May 2010 Issue of SCMagazine

May 2010 Issue of SCMagazine

May 2010

Editorial

Getting wise to continuing education

Education, whether through a university, a professional industry body or a long-standing private organization is essential, says Editor-in-Chief Illena Armstrong.

Security news tailored to your needs

Whatever it is you're looking for, we're hoping you'll find it either in the pages of the magazine or on our website.

2 minutes on

Laser security coming to you?

Dr. Jacob Scheuer of Tel Aviv University's School of Electrical Engineering will unveil a new laser strategy to defend against hackers this month.

Skills in Demand

A need for IT pros at senior security engineer level and up

Companies that process a high volume of online transactions have significant security risks and are attractive hacker targets.

Debate

The security benefits of biometrics technology outweigh the privacy concerns.

This debate pits Don Erickson director, government relations, Security Industry Association (SIA) against Lee Tien, senior staff attorney, Electronic Frontier Foundation (EFF).

CSO's desk

Innovation priorities in cybersecurity

Communications between the CSO and key stakeholders must be crisp, concise and influential at all levels, says Jerry Archer, SVP/CSO, Sallie Mae.

Features

Information Assurance centers of excellence

A selection of some of the schools offering information assurance programs recognized by the NSA and DHS.

Security certifications: What decides know-how?

Security certifications are expected in the workplace, but they are no guarantee of competence, reports Stephen Lawton.

Special Education section

We compiled a list of some of the universities designated by the NSA and the DHS as Centers of Academic Excellence in Information Assurance.

Nurturing CSO careers

Where do C-level security careers lead to and how do you maintain them and get a seat at the table? Deb Radcliff finds out.

CISOs can achieve the upper hand

The most successful CISOs transform their security program from a cost center to a business-enabling center, says Joyce Brocaglia.

APT to attack: Breaking down the advanced persistent threat

Every organization that maintains intellectual property should be aware of advanced persistent threats, reports Angela Moscaritolo.

Trust net: How DNSSEC can make the internet safer

Adoption of DNSSEC is gaining steam, says Lauren Price, chairwoman of the DNSSEC Industry Coalition. Dan Kaplan investigates.

SC Awards gala: Red carpet treatment

The SC Awards gala celebrated leaders of the IT security industry.

Are Canadian business cyber ready?

Canadian businesses may be ill-prepared for electronic threats, says Danny Bradbury.

Last Word

Securing virtual worlds

VWs require developers to be vigilant for new vulnerabilities and attacks, say Barbara Endicott-Popovsky and Aaron Weller.

Product opener

Keeping your data where it belongs

We are seeing a sort of codification of what data leakage actually means, says Technology Editor Peter Stephenson.

Group Test 1

Code Green Networks TrueDLP

An all-in-one network DLP appliance, which provides network monitoring, email protection, web protection and a discovery scanner for detecting and handling confidential data.

GTB Technologies GTB Inspector

An appliance solution that scans outbound network traffic for confidential information.

Trustwave DLP Suite

A series of modules that help form an overall DLP solution that analyzes content and performs a series of actions against it.

Fidelis Security Systems Fidelis XPS 6.0

A network DLP suite of modules which act as sensors to help analyze outbound information (network, web, email, and more) for sensitive data.

Group Test 2

Cyberoam Endpoint Data Protection Suite

A full-feature, full-function suite that consists of four modules, which include data protection and encryption, device management, application control and asset management.

DeviceLock

DeviceLock provides a platform to manage and secure PC ports and removable storage media devices.

GFI EndPoint Security

GFI EndPoint Security provides “allow” or “deny” access to endpoint-based devices on network computers running the product’s small agent service.

Lumension Security Endpoint Security

Brings together various Lumension controls into one platform.

McAfee Host Data Loss Prevention

A high-powered endpoint data leakage machine comprised of device control and data leakage prevention of confidential and sensitive data through networks and applications.

NextLabs Enterprise DLP

Provides solid protection against data loss and data leakage by using policy enforcers for file shares, laptops and desktops, as well as application integration with ...

Novell ZENworks Endpoint Security Management

Novell ZENworks Endpoint Security Management secures the endpoint and prevents data leakage in several ways.

Safend Data Protection Suite

This product combines many great protection features with an easy-to-use management console and policy engine.

Sign up for our newsletters

POLL