September 2009 Issue of SCMagazine
In this month's cover story, we hear from one of our SC World Congress keynote speakers, Heartland Payment System's CEO Robert Carr
Threat of the month
Conficker, which is both a worm and a bot, is one of the more sophisticated pieces of malicious software (malware) we have seen to date.
Increased efficiency is a driving factor for organizations adopting role-based access control.
Windows 7 looks to be an all-around win for security.
Cybersecurity is one of the greatest societal challenges of the 21st century. It transcends technology and affects our privacy, financial systems, health care, economy and ...
A top-ranked opera company took the drama out of its internet operations with malware protection, reports Greg Masters.
CEO Bob Carr plans to use the breach at Heartland to push advancement within the payment industry, Dan Kaplan reports.
With international collaboration, prosecutions of cybercrimes are becoming more common, reports Angela Moscaritolo.
The second annual SC World Congress, to be held Oct. 13-14 in New York, brings together leading voices in the information security field.
With DRM for digital music in its death throes, how will it fare in other industries relying on digital copyright protections? Deb Radcliff reports.
The Threat Manager v3.5.4 with ActiveWatch Monitoring Service from Alert Logic combines intrusion protection and vulnerability management in one device that offers proactive and reactive ...
The Network-Based Firewall service provided by AT&T protects a customer’s WAN by providing secure inbound and outbound internet access through security gateways. This service also ...
The Clone Systems Clone Guard Managed Security Suite provides protection from malicious threats against VoIP, web or customized applications. This service detects, logs, prevents and ...
The F-Secure Protection Service for Business is a completely integrated security platform which consists of two parts. The first part is comprised of client applications ...
The IBM Managed Protection Service combines a full security monitoring staff with security monitoring devices to manage, monitor and respond to security threats on a ...
The Network Box managed service features a UTM appliance that includes three firewalls, three IDS/IPS systems, VPNs, anti-virus, anti-malware, anti-spyware, anti-spam and content filtering.
The Firewall and Intrusion Detection and Prevention service from Perimeter eSecurity provides 24/7 real-time protection and comprehensive reporting.
The core of the SecureWorks managed services is the Sherlock Security Platform. With this platform, SecureWorks can bring together and aggregate all logs and events ...
The Managed IPS/IDS from Symantec is a fully managed system with Sourcefire IPS as its backbone. Alongside of the IPS, Symantec can also manage many ...
Cyveillance provides services that cover the entire spectrum of online risks - from fraud and identity theft, phishing and unlicensed product sales to corporate espionage.
MX Logic’s Complete Security is a package that includes email defense, web defense and archiving services. The package of services can also be provided separately.
Nowell Shalom Security Platform is a cloud-based security as a service (SaaS) offering that is intended to protect against malicious insiders and impostors stealing information ...
SecureWorks provides real-time, 24/7 monitoring and analysis of host logs, leveraging its proprietary Sherlock Security Management Platform.
StillSecure’s ProtectPoint managed security service provides a combination of firewall; intrusion detection/prevention; gateway virus, spam and content filtering; VPN and vulnerability scanning.
In any online transaction, businesses must confront a significant and growing challenge: How to verify a customer’s identity in real time without diminishing the customer’s ...
Trustwave provides end-to-end managed security services to protect against common malware, spam, phishing, zero-day threats, botnets and even fraud and insider abuse.
XyberSecure’s XyberShield is a global security as a service (SaaS) offering designed to protect users from website-level security threats.
The emerging popularity of virtual computing has very few blemishes considering its youth. One of those, unfortunately, is security both of the underlying operating environment ...
A highly motivated workforce creates a protection system, says Justin Somaini.
Sign up to our newsletters
SC Magazine Articles
- Zero-day in Fiat Chrysler feature allows remote control of vehicles
- 'GSMem' malware designed to infiltrate air-gapped computers, steal data
- United reportedly hacked by same group that breached Anthem, OPM
- All smartwatches are vulnerable to attack, finds study
- Security concerns raised at Windows 10 roll-out
- Report delves into RAT videos on YouTube
- Tor Project, Library Freedom Project to establish Tor exit nodes in libraries
- PagerDuty requires password change for all customers following breach
- Cisco: Attackers innovating, evading defenses in first half of 2015
- Does Windows 10 Wi-Fi Sense spell end of private wireless networks?