May 2010
Education, whether through a university, a professional industry body or a long-standing private organization is essential, says Editor-in-Chief Illena Armstrong.
Whatever it is you're looking for, we're hoping you'll find it either in the pages of the magazine or on our website.
Dr. Jacob Scheuer of Tel Aviv University's School of Electrical Engineering will unveil a new laser strategy to defend against hackers this month.
Companies that process a high volume of online transactions have significant security risks and are attractive hacker targets.
This debate pits Don Erickson director, government relations, Security Industry Association (SIA) against Lee Tien, senior staff attorney, Electronic Frontier Foundation (EFF).
Communications between the CSO and key stakeholders must be crisp, concise and influential at all levels, says Jerry Archer, SVP/CSO, Sallie Mae.
A selection of some of the schools offering information assurance programs recognized by the NSA and DHS.
Security certifications are expected in the workplace, but they are no guarantee of competence, reports Stephen Lawton.
We compiled a list of some of the universities designated by the NSA and the DHS as Centers of Academic Excellence in Information Assurance.
Where do C-level security careers lead to and how do you maintain them and get a seat at the table? Deb Radcliff finds out.
The most successful CISOs transform their security program from a cost center to a business-enabling center, says Joyce Brocaglia.
Every organization that maintains intellectual property should be aware of advanced persistent threats, reports Angela Moscaritolo.
Adoption of DNSSEC is gaining steam, says Lauren Price, chairwoman of the DNSSEC Industry Coalition. Dan Kaplan investigates.
The SC Awards gala celebrated leaders of the IT security industry.
Canadian businesses may be ill-prepared for electronic threats, says Danny Bradbury.
VWs require developers to be vigilant for new vulnerabilities and attacks, say Barbara Endicott-Popovsky and Aaron Weller.
We are seeing a sort of codification of what data leakage actually means, says Technology Editor Peter Stephenson.
An all-in-one network DLP appliance, which provides network monitoring, email protection, web protection and a discovery scanner for detecting and handling confidential data.
An appliance solution that scans outbound network traffic for confidential information.
A series of modules that help form an overall DLP solution that analyzes content and performs a series of actions against it.
A network DLP suite of modules which act as sensors to help analyze outbound information (network, web, email, and more) for sensitive data.
A full-feature, full-function suite that consists of four modules, which include data protection and encryption, device management, application control and asset management.
DeviceLock provides a platform to manage and secure PC ports and removable storage media devices.
GFI EndPoint Security provides “allow” or “deny” access to endpoint-based devices on network computers running the product’s small agent service.
A high-powered endpoint data leakage machine comprised of device control and data leakage prevention of confidential and sensitive data through networks and applications.
Provides solid protection against data loss and data leakage by using policy enforcers for file shares, laptops and desktops, as well as application integration with ...
Novell ZENworks Endpoint Security Management secures the endpoint and prevents data leakage in several ways.
This product combines many great protection features with an easy-to-use management console and policy engine.