November 2009 Issue of SCMagazine
November 20th anniversary issue
We and the industry of which we are a contented part, have flourished over these last 20 years.
There have been countless professionals who have helped shape the information security industry - whether through regulations, technological innovation, policy and standards creation and more. ...
A handful of folks whose technical savvy, inventive spirit and business acumen helped to enliven the IT security industry.
The IT landscape has evolved over the past two decades. Where it is headed is anyone's guess, reports Chuck Miller.
Over the past decade, the role of the CISO has morphed from introverted techie into slick businessperson, reports Dan Kaplan.
Today, criminals are using amped-up techniques to tap into a perpetual cycle of fraud and identity theft, reports Deb Radcliff.
A number of experts share their (sometimes droll) thoughts on the past and future of the IT industry, reports Angela Moscaritolo.
For the most part, your senior management understands the necessity of running a secure company, reports Angela Moscaritolo.
The second annual SC World Congress brought together leading voices and key decision-makers in the IT security industry.
A lot has happened in the 20 years that SC Magazine has been covering the IT and information security marketplace. As the field has grown ...
There is a bit of everything here in our products section. We have over 30 contributors to a special piece on the evolution of the ...
There is a wealth of insight, reminiscence and brilliant looks into the future here from a number of leading figures in the IT security arena.
Dan Kaplan closes this special issue with lame predictions from the past 20 years by some big names.
Products: Industry Innovators
There are several aspects of using Altor VF that are tailor-made for a virtualized environment.
This is really an analysis tool in the sense that we use it to model the risks that could impact our network.
NetRecon, developed by Axent Technologies, was the first really non-intrusive network vulnerability scanner.
This is a product that solves a very important problem – network access management – in an inexpensive and simple manner.
When it comes to pen testing, there is nothing that this tool either cannot or won’t soon do for you.
CPN Tools is a state machine modeling tool. Translation: you can use CPN Tools to model any process and then simulate the results.
SecurITree and others that can lead you to the conclusion of a really tough security problem.
For web-based leakage threats, Webgate is the ticket.
We’re still finding cool functions that we can coax out of the 4000.
Nessus has become the basis for several appliances
NetIQ’s Secure Configuration Manager is one powerful tool.
NitroView is a security information and event manager (SIEM), but is much more, really, than that.
For its simplicity, comprehensive feature set and ease of use, we add v-GO to the list.
This is a legitimate password recovery tool, and today it can recover passwords from over 80 applications.
For its many benefits, from many levels of protection to strong functionality, is why PGP made it to this list.
ProDiscover IR (PD-IR) was designed from the ground up as an incident response tool.
For its ability to be deployed rapidly, its comprehensive capabilities and the superb open source community support, Snort has to be one of our favorites.
The price is right, the capabilities are strong and it has a long heritage of excellence.
Wetstone takes a pretty broad view of malware.
As a general purpose workhorse, Wireshark is a great tool.
SC Magazine Articles
- Cerber ransomware strain now targeting Office 365 users
- Critical infrastructure in Europe exposed to hackers
- Deal with the devil: Ransomware experiment proves you can negotiate price down
- WordPress Summer of Pwnage: 64 holes in 21 days
- Cerber ransomware C&C server shut down by research firm and CERT-Netherlands
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Hard Rock Hotel & Casino Las Vegas hit with POS breach
- X-ray and MRI machines among devices used as springboards for data breach attacks
- Brexit shakeup: How will the U.K.'s exit from the EU affect the technology sector?
- Ransomware attack almost sends NASCAR team to the garage