September 2013 Issue of SCMagazine
This month's issue includes features on incident response, application security, as well as a deep look at GRC in the industry today.
The power of information as a commodity only continues to deepen as it satisfies so many disparate needs and wants.
News bits you may have missed from Black Hat and DefCon 2013, as well as other summarized highlights of major incidents taking place.
News from AirTight Networks, Seculert, Hackett Security, MobileSpaces and others.
Threat of the month
September's threat of the month is the Android master key vulnerability, which can bypass signature verification to gain full system-level access.
2 minutes on
Wiretapping, tailing and going undercover are not new investigative concepts, but revelations of the NSA's digital spying apparatus has revived the debate between privacy rights ...
Skills in Demand
Companies who leverage the cloud have concerns over the security of their data. The migration has increased demand for incident response pros, including reverse engineers ...
Me and my job
September's "Me and my job" features Geoff Linell, group CIO for Celerant Consulting.
A number of experts weighed in on this month's debate concerning a statement from DefCon founder Jeff Moss that feds should stay away from DefCon.
There are serious risks involved when dealing with phishers.
There are a few key things every business should consider to truly improve data security.
We CISOs and CSOs are the generals in the global cyber war. If you haven't thought about your role in these terms, then you are ...
Though it is difficult to quantify ROI for security initiatives, investment in application security is logical for the enterprise, reports Jim Romeo.
Incident response has become a more complex art, says Rusty Agee, the city of Charlotte's security leader. Karen Epper Hoffman reports.
A U.K. college provides its "digital natives" with a secure environment that can be accessed anywhere from any device. Greg Masters reports.
The promise of governance, risk and compliance technology is alluring, but getting it to work effectively is a different story, reports Alan Earls.
There was a noticeable chill in the air at Black Hat and DefCon, due to recent action taken against security researchers, reports Dan Kaplan.
How are the latest NSA spying revelations affecting Canadians' use of the internet? Danny Bradbury finds out.
Robust enterprise security requires more than checking compliance boxes, says Diebold CSO Adam Williams.
This month's product section focus on email security and management.
Group Test 1
The MailGate SC from Axway incorporates email security with safeguard collaboration functions.
The Spam & Virus Firewall from Barracuda Networks provides solid inbound and outbound email security functionality through a feature-rich appliance.
The Cisco Email Security virtual appliance offers a full set of inbound and outbound email security and control features.
The ePrism Email Security appliance from EdgeWave offers email security features such as inbound and outbound content filtering and email policy enforcement, anti-spam and anti-virus.
The F-Secure Protection Service for Email is a fully hosted email security offering that can work in tandem with an already existing email server to ...
The FortiMail-200D from Fortinet features many email security features bundled into an easy-to-manage appliance. It includes anti-virus, anti-spam, onboard identity-based encryption, and content filtering and ...
McAfee Email Protection offers full-scale email security and content management in a single appliance with flexible deployment options.
The XCS (Extensible Content Security) Appliance from WatchGuard provides solid email security and email content management in one easy-to-manage appliance.
Group Test 2
This tool manages card-not-present (CNP) transactions.
This solution offers comprehensive protection for websites.
This product provides account takeover protection.
This solution, part of our Emerging Products Group Test on online fraud, provides two-factor authentication in a consumer environment.
Sign up to our newsletters
SC Magazine Articles
- Impact of Linux bug 'grinch' spans servers, workstations, Android devices and more
- House, in rush vote, passes Intelligence Authorization Act
- More than 100K WordPress sites compromised by malware due to plugin vulnerability
- Phishing email contains Word doc, enabling macros leads to malware infection
- U.S. accounts for most Mac OS X attacks and websites seeded with malware
- White House calls Sony hack a "serious national security matter," gov't mulls proper response
- 'Spark' shares traits with Alina, JackPOS, uses AutoIt differently
- California nonprofit sues San Diego Police Department over stingray documents
- Critical 'Misfortune Cookie' bug puts millions of internet-connected routers at risk
- Securing the enterprise with the five W's of access