SC Magazine - November 2007
When the likes of Barack Obama and Mitt Romney announced their intentions to run for president back in February, it seemed a bit too early ...
Blends
Is continuous testing of applications more vital than testing at the initial code level?
Clothing retailer Gap Inc. revealed that a laptop containing the Social Security numbers of 800,000 job applicants was stolen from a third-party vendor. The laptop ...
The "ethical hacker toolkits" recently posted for sale on eBay appear to point to a dangerous trend: selling these types of tools — used primarily ...
Rick Lawhorn, principle, information security and compliance, Dataline, tells us what he likes about his job.
Recent reports indicate that identity thieves are reaching out beyond the grave and stealing the identity of the newly departed.
Deloitte Touche Tohmatsu's recently released security survey revealed that 37 percent of the top 100 global financial services organizations don't have a security strategy, and ...
The responsibilities of the chief security officer keep growing. Years ago, personnel in the position fulfilled a very technical role and didn't have to really ...
The government vertical presents special challenges to IT security vendors, but all agree it is a growing market, reports Greg Masters.
Despite the progress made since FISMA implementation, government agencies have a lot of work ahead, says Deb Radcliff.
All levels of government face critical issues in securing their data - whether shared via the web or through email, USB sticks or IM.
As biometric technologies gain further acceptance, one retailer fights insider theft with fingerprint readers, reports Jim Carr.
Many businesses are finding VoIP to be worth the money, but are their systems prepared for attacks? Frank Washkuch investigates.
Karl Hart is one ISO who sees organizations saving big bucks by virtualizing their data centers, but risks loom, reports Dan Kaplan.
Data in, data out - it all needs protecting. This month we are concentrating on the data that should not enter your network and the ...
Now that DefCon 15 has passed, I'm feeling the need to have a really good reason to dredge up people's happy, but increasingly distant memories ...
A good all-around product with a large feature set. The unit can be a bit of a challenge for organizations that do not need all ...
A complete enterprise firewall loaded with more features than most organizations will ever need.
A firewall for the largest enterprises with a price point and a feature set that keeps the unit out of small-to-medium sized enterprises.
For its ease of use and deployment, good pricing and comprehensive protection, we award the BigFix DLP our Best Buy.
This product works best with its companion desktop version, but if you archive a lot of sensitive data (law offices, medical officers, intellectual property, etc.), ...
Use this tool alongside other tools that handle leakage vectors other than email.
if you need very strong data leakage protections with powerful forensics, this is the product for you. For its unique approach to forensics, we designate ...
Use this in its automatic inspection mode with an email extrusion prevention system for pretty complete extrusion coverage.
We don't recommend this as your only extrusion prevention tool. Used along with one of the other tools reviewed here, however, it can be a ...
If you have a small-to-medium-sized enterprise and want to manage data leakage through the network, this is a good product for you.
An excellent product with a lot of capability if you can afford it. Best for larger implementations, especially as part of an overall McAfee implementation.
For mid-sized organizations (up to 12,000 users), this is about as good as it gets feature-wise.
Nov. 14-15
Dec. 2-4
Dec. 3-7
Jan. 11-19, 2008
Feb. 19-21
March 25-26
April 7-11