September 2012 Issue of SCMagazine
President Obama now is considering an executive order to breathe some life back into the Cyber Security Act of 2012 with the goal in mind ...
The Cybersecurity Act of 2012 was defeated in the Senate, FinFisher spyware analyzed, nation-state-created espionage malware Gauss, and other breaking security news
Lancope has appointed Tom Cross as director of security research, Wells Fargo & Co. has named Rich Baich CISO, and other personnel announcements and corporate ...
Threat of the month
Unauthorized information disclosure via "paste" sites has been a common occurrence as a part of recent high-profile information security breaches.
2 minutes on
The head of the NSA, the entity many consider to be the prime culprit in the "surveillance state," sought to persuade the crowd at the ...
Skills in Demand
There's a high demand for sales engineers who can provide the technical expertise to align solutions with clients.
Debate: In light of recent breaches, passwords remain a useful method for authentication.
Trojans can propagate further - without detection by anti-virus applications - when they are digitally signed.
If our greatest vulnerability is the human factor, then why is it neglected?
A Q&A with Adel Danesh, manager, enterprise systems at The Hospital for Sick Children in Toronto.
Policies form the cornerstone of the information security program and are instrumental for enforcing global consistency, driving change and launching enterprise programs.
With breaches grabbing headlines and cash funneling toward infosec budgets, the role of the security executive is shifting from tech and compliance wonk to savvy ...
When the history of the cyber arms race is written, the first chapter surely will be devoted to Stuxnet. But now that these sophisticated strikes ...
Applications provide the path to an organization's coveted assets. And even if they're not public-facing, they still can be a ripe target. We talk to ...
The ability to marry physical and logical security controls is maturing, which means companies can find efficiency wins, while in the process lowering their risk ...
We need to consider all of the traditional facets of information security when we consider protecting information on the internet.
Group Test 1
The Axway MailGate SC offers a full set of features for both email content management and security.
Using this appliance, administrators can protect their enterprise from both inbound and outbound threats, such as spam, viruses, phishing, spyware and email address spoofing.
With this email security and content management tool in place, administrators can protect their environment from spam, viruses and other mail-based malware while managing email ...
The SECURE Email Gateway from Clearswift offers up strong features and functions for email security and content management.
The SecureMail Gateway from DataMotion provides the ability to easily integrate full email encryption into an existing enterprise environment.
The Encrypted Mail Gateway from Echoworx offers a full cloud-based platform for seamless email encryption throughout the enterprise.
The FortiMail-400C, while complicated to set up, offers an incredible feature set at an affordable price.
The Halon Virtual Security Appliance from Halon Security is a quick and robust email gateway, but administrators should be prepared to learn a new scripting ...
This email security and content filtering tool does everything we would expect, with a combination of flexibility and ease of use seldom seen.
TITUS Message Classification is a tool with which to classify messages, yes, but email security is not its primary focus.
Combining on-premise software with an optional cloud-based pre-filter, the tool provides a flexible approach to email security.
Providing content filtering and encryption, the XCS 570 from WatchGuard Technologies allows administrators to easily combat data leakage.
Group Test 2
If one could get the cost, ease of use and provisioning into a practical range, one could offer multifactor authentication to all users. That is ...
Wombat Security Technologies is in the business of threat filtering and user training. For this month, we looked at their training.
EastNets offers a sophisticated suite of filtering products that, taken together, give financial institutions what they need to combat fraud and money laundering.
NICE Actimize covers most of the online fraud bases, including money laundering, case management, brokerage compliance and overall security. It is a truly high volume ...
This is a suite of products that covers fraud detection (heavily phishing-oriented), browsing protection, multifactor authentication and transaction anomaly detection.
Flame's cryptofunctionality silenced all the haters, says F-Secure's Mikko Hyppönen.
SC Magazine Articles
- Yahoo breach; State-sponsored actors suspected, at least 500 million accounts affected
- Cybercriminals already able to hack ATM biometric readers
- Education sector bullied by ransomware and can barely defend itself, report
- DetoxCrypto ransomware imitates Malwarebytes software
- Cisco warns of exploitation of new flaws linked to Shadow Brokers exploits
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Hard Rock Hotel & Casino Las Vegas hit with POS breach
- X-ray and MRI machines among devices used as springboards for data breach attacks
- Hacker purportedly selling over 650,000 stolen medical records on dark web marketplace
- Wi-Fi warning! Study finds U.S. unaware of public Wi-fi risks
- Yahoo faces congressional action and class action lawsuits following historic data breach
- Case study: Hawaiian Telcom says aloha to AlienVault security management
- Pippa Middleton's iCloud account hacked
- OpenSSL patches 14 vulns, including high-severity flaw that can be exploited for DoS attacks
- IoT assault, connected devices increasingly used for DDoS attacks