November 2012 Issue of SCMagazine
Among the some 400 attendees at last month's SC Congress New York, fears bandied about crossed various spectrums.
Personnel announcements, acquisitions and other news from Information Systems Security Association, Tenable Network Security, PhishMe, eIQnetworks, McAfee and several other companies.
Threat of the month
The "Threat of the Month" in our November issue are IE exploits.
2 minutes on
Sixty percent of the venture-backed IPOs issued in the third quarter of this year are IT related.
Me and my job
A Q&A with Grant Babb, proactive investigations program manager for Intel IT.
Debate: A White House order on cyber security would be a step in the right direction for safeguarding networks.
While some instances of Stuxnet and Duqu found their way into seemingly unplanned locations, the majority of occurrences were localized to targeted systems.
The theater of risk has changed from network service-based attacks to attacks against the endpoint.
As device adoption continues to grow, the importance of implementing a secure enterprise mobility program cannot be understated.
No a business' size, employees are yearning to connect their personal devices to the corporate network. But fear not: Solutions and best practices are starting ...
Most organizations cite trust issues as their primary reason for deciding against outsourcing their computing resources and data assets. So just what are cloud providers ...
External adversaries, such as nation-state attackers or criminals after credit card data, may get all the attention, but insiders pose a signfiicant threat. Can the ...
The intrusion prevention system is a mainstay of any organization's perimeter-focused security infrastructure, but its days may be numbered as a standalone technology. Yet, its ...
For the last several years, security experts have been stressing the vulnerability of industrial control systems. Now, with attacks like Stuxnet proof of the risk, ...
Though standards lack, sharing threat data is vital, says EMC's Christopher Harrington.
The old notions of defense-in-depth are being challenged, and architectures tend to have what appear to be single points of failure or compromise.
Group Test 1
Focusing solely on database security, DbProtect from Application Security is an affordable database security product which, given the right environment, could be very beneficial to ...
The Barracuda Web Application Firewall provides affordable security without skimping on features or breaking the bank.
SingleKey from Bayshore Networks is a full-featured application firewall that provides solid protection from malicious attacks to enterprise applications.
The BIG-IP Application Security Manager (ASM) functions as an application firewall, protecting web applications and services with a powerful policy engine.
Given the importance of the data contained within any corporation’s databases, the task of keeping that data safe should be a top priority for any ...
With what may just be the Cadillac of application and database security products, Imperva makes its appearance to help hold attackers at bay.
Database Activity Monitoring from McAfee provides both threat protection as well as database auditing for compliance needs
TMC enforces classification and does all of those things that are anticipated by appropriate regulatory requirements.
SC Magazine Articles
- Was Spotify breached? Account info shows up on Pastebin
- Report: Ransomware feeds off poor endpoint security
- Researcher finds backdoor that accessed Facebook employee passwords
- Over 7M Minecraft mobile credentials exposed after Lifeboat data breach
- DōTERRA breach exposes customer info; including SS, DOB, and addresses
- Federal court bucks trend, rules general liability insurance covers data breach
- The anatomy of a spearphishing scam, or how to steal $100M with a fake email
- FBI investigating attack against computer networks at U.S. law firms
- Pros examine Mossack Fonseca breach: WordPress plugin, Drupal likely suspects
- First Choice Credit Union files class-action suit against Wendy's over breach
- Top NFL prospect Tunsil free falls in draft after apparent hacker posts damaging video, texts
- Researchers spot Android Infostealer disguised as Chrome update
- Researchers spot mobile malware competition on the black market
- Judge ruled go ahead for claims of phone hacking against UK tabloid