October 2006 Issue of SCMagazine

Editorial

Making the right moves for advancement

In one of our features this month, "2006: Year of exposed IDs," we discuss the various breaches that have plagued businesses of all sizes over ...

Update

Company news

Brian Contos, CSO of ArcSight, has launched his new book, Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures. ...

Debate

Should federal agencies be held to the same standards as the private sector?

News briefs

A division of J.P Morgan Chase mistakenly threw out tapes containing the personal information of 2.6 million past and current Circuit City credit card holders. ...

2 minutes on

Cybercriminals with a pretext

What happens when criminals looking to obtain others' personal information use a gumshoe's tools of the trade for their dirty work?

Me and my job

Me and my job

How do you describe your job to average people? I tell people that my job is to protect data and equipment, making sure that their ...

Opinion

It&s the simple things, really

It was in the consultants role recently that I got some sage advice from the security lead at a favorite client. I had just completed ...

Another phishing expedition

Late August 2006, we saw the most recent example of a highly valued brand damaged by a data breach as AT&T reported that hackers had ...

CSO's desk

Raising the ante on anti-virus tools

The industry is on the beginning fringes of a major shift with one of our most basic but often taken for granted security controls: anti-virus ...

Letters

Got something to say?

Send your comments, praise or criticisms to scfeedbackus@haymarketmedia.com. We reserve the right to edit letters.

Features

Adding muscle to authentication

Identity theft is an issue causing growing concern among security professionals and consumers alike. While the media and lawmakers on Capitol Hill highlight the problem ...

Join SC in Napa

Developing a strong risk management posture is key to most businesses now. Not only are they looking for guidance in ensuring such plans meet corporate ...

Adding to the team

Scott Davis and his small network security team at global investment management firm T. Rowe Price, no longer want to hide under the covers on ...

Means to an end(point)

At the Pacific Northwest National Laboratory (PNNL), the name of the game is discovery. This Department of Energy multidisciplinary lab in Richland, Wash., has scientists ...

WLANS: A growing risk

San Francisco. Houston. Philadelphia. Annapolis. Step into any of these cities in the near future and you should be able to check your email, chat ...

Safe at rest

Walk into one of LifeBridge Health's hospitals or nursing homes, and you would be hard pressed to spot an employee writing something down. "LifeBridge has ...

Digging for dirt

How do you stop a criminal mind from getting into your key line-of-business systems? You probably can't, which is why Mike Jones (not his real ...

Cover story: Protecting Wall Street

When Sunil Seshadri discusses the security philosophy at the New York Stock Exchange (NYSE), inevitably conversation drifts back to the importance of data-centric security.

2006: Year of exposed IDs

Even as consumers are more mindful of their personal information and businesses are better safeguarding sensitive data, the number of identities exposed to potential fraud ...

Advertisement

How to Prevent Insider Threats!

POLL