Marshal Forensic Edition and Field Edition provide user-friendly forensic tool kits.
Encase Forensic v7.05.02 is a tool for computer investigation that both searches a computer system for information, as well as aids in the process of ...
HBGary’s Responder Professional is a Windows memory acquisition and analysis tool that offers a variety of features useful to malware analysts and computer forensic investigators.
Lima Forensic Case Management Software from IntaForensics is a complete, end-to-end case management system that offers an easy way to organize every aspect of a ...
The NIKSUN NetDetector/NetVCR Alpine 4.2.1 is a network security monitoring tool with advanced forensic analytical capabilities.
ProDiscover Incident Response (IR) from Technology Pathways is a computer security tool that allows users to preview, image, view, search, analyze and report.
The Forensic ComboDock is a read/write blocker. It makes it impossible to unintentionally turn off write-blocking.
The rule may help leaders better understand the impact of cyber risks, says PwC's David Burg and Laurie Schive.
SC Magazine Articles
- USAA members hit with multiple phishing attacks
- Industry pros react to Cisco, Fortinet advisories after possible Snowden NSA leak
- Trust exercise: Symantec's new website security expert is reaching out to hacker community
- Two-thirds of IT security pros surveyed expect a breach to hit their company, report
- Juniper confirms leaked "NSA exploits" affect its firewalls, no patch released yet
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- CEO sacked after aircraft company grounded by whaling attack
- Microsoft warns of new, self-propagating ransomware in the wild
- Wendy's POS breach 'considerably' bigger than first thought