SC Magazine - September 2007
Apple Computer has been accused of exposing customers private details to the possibility of identity theft.
This months debate: Should we scrap the internet and start over from scratch?
A collection of the latest IT security news.
Google rationalized its $625 million acquisition of on-demand messaging security and archiving provider Postini as a signal it is committed to bringing secure hosted applications ...
As we in academe prepare for a school year, we look forward to our bright and shiny first-year students ready to code another set of ...
The Gartner Group predicted that malware would be crippling PDAs by the end of 2001.
A colleague was lamenting the other day that she had just lost another one of her best security engineers, someone she had been training and ...
Send your comments, praise or criticisms to scfeedbackUS@haymarketmedia.com. We reserve the right to edit letters.
For decades we have fussed around with how we describe our profession. It started with data security, evolved to computer security, and then took off ...
During last year's winning season, baseball's Detroit Tigers got proactive in defending their IT security network, reports Dan Kaplan.
Selecting the right NAC vendor can be an arduous process. Ericka Chickowski examines the necessary decisions.
Depending on who you ask, the five-year old Sarbanes-Oxley Act is either a costly failure or a stroke of genius, reports Dan Kaplan.
Many federal agencies receive poor grades on their IT security, but there are steps being taken to improve, reports Frank Washkuch Jr.
The value to Kelly Services of a newly deployed SIM tool goes beyond securing its staff and customer data, reports Jim Carr.
By aggregating information, executives can ease regulatory burdens, says Pravin Kothari.
True network threat analysis goes beyond SIEM.
With medium-range costs, good features and ease to install and maintain, this product is rated Recommended.
A very good all-around product with an easy-to-use interface and a superior logging/reporting mechanism.
For a large enterprise looking to filter most traffic for malicious code and viruses, but don't necessarily need more URL content filtering, the Content Security ...
A good product for the price and administration will not tax overburdened IS/IT staff.
Don't let the price of this product fool you - there are features aplenty, but configuration can be taxing on overburdened IT staffs.
A solid product with a lot of capability. We rate this one recommended.
Simple product for the user, but requires real administrative effort to maintain and deploy.
A solid, high-performance tool with a bit of a high price tag and a challenging user interface.
Interesting product that needs some work on management and policy development.
Nice product for individual use or for very small organizations, such as home business. Inadequate management capabilities for larger enterprises.
If you have a specialized application, this is the product for you as long as you can implement it and support it.
A first rate product that fits into most environments cleanly. This product continues to set the standard for pure email security in an enterprise environment. ...
Oct. 3 - 5