May 2011 Issue of SCMagazine

May 2011 Issue of SCMagazine

May 2011

Editorial

What to learn from the RSA breach

The recent social engineering attack on RSA has dominated industry talk, with some dubbing coverage of the incident a media circus.

Update

News briefs: Epsilon breached, Google settles with FTC

News briefs: Expect a rise in spear phishing attacks after Epsilon, Federal Trade Commission orders Google to fix its privacy practices, and more

Company news: MANDIANT, Clearwire make new hires, Actiance-LinkedIn partner

MANDIANT appointed Richard Bejtlich CSO and security services architect, Clearwire restructured its executive leadership team, and more personnel announcements and other news

Mapping cybercriminal activity across the world

Multiple state agencies in New Jersey left confidential information on computers set to be sold at auction, and other security-related news and cybercriminal activity from ...

Threat of the month

Threat of the month: Flash zero-day

Threat of the month: Flash zero-day

2 minutes on

Attacking the email list provider

A pair of massive data breaches have illustrated that marketing services firms have become a high-value target of cybercriminals aiming to steal valuable information that ...

Skills in Demand

Skills in demand: A growing need for advanced threat analysts

Skills in demand: A growing need for advanced threat analysts

Me and my job

Larry Clinton CEO, Internet Security Alliance (ISA)

Larry Clinton, CEO of the Internet Security Alliance, says he tries to bring industry and government together to figure out how to secure all the ...

Debate

Debate: Mobile app stores should test and certify before making apps available to customers.

Debate: Mobile app stores should test and certify before making apps available to customers.

CSO's desk

Mobile device control: Get to yes

If you aren't already trying to figure out your mobile device security strategy, you soon will be, says Vicky Ames, former information system security officer ...

Features

Information security certifications: Certs! Who cares?

Some 73,000 people hold the CISSP certification. But in today's competitive job marketplace, are they enough to separate oneself form the pack?

Embrace change: How security translates to business

Security professionals are recognizing the need to possess operations knowledge that will help them translate security objectives into business enablement.

Security recruiters round-up: Standing out

Three top executive security recruiters weigh in on what today's information professional needs to do to shine in a volatile marketplace.

Advanced threats: Assume the worst

In today's sophisticated malware and intrusion tactics, organizations should already assume they have been compromised. The key is readiness, says Larry Whiteside, CISO, Visiting Nurse ...

Last Word

Diversity breeds system resilience

IT managers should consider the benefits of non-interoperable platforms, says AT&T's Ed Amoroso.

Product opener

Let's go analyze something

This month, the focus is on analysis. We look at the network through the lens of the SIEM, and we look at digital incidents and ...

Group Test 1

Digital forensic tools

Different fields of digital forensics place a range of requirements on the tools being used, but these tools assist in completing a focused task as ...

ADF Solutions Triage-Examiner

ADF Solutions’ Triage-Examiner is a forensic tool designed to be run on suspect computers to quickly analyze their content.

F-Response Enterprise Edition v3.09.09

The F-Response Enterprise Edition forensic tool makes examinations in the corporate world much easier.

Mandiant Intelligent Response v1.4.5

Mandiant Intelligent Response (MIR) is a powerful incident response investigation and evidence collection tool.

NIKSUN NetDetector/NetVCR Alpine v4.1

In the field of network forensics, the NIKSUN NetDetector is a user-friendly, all-in-one appliance.

Cyber Security Technologies P2P Marshal 3.1 Field Edition

The main function of Cyber Security Technologies P2P Marshal 3.1 Field Edition is to analyze peer-to-peer network downloads.

Paraben Device Seizure

Since 2002, Paraben has been the major contributor to the hand-held data acquisition market.

NetWitness NextGen v9.5

NetWitness NextGen v9.5 is a network forensic tool that uses a combination of dedicated hardware and application software to provide a method for collecting and ...

WetStone Technologies Trait Analytic Profiling Search

WetStone’s Trait Analytic Profiling Search (TAPS) provides investigators with a simple but important commodity: time.

i2 Analyst’s Notebook

This is a powerful addition to any digital forensic tool box.

AccessData Group Forensic Toolkit 3.2

Forensic Toolkit, or FTK, as it is generally known, is a mainstay of the computer forensic world.

Technology Pathways ProDiscover Incident Response 6.9

At its heart, ProDiscover IR is a computer forensic program that analyzes the computer media.

Group Test 2

NitroSecurity NitroView v8.5

The NitroView is characterized by speed and the ability to accept data from just about any source to store huge amounts of historical data.

CorreLog

The SIEM product from CorreLog provides organizations with an easy-to-implement, affordable log management and correlation system.

LogLogic MX3020

The MX3020 from LogLogic encompasses the high-grade SIEM functionality of the company’s larger offerings in a single appliance for smaller to midsize environments.

LogRhythm

The LogRhythm appliance features high-powered functionality to the enterprise in the way of log correlation and full, real-time event analysis with massive bells and whistles.

netForensics nFX Cinxi One

The nFX Cinxi One appliance from netForensics provides powerful tools to manage and correlate logs for real-time threat analysis and identification.

Prism Microsystems EventTracker

The EventTracker from Prism Microsystems provides an interesting set of features.

Quest Software InTrust

InTrust from Quest Software provides a server-based log collection and analysis tool for Windows and Linux/Unix systems, as well as syslogs, applications and databases.

TriGeo Network Security SIM

The TriGeo SIM focuses on a proactive network defense principle by combining functions with built-in active response techniques for full-scale visibility of risks and suspicious ...

Tripwire Log Center

Tripwire Log Center collects logs, and after the logs are collected and correlated, the Log Center offers real-time event alerting based on custom-made rules that ...

Trustwave SIEM

The Trustwave SIEM offers the ability to collect, normalize and analyze logs and events for use in forensic investigation and auditing.

ZOHO ManageEngine EventLog Analyzer

This product shines with its log-searching ability.

Sign up for our newsletters

POLL