October 2010 Issue of SCMagazine
Snoop Dogg reportedly told a group of reporters on a Symantec 18-wheeler, no less, that he's "not with" online crime.
Company news: Kaminsky takes new role at Recursion Ventures, plus changes at St. Bernard Software and Comodo
The latest news on mergers and personnel shifts within the IT security marketplace.
Threat of the month
Advanced malware threats
2 minutes on
What does Intel's purchase of McAfee portend?
Skills in Demand
Recruiterts are seeing more positions for ISSE requiring polygraph skills to service the intelligence community, says Michael Potters, CEO of The Glenmont Group.
Me and my job
My job is to accelerate Sallie Mae's growth with innovative and agile security solutions, says Jerry Archer, SVP and CSO at Sallie Mae.
Encryption is better equipped than tokenization to secure data in the cloud.
It is clear that the long-term success of cloud computing hinges on security, says Jeff Hajek, SVP of operations at Stonesoft.
Proper and effective password management involves more than diligently creating separate passwords for the network, ATM, website and telephone-based system access.
To get a complete picture of where critical information resides, it is very important to inventory at the business process level, says the Washington Post ...
The U.S. government is working to attract quality IT professionals, says NICE's Ernest McDuffie. Dan Kaplan reports.
Deep packet inspection (DPI) can be relied on for security and forensics, but also can be used for snooping into online lives, reports Deb Radcliff.
As more regulators scrutinize the business practices of financial services companies, IT security pros must advance their data processes and safeguards, reports Illena Armstrong.
Smartphones may soon become a preferred platform for cybercrime, reports Angela Moscaritolo.
SC World Congress, to be held next month in New York, will bring together leading security practitioners and vendors.
The move to electronic medical records presents challenges, but tech solutions offer help for health care practitioners, reports Greg Masters.
All merchants need to comply with all PCI DSS requirements, regardless of compliance validation mechanisms, says Mathieu Gorge, CEO and founder of VigiTrust.
If you want to protect your sensitive information, encrypt it, says SC Magazine's Technology Editor Peter Stephenson.
Group Test 1
Mobile Guardian Enterprise Edition from Credant Technologies offers a complete suite of data protection above and beyond just whole disk encryption.
DESlock+ Business Desktop from Data Encryption Systems provides full-scale data encryption services.
SafeNet ProtectDrive offers a full, integrated set of encryption features to protect data across the enterprise.
Sophos SafeGuard Enterprise offers a lot of data protection beyond standard whole disk encryption.
Symantec PGP Whole Disk Encryption features all the great functions of PGP Whole Disk Encryption - just now with a new name.
SecureDoc Full Disk Encryption from WinMagic offers highly configurable full-scale encryption for the enterprise environment.
Trustwave Encryption offers full disk, USB, email attachment and file share encryption deployable throughout the enterprise via an on-premise server or a managed cloud deployment.
Group Test 2
Accellion Secure File Transfer is a web-based solution packaged as a software appliance that helps to secure end-to-end file transfers.
Biscom Delivery Server v4 is a web-based secure file transfer server that uses HTTPS and email capabilities to secure transactions.
Diplomat Transaction Manager Enterprise Edition v4 is a client server application that provides security for file transfers.
MOVEit DMZ from Ipswitch is a managed file transfer server that helps secure data in motion by encrypting various transfer protocols using industry standards.
Psypher Security Suite from Prime Factors is a software-based product used to encrypt transactions between two endpoints.
Vantage is a must-have if you are planning your own corporate deployment.
Sign up to our newsletters
SC Magazine Articles
- Microsoft report explores dangers of running expired security software
- Survey: real-time SIEM solutions help orgs detect attacks within minutes
- Vulnerabilities identified in three Advantech products
- Android malware 'NotCompatible' evolves, spawns resilient botnet
- State Department hack may be tied to White House network breach
- Operators disable firewall features to increase network performance, survey finds
- Waste no time patching Windows Schannel, OLE bugs, experts warn
- Study: 68 percent of healthcare breaches caused by loss or theft of devices, files
- Spin.com redirects to Rig Exploit Kit, infects users with malware, Symantec observes
- Upping the ante: PCI Security Standard
- Study: Third of employees use company devices for social media and online shopping
- 'DoubleDirect' MitM attack affects iOS, Android and OS X users
- Swedish appeals court nixes Assange's plea
- Critical XSS vulnerability addressed in WordPress
- The Internet of Things (IoT) will fail if security has no context