October 2010 Issue of SCMagazine
Snoop Dogg reportedly told a group of reporters on a Symantec 18-wheeler, no less, that he's "not with" online crime.
Company news: Kaminsky takes new role at Recursion Ventures, plus changes at St. Bernard Software and Comodo
The latest news on mergers and personnel shifts within the IT security marketplace.
Threat of the month
Advanced malware threats
2 minutes on
What does Intel's purchase of McAfee portend?
Skills in Demand
Recruiterts are seeing more positions for ISSE requiring polygraph skills to service the intelligence community, says Michael Potters, CEO of The Glenmont Group.
Me and my job
My job is to accelerate Sallie Mae's growth with innovative and agile security solutions, says Jerry Archer, SVP and CSO at Sallie Mae.
Encryption is better equipped than tokenization to secure data in the cloud.
It is clear that the long-term success of cloud computing hinges on security, says Jeff Hajek, SVP of operations at Stonesoft.
Proper and effective password management involves more than diligently creating separate passwords for the network, ATM, website and telephone-based system access.
To get a complete picture of where critical information resides, it is very important to inventory at the business process level, says the Washington Post ...
The U.S. government is working to attract quality IT professionals, says NICE's Ernest McDuffie. Dan Kaplan reports.
Deep packet inspection (DPI) can be relied on for security and forensics, but also can be used for snooping into online lives, reports Deb Radcliff.
As more regulators scrutinize the business practices of financial services companies, IT security pros must advance their data processes and safeguards, reports Illena Armstrong.
Smartphones may soon become a preferred platform for cybercrime, reports Angela Moscaritolo.
SC World Congress, to be held next month in New York, will bring together leading security practitioners and vendors.
The move to electronic medical records presents challenges, but tech solutions offer help for health care practitioners, reports Greg Masters.
If you want to protect your sensitive information, encrypt it, says SC Magazine's Technology Editor Peter Stephenson.
Group Test 1
Mobile Guardian Enterprise Edition from Credant Technologies offers a complete suite of data protection above and beyond just whole disk encryption.
DESlock+ Business Desktop from Data Encryption Systems provides full-scale data encryption services.
SafeNet ProtectDrive offers a full, integrated set of encryption features to protect data across the enterprise.
Sophos SafeGuard Enterprise offers a lot of data protection beyond standard whole disk encryption.
Symantec PGP Whole Disk Encryption features all the great functions of PGP Whole Disk Encryption - just now with a new name.
SecureDoc Full Disk Encryption from WinMagic offers highly configurable full-scale encryption for the enterprise environment.
Trustwave Encryption offers full disk, USB, email attachment and file share encryption deployable throughout the enterprise via an on-premise server or a managed cloud deployment.
Group Test 2
Accellion Secure File Transfer is a web-based solution packaged as a software appliance that helps to secure end-to-end file transfers.
Biscom Delivery Server v4 is a web-based secure file transfer server that uses HTTPS and email capabilities to secure transactions.
Diplomat Transaction Manager Enterprise Edition v4 is a client server application that provides security for file transfers.
MOVEit DMZ from Ipswitch is a managed file transfer server that helps secure data in motion by encrypting various transfer protocols using industry standards.
Psypher Security Suite from Prime Factors is a software-based product used to encrypt transactions between two endpoints.
Vantage is a must-have if you are planning your own corporate deployment.
All merchants need to comply with all PCI DSS requirements, regardless of compliance validation mechanisms, says Mathieu Gorge, CEO and founder of VigiTrust.
Sign up to our newsletters
SC Magazine Articles
- Study: Open Source Software use increasing in enterprises but without vulnerability monitoring
- RSA Conference 2015: Prepare for the IoT before it's too late, Sorebo warns
- 'Aaron's Law' returns to Congress
- RSA 2015: Tension continues to grow between govt, cryptographers
- Data at risk for 9,000 individuals following unauthorized access to SRI Inc. website
- Study: Conficker declared top threat of 2014, but N. America targeted mainly by AnglerEK
- RSA 2015: Straight talk about encryption, bulk surveillance and IoT
- RSA 2015: In the healthcare industry, security must innovate with business
- RSA 2015: Unintended use of aircraft systems next challenge for counterterrorism community
- RSA 2015: Bug hunting and responsible vulnerability disclosure