November 2009 Issue of SCMagazine
November 20th anniversary issue
We and the industry of which we are a contented part, have flourished over these last 20 years.
There have been countless professionals who have helped shape the information security industry - whether through regulations, technological innovation, policy and standards creation and more. ...
A handful of folks whose technical savvy, inventive spirit and business acumen helped to enliven the IT security industry.
The IT landscape has evolved over the past two decades. Where it is headed is anyone's guess, reports Chuck Miller.
Over the past decade, the role of the CISO has morphed from introverted techie into slick businessperson, reports Dan Kaplan.
Today, criminals are using amped-up techniques to tap into a perpetual cycle of fraud and identity theft, reports Deb Radcliff.
A number of experts share their (sometimes droll) thoughts on the past and future of the IT industry, reports Angela Moscaritolo.
For the most part, your senior management understands the necessity of running a secure company, reports Angela Moscaritolo.
The second annual SC World Congress brought together leading voices and key decision-makers in the IT security industry.
A lot has happened in the 20 years that SC Magazine has been covering the IT and information security marketplace. As the field has grown ...
Dan Kaplan closes this special issue with lame predictions from the past 20 years by some big names.
There is a bit of everything here in our products section. We have over 30 contributors to a special piece on the evolution of the ...
There is a wealth of insight, reminiscence and brilliant looks into the future here from a number of leading figures in the IT security arena.
Products: Industry Innovators
There are several aspects of using Altor VF that are tailor-made for a virtualized environment.
This is really an analysis tool in the sense that we use it to model the risks that could impact our network.
NetRecon, developed by Axent Technologies, was the first really non-intrusive network vulnerability scanner.
This is a product that solves a very important problem – network access management – in an inexpensive and simple manner.
When it comes to pen testing, there is nothing that this tool either cannot or won’t soon do for you.
CPN Tools is a state machine modeling tool. Translation: you can use CPN Tools to model any process and then simulate the results.
SecurITree and others that can lead you to the conclusion of a really tough security problem.
For web-based leakage threats, Webgate is the ticket.
We’re still finding cool functions that we can coax out of the 4000.
Nessus has become the basis for several appliances
NetIQ’s Secure Configuration Manager is one powerful tool.
NitroView is a security information and event manager (SIEM), but is much more, really, than that.
For its simplicity, comprehensive feature set and ease of use, we add v-GO to the list.
This is a legitimate password recovery tool, and today it can recover passwords from over 80 applications.
For its many benefits, from many levels of protection to strong functionality, is why PGP made it to this list.
ProDiscover IR (PD-IR) was designed from the ground up as an incident response tool.
For its ability to be deployed rapidly, its comprehensive capabilities and the superb open source community support, Snort has to be one of our favorites.
The price is right, the capabilities are strong and it has a long heritage of excellence.
Wetstone takes a pretty broad view of malware.
As a general purpose workhorse, Wireshark is a great tool.
Sign up to our newsletters
SC Magazine Articles
- Microsoft report explores dangers of running expired security software
- Survey: real-time SIEM solutions help orgs detect attacks within minutes
- Vulnerabilities identified in three Advantech products
- Android malware 'NotCompatible' evolves, spawns resilient botnet
- State Department hack may be tied to White House network breach
- Operators disable firewall features to increase network performance, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Upping the ante: PCI Security Standard
- Study: Third of employees use company devices for social media and online shopping
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Swedish appeals court nixes Assange's plea
- Critical XSS vulnerability addressed in WordPress
- The Internet of Things (IoT) will fail if security has no context