September 2009 Issue of SCMagazine
In this month's cover story, we hear from one of our SC World Congress keynote speakers, Heartland Payment System's CEO Robert Carr
Threat of the month
Conficker, which is both a worm and a bot, is one of the more sophisticated pieces of malicious software (malware) we have seen to date.
Increased efficiency is a driving factor for organizations adopting role-based access control.
Windows 7 looks to be an all-around win for security.
Cybersecurity is one of the greatest societal challenges of the 21st century. It transcends technology and affects our privacy, financial systems, health care, economy and ...
A top-ranked opera company took the drama out of its internet operations with malware protection, reports Greg Masters.
CEO Bob Carr plans to use the breach at Heartland to push advancement within the payment industry, Dan Kaplan reports.
With international collaboration, prosecutions of cybercrimes are becoming more common, reports Angela Moscaritolo.
The second annual SC World Congress, to be held Oct. 13-14 in New York, brings together leading voices in the information security field.
With DRM for digital music in its death throes, how will it fare in other industries relying on digital copyright protections? Deb Radcliff reports.
The Threat Manager v3.5.4 with ActiveWatch Monitoring Service from Alert Logic combines intrusion protection and vulnerability management in one device that offers proactive and reactive ...
The Network-Based Firewall service provided by AT&T protects a customer’s WAN by providing secure inbound and outbound internet access through security gateways. This service also ...
The Clone Systems Clone Guard Managed Security Suite provides protection from malicious threats against VoIP, web or customized applications. This service detects, logs, prevents and ...
The F-Secure Protection Service for Business is a completely integrated security platform which consists of two parts. The first part is comprised of client applications ...
The IBM Managed Protection Service combines a full security monitoring staff with security monitoring devices to manage, monitor and respond to security threats on a ...
The Network Box managed service features a UTM appliance that includes three firewalls, three IDS/IPS systems, VPNs, anti-virus, anti-malware, anti-spyware, anti-spam and content filtering.
The Firewall and Intrusion Detection and Prevention service from Perimeter eSecurity provides 24/7 real-time protection and comprehensive reporting.
The core of the SecureWorks managed services is the Sherlock Security Platform. With this platform, SecureWorks can bring together and aggregate all logs and events ...
The Managed IPS/IDS from Symantec is a fully managed system with Sourcefire IPS as its backbone. Alongside of the IPS, Symantec can also manage many ...
Cyveillance provides services that cover the entire spectrum of online risks - from fraud and identity theft, phishing and unlicensed product sales to corporate espionage.
MX Logic’s Complete Security is a package that includes email defense, web defense and archiving services. The package of services can also be provided separately.
Nowell Shalom Security Platform is a cloud-based security as a service (SaaS) offering that is intended to protect against malicious insiders and impostors stealing information ...
SecureWorks provides real-time, 24/7 monitoring and analysis of host logs, leveraging its proprietary Sherlock Security Management Platform.
StillSecure’s ProtectPoint managed security service provides a combination of firewall; intrusion detection/prevention; gateway virus, spam and content filtering; VPN and vulnerability scanning.
In any online transaction, businesses must confront a significant and growing challenge: How to verify a customer’s identity in real time without diminishing the customer’s ...
Trustwave provides end-to-end managed security services to protect against common malware, spam, phishing, zero-day threats, botnets and even fraud and insider abuse.
XyberSecure’s XyberShield is a global security as a service (SaaS) offering designed to protect users from website-level security threats.
The emerging popularity of virtual computing has very few blemishes considering its youth. One of those, unfortunately, is security both of the underlying operating environment ...
A highly motivated workforce creates a protection system, says Justin Somaini.
Sign up to our newsletters
SC Magazine Articles
- State breakdowns: Anthem breach by the numbers
- Malware on Lime Crime website, payment cards compromised
- Botnet of Joomla servers furthers DDoS-for-hire scheme
- Bug in popular WordPress plugin opens up websites to SQL injection attacks
- Report: Majority of health-related websites leak data to third parties
- State breakdowns: Anthem breach by the numbers
- Carbanak APT campaign made off with $1B from banks globally
- NIST requests final comments on ICS security guide
- Disconnect yawns between CISOs, exec leadership, study says
- Microsoft phishing emails target corporate users, deliver malware that evades sandboxes
- Infections caused by prevalent financial trojans dropped 53 percent last year
- Spammers leverage DMARC to more successfully distribute ransomware
- Laptop stolen from employee contained data on Pioneer Bank customers
- In growing market for genetic data, privacy implications prove lasting
- Natural Grocers investigating unauthorized access to POS systems