October 2010 Issue of SCMagazine
Snoop Dogg reportedly told a group of reporters on a Symantec 18-wheeler, no less, that he's "not with" online crime.
Company news: Kaminsky takes new role at Recursion Ventures, plus changes at St. Bernard Software and Comodo
The latest news on mergers and personnel shifts within the IT security marketplace.
Threat of the month
Advanced malware threats
2 minutes on
What does Intel's purchase of McAfee portend?
Skills in Demand
Recruiterts are seeing more positions for ISSE requiring polygraph skills to service the intelligence community, says Michael Potters, CEO of The Glenmont Group.
Me and my job
My job is to accelerate Sallie Mae's growth with innovative and agile security solutions, says Jerry Archer, SVP and CSO at Sallie Mae.
Encryption is better equipped than tokenization to secure data in the cloud.
It is clear that the long-term success of cloud computing hinges on security, says Jeff Hajek, SVP of operations at Stonesoft.
Proper and effective password management involves more than diligently creating separate passwords for the network, ATM, website and telephone-based system access.
To get a complete picture of where critical information resides, it is very important to inventory at the business process level, says the Washington Post ...
The U.S. government is working to attract quality IT professionals, says NICE's Ernest McDuffie. Dan Kaplan reports.
Deep packet inspection (DPI) can be relied on for security and forensics, but also can be used for snooping into online lives, reports Deb Radcliff.
As more regulators scrutinize the business practices of financial services companies, IT security pros must advance their data processes and safeguards, reports Illena Armstrong.
Smartphones may soon become a preferred platform for cybercrime, reports Angela Moscaritolo.
SC World Congress, to be held next month in New York, will bring together leading security practitioners and vendors.
The move to electronic medical records presents challenges, but tech solutions offer help for health care practitioners, reports Greg Masters.
All merchants need to comply with all PCI DSS requirements, regardless of compliance validation mechanisms, says Mathieu Gorge, CEO and founder of VigiTrust.
If you want to protect your sensitive information, encrypt it, says SC Magazine's Technology Editor Peter Stephenson.
Group Test 1
Mobile Guardian Enterprise Edition from Credant Technologies offers a complete suite of data protection above and beyond just whole disk encryption.
DESlock+ Business Desktop from Data Encryption Systems provides full-scale data encryption services.
SafeNet ProtectDrive offers a full, integrated set of encryption features to protect data across the enterprise.
Sophos SafeGuard Enterprise offers a lot of data protection beyond standard whole disk encryption.
Symantec PGP Whole Disk Encryption features all the great functions of PGP Whole Disk Encryption - just now with a new name.
SecureDoc Full Disk Encryption from WinMagic offers highly configurable full-scale encryption for the enterprise environment.
Trustwave Encryption offers full disk, USB, email attachment and file share encryption deployable throughout the enterprise via an on-premise server or a managed cloud deployment.
Group Test 2
Accellion Secure File Transfer is a web-based solution packaged as a software appliance that helps to secure end-to-end file transfers.
Biscom Delivery Server v4 is a web-based secure file transfer server that uses HTTPS and email capabilities to secure transactions.
Diplomat Transaction Manager Enterprise Edition v4 is a client server application that provides security for file transfers.
MOVEit DMZ from Ipswitch is a managed file transfer server that helps secure data in motion by encrypting various transfer protocols using industry standards.
Psypher Security Suite from Prime Factors is a software-based product used to encrypt transactions between two endpoints.
Vantage is a must-have if you are planning your own corporate deployment.
Sign up to our newsletters
SC Magazine Articles
- Impact of Linux bug 'grinch' spans servers, workstations, Android devices and more
- House, in rush vote, passes Intelligence Authorization Act
- More than 100K WordPress sites compromised by malware due to plugin vulnerability
- Phishing email contains Word doc, enabling macros leads to malware infection
- U.S. accounts for most Mac OS X attacks and websites seeded with malware
- The 10 POS malware families this holiday season
- White House calls Sony hack a "serious national security matter," gov't mulls proper response
- 'Spark' shares traits with Alina, JackPOS, uses AutoIt differently
- California nonprofit sues San Diego Police Department over stingray documents
- Critical 'Misfortune Cookie' bug puts millions of internet-connected routers at risk