October 2011 Issue of SCMagazine

October 2011 Issue of SCMagazine

Oct. 2011

Editorial

The art of this war is changing

Being prepared, yet nimble, is key to a well-designed mission, says Illena Armstrong, SC Magazine's editor-in-chief.

Update

DigiNotar certs revoked, Anonymous exposes more data, and other briefs

A roundup of what's making news in IT security.

Company news: Palo Alto Networks, Gartner add key staff

A roundup of personnel announcements, launches, partnerships and merger and acquisition activity.

Threat of the month

Threat of the month: Morto worm

Morto recently rose to fame as the first worm to leverage the Microsoft RDP protocol to propagate.

2 minutes on

The flawed certificate authority system

The foundational assurance of the internet is in doubt these days, following attacks against certificate authorities Comodo and DigiNotar.

Skills in Demand

Skills in demand: subject matter experts

Subject matter experts (SME) are the hot property at many leading consultancy firms.

DataBank: ThreatReport

Threat report: Phishing in Idaho, VPN ban in Pakistan

A roundup of cybercriminal activity across the globe.

Me and my job

Me and my job

The goal is to change the perception that security people usually say "no."

Debate

Debate: Operation Shady RAT, a cyberespionage offensive chronicled by McAfee, is a botnet.

Operation Shady RAT, a cyberespionage offensive chronicled by McAfee, is a botnet.

Opinion

Bring Android to work, safely

Securing Android - or any mobile device - will go beyond standard protection methods, says Gareth Maclachlan COO, AdaptiveMobile.

Cloud management practices

Developers can now turn to third-party platforms to meet their credential management needs, says Michael Ginsberg, CEO, Echoworx.

CSO's desk

Taking stock of PCI five years on

PCI rules have evolved to keep up with new technologies, and adoption rates are growing, says Visa's Eduardo Perez.

Features

Beyond theory: Mobile malware

The "bring your own device" revolution means that skilled malware writers are going to pay more and more attention to pushing their wares on mobile ...

Keeping up the guard: Protecting credit cards

Increased compliance and improved data-protection methods have helped ward off a major credit card breach this year. Yet plenty of holes at the merchant level ...

Making the grade: Privacy maturation

The work being done by Kathleen Styles at the U.S. Department of Education is emblematic of a growing surge of privacy-led initiatives within the public ...

Cutting the red tape: SC Roundtable

As agencies are forced to do more with less, government security pros at a recent SC Magazine Roundtable discussion said they are being challenged to ...

Last Word

Cloud: A risk/reward proposition

Assessing what level of risk is acceptable to one's business is key to any move to the cloud, says Siobhan Byron, president of Forsythe Technology ...

Product opener

It's all about the data

If we didn't care about who sees, damages or alters our data, we wouldn't need to waste millions of dollars on the tools of our ...

Group Test 1

Check Point Full Disk Encryption vE80.20

Check Point Endpoint Security is a suite of software modules (called “Software Blades”) building comprehensive control of threats and unifying endpoint security under a single ...

Credant Technologies Credant Enterprise Server v7.1.2

Credant Enterprise Server v7.1.2 protects endpoint data wherever it resides.

Safend Data Protection Suite v3.4SP4

Safend Data Protection Suite (DPS) v3.4SP4 protects against data leakage by providing centrally managed desktop and laptop hard disk encryption.

Sophos SafeGuard Enterprise v5.6

Sophos SafeGuard Enterprise v5.6 uses FIPS 140-2 validated cryptography deployed and managed from an easy-to-use console.

Trustwave Encryption v4.3

Trustwave Encryption provides an integrated solution for encryption of disks, persistent files on shares, desktops, laptops, USB devices and email attachments.

WinMagic SecureDoc Full Disc Encryption v5.2SR2

WinMagic SecureDoc is a full-disk encryption (FDE) management solution that includes client agents for Windows, Mac and Linux operating systems and server software (SecureDoc Enterprise ...

Cryptzone Secured eFile, Secured eUSB v4.8.3, Secured eCollaboration

Cryptzone Secured eFile and Secured eUSB are part of the Simple Encryption Platform (SEP). Secured eFile is a file and folder encryption application for network ...

Data Encryption Systems DESlock+ Pro v4.1.12

DESlock+ Pro v4.1.12 full-disk encryption provides both pre-boot authentication and fast, transparent data security using FIPS-compliant, 256-bit encryption.

PGP Whole Disk Encryption from Symantec v10.3

PGP Whole Disk Encryption from Symantec encrypts all the contents on the disk on a block-by-block basis.

Group Test 2

Code Green TrueDLP

The Code Green data leakage prevention tool comes as a purpose-built appliance.

Fidelis XPS

The Fidelis suite is a lot more complicated than some other DLP offerings. It is composed of a combination of appliances that perform different leakage ...

Trustwave DLP

The Trustwave DLP is, hands down, the best-thought-out DLP product we have seen.

Advertisement

How to Prevent Insider Threats!

POLL