Oct. 2011
Being prepared, yet nimble, is key to a well-designed mission, says Illena Armstrong, SC Magazine's editor-in-chief.
A roundup of what's making news in IT security.
A roundup of personnel announcements, launches, partnerships and merger and acquisition activity.
Morto recently rose to fame as the first worm to leverage the Microsoft RDP protocol to propagate.
The foundational assurance of the internet is in doubt these days, following attacks against certificate authorities Comodo and DigiNotar.
Subject matter experts (SME) are the hot property at many leading consultancy firms.
A roundup of cybercriminal activity across the globe.
Operation Shady RAT, a cyberespionage offensive chronicled by McAfee, is a botnet.
Securing Android - or any mobile device - will go beyond standard protection methods, says Gareth Maclachlan COO, AdaptiveMobile.
Developers can now turn to third-party platforms to meet their credential management needs, says Michael Ginsberg, CEO, Echoworx.
PCI rules have evolved to keep up with new technologies, and adoption rates are growing, says Visa's Eduardo Perez.
The "bring your own device" revolution means that skilled malware writers are going to pay more and more attention to pushing their wares on mobile ...
Increased compliance and improved data-protection methods have helped ward off a major credit card breach this year. Yet plenty of holes at the merchant level ...
The work being done by Kathleen Styles at the U.S. Department of Education is emblematic of a growing surge of privacy-led initiatives within the public ...
As agencies are forced to do more with less, government security pros at a recent SC Magazine Roundtable discussion said they are being challenged to ...
Assessing what level of risk is acceptable to one's business is key to any move to the cloud, says Siobhan Byron, president of Forsythe Technology ...
If we didn't care about who sees, damages or alters our data, we wouldn't need to waste millions of dollars on the tools of our ...
Check Point Endpoint Security is a suite of software modules (called “Software Blades”) building comprehensive control of threats and unifying endpoint security under a single ...
Credant Enterprise Server v7.1.2 protects endpoint data wherever it resides.
Safend Data Protection Suite (DPS) v3.4SP4 protects against data leakage by providing centrally managed desktop and laptop hard disk encryption.
Sophos SafeGuard Enterprise v5.6 uses FIPS 140-2 validated cryptography deployed and managed from an easy-to-use console.
Trustwave Encryption provides an integrated solution for encryption of disks, persistent files on shares, desktops, laptops, USB devices and email attachments.
WinMagic SecureDoc is a full-disk encryption (FDE) management solution that includes client agents for Windows, Mac and Linux operating systems and server software (SecureDoc Enterprise ...
Cryptzone Secured eFile and Secured eUSB are part of the Simple Encryption Platform (SEP). Secured eFile is a file and folder encryption application for network ...
DESlock+ Pro v4.1.12 full-disk encryption provides both pre-boot authentication and fast, transparent data security using FIPS-compliant, 256-bit encryption.
PGP Whole Disk Encryption from Symantec encrypts all the contents on the disk on a block-by-block basis.
The Fidelis suite is a lot more complicated than some other DLP offerings. It is composed of a combination of appliances that perform different leakage ...