November 2011 Issue of SCMagazine

November 2011 Issue of SCMagazine

Nov. 2011


Health care must respond to shortfalls

Security experts believe that robust risk management programs should be a pillar of business planning, says SC Magazine Editor-in-Chief Illena Armstrong.


News briefs: U.S. Air Force downplays breach, hackers compromise

The month's most noteworthy security-related stories.

Two minutes on: Are ISPs obliged to squash botnets?

Is it an ISP's responsibility to combat botnets, asks SC Magazine Executive Editor Dan Kaplan.

Company news: Trustwave appoints Leo Cole as chief marketing officer, and other personnel moves and acquisitions

Company news: Trustwave appoints Leo Cole as chief marketing officer, and other personnel moves and acquisitions

Threat of the month

Threat of the month: Adobe vulnerabilities

Threat of the month: Adobe vulnerabilities

Skills in Demand

Skills in demand: IT and information asset management

Professionals who can get a handle on the totality of stored data are in demand, says Jeff Combs, director, recruiting, Acumin-US

Me and my job

Me and my job: Implementation of a citywide corporate wireless network

Paul Hurst was responsible for the implementation of a citywide corporate wireless network.


Debate: The recent arrests of cybercriminals will drive others to think twice before launching attacks.

Edy Almer, vice president of marketing and business development at Safend debates Rich Baich, principal at Deloitte & Touche.


Earning the privilege: Privilege management

Few would argue the advantages of a strong privilege management solution for IT, says Dwain Kinghorn partner, SageCreek Partners.

Reducing network breaches

Consistent communication about the risk of social engineering is the first step in preventing network breaches, says Chris Harget, senior product marketing manager, ActivIdentity, part ...

CSO's desk

Back to basics for enterprise defense

Implementing proper security practices protects against today's and tomorrow's risks, says Vicki Ames, former information system security officer at a federal medical research agency .


Office mobility: Consumerization of devices

No longer with the option of saying "no" to its employees, organizations are finding that solutions and techniques exist for managing and securing the mobile ...

The bug hunt

Recognizing their code bases contain weaknesses and are prime targets for attackers, software companies such as Facebook are beginning to view the research community as ...

Taking a pulse: SC Health Care Roundtable

Data protection traditionally has lagged at health care organizations when compared to other industry verticals, and emerging technology like mobile devices and cloud computing doesn't ...

Safe development: Safeguarding web applications

Age-old vulnerabilities, like SQL injection and cross-site scripting, remain prevalent in applications. And that trend will continue, unless there is a fundamental shift in how ...

Product opener

Keeping applications secure

The crown jewels of any organization is its data, but without applications the data is not useful, says SC Magazine Technology Editor Peter Stephenson.

Group Test 1

Armorlogic Profense Web Application Firewall

The Profense Web Application Firewall from Armorlogic provides solid protection of web applications by creating a reverse proxy in which all traffic is filtered through ...

Astaro Security Gateway

The Astaro Security Gateway is a full-featured unified threat management (UTM)-based gateway with some solid web application protection functionality.

Barracuda Networks Web Application Firewall

The Barracuda Networks Web Application Firewall can protect vital web applications from possible exploit by hackers.

F5 Networks BIG-IP Application Security Manager

The BIG-IP Application Security Manager (ASM) from F5 Networks protects web applications from being vulnerable to threats, such as data theft and damage.

Imperva SecureSphere Web Application Firewall

The SecureSphere Web Application Firewall from Imperva offers up some interesting functionality.

Trustwave WebDefend

WebDefend from Trustwave offers up some excellent features beyond strictly being a firewall.

Fortinet FortiWeb-400B

The FortiWeb-400B from Fortinet provides a full application firewall that protects web-facing applications and data from theft, leakage or attack.

Forum Systems Sentry WAF

The Sentry WAF from Forum Systems is a full-feature web application firewall that provides comprehensive protection to almost any web application, including HTML, JSON, XML ...

Group Test 2

Application Security DbProtect v6.2

DbProtect v6.2 is a software solution that combines discovery, vulnerability scanning, real-time audit and threat management to help organizations reduce risk and enhance compliance.

Fortinet FortiDB-400B

Fortinet FortiDB-400B provides a suite of functions, including database activity monitoring, audit and compliance reporting, and vulnerability assessment.

Imperva SecureSphere Database Activity Monitoring v8.5

SecureSphere Database Activity Monitoring (DAM) v8.5 from Imperva continuously monitors and audits all database operations, including privileged user access and response, to detect and block ...

McAfee Database Activity Monitoring v4.2

McAfee Database Security is a software solution that monitors the database management system (DBMS) and protects it from both internal and external threats.

NitroSecurity NitroView DBM v8.5

NitroView DBM is part of the NitroSecurity unified security management system. There are several layers of offerings available.

First Look

How does your enterprise defense stack up?: nCircle Benchmark

This product was developed with the idea that executives could measure and report the state of the security tools they were using.

Last Word

A road littered with hazards: Anti-malware efforts in the wild

At present, unlike car safety, there are no standards for malware prevention, says George Ledin, a professor at Sonoma State University.


Sign up to our newsletters