Nov. 2011
Security experts believe that robust risk management programs should be a pillar of business planning, says SC Magazine Editor-in-Chief Illena Armstrong.
The month's most noteworthy security-related stories.
Is it an ISP's responsibility to combat botnets, asks SC Magazine Executive Editor Dan Kaplan.
Company news: Trustwave appoints Leo Cole as chief marketing officer, and other personnel moves and acquisitions
Threat of the month: Adobe vulnerabilities
Professionals who can get a handle on the totality of stored data are in demand, says Jeff Combs, director, recruiting, Acumin-US
Paul Hurst was responsible for the implementation of a citywide corporate wireless network.
Edy Almer, vice president of marketing and business development at Safend debates Rich Baich, principal at Deloitte & Touche.
Few would argue the advantages of a strong privilege management solution for IT, says Dwain Kinghorn partner, SageCreek Partners.
Consistent communication about the risk of social engineering is the first step in preventing network breaches, says Chris Harget, senior product marketing manager, ActivIdentity, part ...
Implementing proper security practices protects against today's and tomorrow's risks, says Vicki Ames, former information system security officer at a federal medical research agency .
No longer with the option of saying "no" to its employees, organizations are finding that solutions and techniques exist for managing and securing the mobile ...
Recognizing their code bases contain weaknesses and are prime targets for attackers, software companies such as Facebook are beginning to view the research community as ...
Data protection traditionally has lagged at health care organizations when compared to other industry verticals, and emerging technology like mobile devices and cloud computing doesn't ...
Age-old vulnerabilities, like SQL injection and cross-site scripting, remain prevalent in applications. And that trend will continue, unless there is a fundamental shift in how ...
At present, unlike car safety, there are no standards for malware prevention, says George Ledin, a professor at Sonoma State University.
The crown jewels of any organization is its data, but without applications the data is not useful, says SC Magazine Technology Editor Peter Stephenson.
The Profense Web Application Firewall from Armorlogic provides solid protection of web applications by creating a reverse proxy in which all traffic is filtered through ...
The Astaro Security Gateway is a full-featured unified threat management (UTM)-based gateway with some solid web application protection functionality.
The Barracuda Networks Web Application Firewall can protect vital web applications from possible exploit by hackers.
The BIG-IP Application Security Manager (ASM) from F5 Networks protects web applications from being vulnerable to threats, such as data theft and damage.
The SecureSphere Web Application Firewall from Imperva offers up some interesting functionality.
WebDefend from Trustwave offers up some excellent features beyond strictly being a firewall.
The FortiWeb-400B from Fortinet provides a full application firewall that protects web-facing applications and data from theft, leakage or attack.
The Sentry WAF from Forum Systems is a full-feature web application firewall that provides comprehensive protection to almost any web application, including HTML, JSON, XML ...
DbProtect v6.2 is a software solution that combines discovery, vulnerability scanning, real-time audit and threat management to help organizations reduce risk and enhance compliance.
Fortinet FortiDB-400B provides a suite of functions, including database activity monitoring, audit and compliance reporting, and vulnerability assessment.
SecureSphere Database Activity Monitoring (DAM) v8.5 from Imperva continuously monitors and audits all database operations, including privileged user access and response, to detect and block ...
McAfee Database Security is a software solution that monitors the database management system (DBMS) and protects it from both internal and external threats.
NitroView DBM is part of the NitroSecurity unified security management system. There are several layers of offerings available.
This product was developed with the idea that executives could measure and report the state of the security tools they were using.