Legal & Professional Services
Anonymous stayed busy on Friday with the dump of 300 GB of emails and other communications, lifted from the law firm representing a U.S. Marine who recently escaped jail time for his role in a 2005 massacre.
A Midwest law firm found a way to protect its network operations across 15 states...and meet PCI compliance, reports Greg Masters.
A federal appeals court has ruled that a Washington resident cannot sue an email marketing firm over spam he received.
An organization that sells consumer information, including names, Social Security numbers, credit card numbers and credit histories, has settled Federal Trade Commission charges that it failed to properly screen potential customers, leading to the sale of at least 318 reports to ID thieves.
Despite the ongoing financial crisis, IT security spending is expected to grow this year, according to two reports from Forrester.
And so we reach the end of this year's batch of innovators. But, as we look at this subcategory, we find that it wraps the whole shebang into a neat package, defining what needs to be done to secure the enterprise (and prove it) and why.
All of us old-timers remember LanDesk from its days as part of Intel. It always was a solid suite of products. Now that it is part of Avocent, its promise as a hybrid of network and security policy management is being realized. The notion of managing the desktop and evolving that into security policy management makes a lot of sense.
The views of the visionary I spoke with from this veteran anti-malware company took the conversation in directions I had not expected. He started out by asking, "Why, if I have done everything I can to secure my enterprise, is my data still being compromised?"
I don't recall the first time I heard the term "extrusion prevention system." It was, I think, an effort on the part of some marketer to tie the notion of preventing data from unauthorized exit (extrusion) from the enterprise to the notion of unauthorized entry (intrusion). Very clever.
No matter how much things change, they stay the same. As I have pointed out, there have been massive changes in security drivers over the past 12 months. The changes have generated a new set of challenges, but, even though our encryption innovator has done a first-rate job of addressing them over the past year, the new issues are generating a sort of déjà vu picture of the encryption market.
The big question I had for Tumbleweed was, "What is email security?" Over the past two years, as we have passed products through SC Labs, I have noticed that the vendor public relations folks who we talk to seem to have a hard time differentiating between the many aspects of threats associated with email.
Wireless, is it? Everything is going wireless - well almost everything. That, in itself, poses a challenge for a wireless security company, such as this innovator. It also offers big opportunities and AirMagnet has identified and addressed them.
If you thought the UTM market was crowded, take a look at the intrusion prevention systems (IPS) market. We bluntly asked our innovator in this product space why they thought that they were innovators in such a commoditized market. The answer was immediate and unambiguous: "When a product category becomes mainstream, there are big opportunities, but you must innovate to take advantage of them."
Sometimes a different approach is needed. The notion of the UTM was developed from the need to consolidate point solutions. There are a lot of problems, of course. They cost more to buy and manage, they use more power and they need a sophisticated staff to manage them.
Sometimes you run across a company that just deserves to be selected as an innovator. You look them over and wonder why you didn't pick up on them before. Mandiant is one of those companies. There is a reason, of course. Mandiant started as a services company providing forensics, litigation support and incident response. So if you were in the product purchasing mood, you would not have run across these folks.
ArcSight gets a lot of play among security experts in the security event management (SEM)/security information manager (SIM) game.
How do you differentiate a product that keeps getting mixed up with a commoditized market, but really doesn't belong there? What differentiators do you look for that can keep you from being included in a herd where you don't belong?
I just love these folks. Take the best open source pen testing tool you can think of, put it on steroids, give it a user interface that makes it simple and fast to pen test in a production environment without losing the granularity of manual testing if you need it, and you have Core Impact. Well, almost. Every year I say that I am going to find a better tool, and I actually do comb the market -- unsuccessfully.
When your price starts at $50,000 and you are unique in your marketplace, you'd better have a good product. For Mu Dynamics, that is just where the story starts. When I first met the Mu folks, they were Mu Security. A new name later, they still are the innovators they were a couple of years ago. My conversation with a Mu visionary was an eye-opener.
This Swedish company will, I predict, set the benchmark here in the United States for how access to applications should be controlled. AppGate has helped shape the direction of network infrastructure security in Europe for some years, and now this innovator is bringing its unique thoughts to the States.
What sets these guys apart from the multifactor herd? In a word, vision. From the start, TriCipher has had the vision of evolving into a full identity management provider. That is a pretty heady ambition for a developer of multifactor authentication tools. So how does this innovator plan to make the trip from providing a piece of the puzzle to offering the whole thing, already assembled, framed and hung on the wall?
Start with the recognition that identity management is just too hard to do, create a solution for that problem and then morph it into a successful service and you have the recipe for a real innovator.
Here is another vendor that we see a lot of in our labs. Passlogix knows who it is and concentrates on doing what it does as well as it can be done. And what they do is credential management.
Bradford Networks is no stranger to these pages. An innovator from last year, Bradford has been reviewed a number of times over the years, always doing well. This year we asked them how well their crystal ball last year worked as 2008 unfolded.
A significant proportion of hard disks analyzed in an ongoing study contained sensitive data about businesses and individuals.
Getting the chief financial officer to take the lead on cyber-risk will go a long way to helping organizations achieve adequate security funding, according to a guide released Monday for corporate money men and women.
A panel at RSA explores wiretapping and the legal ramifications for ISPs.
E-discovery investigations can look into the alleged wrong-doings of a terminated employee and/or provide electronic records for use in corporate litigation, a lead forensics investigator told RSA Conference attendees on Wednesday.
There is a wide gap between IT security skills that organizations need and the skills IT professionals bring to the job, according to a new survey by the Computing Technology Industry Association (CompTIA).
A federal judge in San Francisco has ordered the disabling of a website that discloses confidential information, a precedent-setting ruling that may raise a legal challenge to the growing online black market in purloined data while testing First Amendment rights.
Sign up to our newsletters
SC Magazine Articles
- Angler Exploit Kit pushed in xHamster malvertising campaign
- Flaw makes Trendnet, D-Link routers vulnerable to remote attack
- Macro malware makes a comeback with BARTALEX attack
- Representatives question FBI and point out fallacies during default encryption hearing
- Malicious docs submitted to CareerBuilder job listings distribute malware
- Cyber attacks to rise, but competent security talent scarce, study says
- Cybersecurity bills move forward on Capitol Hill
- Data possibly exposed for more than 364K Auburn University students
- Banking industry security protocol falters in third-party vendor contracts
- Malicious docs submitted to CareerBuilder job listings distribute malware
- FireEye first cybersecurity firm awarded DHS SAFETY Act certification
- Linux malware 'Mumblehard' has spamming feature, backdoor component
- Vulnerability enables downgrading of MySQL SSL/TLS connections
- Oregon's Health CO-OP laptop stolen, about 15K members notified
- UC Berkeley announces breach, unauthorized access to web server