November 2012 Issue of SCMagazine
Among the some 400 attendees at last month's SC Congress New York, fears bandied about crossed various spectrums.
Personnel announcements, acquisitions and other news from Information Systems Security Association, Tenable Network Security, PhishMe, eIQnetworks, McAfee and several other companies.
Threat of the month
The "Threat of the Month" in our November issue are IE exploits.
2 minutes on
Sixty percent of the venture-backed IPOs issued in the third quarter of this year are IT related.
Me and my job
A Q&A with Grant Babb, proactive investigations program manager for Intel IT.
Debate: A White House order on cyber security would be a step in the right direction for safeguarding networks.
While some instances of Stuxnet and Duqu found their way into seemingly unplanned locations, the majority of occurrences were localized to targeted systems.
The theater of risk has changed from network service-based attacks to attacks against the endpoint.
As device adoption continues to grow, the importance of implementing a secure enterprise mobility program cannot be understated.
No a business' size, employees are yearning to connect their personal devices to the corporate network. But fear not: Solutions and best practices are starting ...
Most organizations cite trust issues as their primary reason for deciding against outsourcing their computing resources and data assets. So just what are cloud providers ...
External adversaries, such as nation-state attackers or criminals after credit card data, may get all the attention, but insiders pose a signfiicant threat. Can the ...
The intrusion prevention system is a mainstay of any organization's perimeter-focused security infrastructure, but its days may be numbered as a standalone technology. Yet, its ...
For the last several years, security experts have been stressing the vulnerability of industrial control systems. Now, with attacks like Stuxnet proof of the risk, ...
The old notions of defense-in-depth are being challenged, and architectures tend to have what appear to be single points of failure or compromise.
Group Test 1
Focusing solely on database security, DbProtect from Application Security is an affordable database security product which, given the right environment, could be very beneficial to ...
The Barracuda Web Application Firewall provides affordable security without skimping on features or breaking the bank.
SingleKey from Bayshore Networks is a full-featured application firewall that provides solid protection from malicious attacks to enterprise applications.
The BIG-IP Application Security Manager (ASM) functions as an application firewall, protecting web applications and services with a powerful policy engine.
Given the importance of the data contained within any corporation’s databases, the task of keeping that data safe should be a top priority for any ...
With what may just be the Cadillac of application and database security products, Imperva makes its appearance to help hold attackers at bay.
Database Activity Monitoring from McAfee provides both threat protection as well as database auditing for compliance needs
TMC enforces classification and does all of those things that are anticipated by appropriate regulatory requirements.
Though standards lack, sharing threat data is vital, says EMC's Christopher Harrington.
SC Magazine Articles
- WhatsApp in the spotlight after Turkey publishes messages of coup officers
- Trump's Russian interests and Guccifer 2.0
- WordPress Summer of Pwnage: 64 holes in 21 days
- Russian hackers take the stage at DNC convention
- Proliferation of hacker culture helped keep Anonymous from being branded terrorist org
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- CEO sacked after aircraft company grounded by whaling attack
- Some U.S. Bancorp workers' W-2 info exposed in ADP data breach
- Microsoft warns of new, self-propagating ransomware in the wild