Over the past year, there have been numerous creative features added to just about every digital forensic tool that we reviewed.
This month we look at security information and event management (SIEM) tools.
FortiDDoS is an appliance that examines data packets in a variety of ways to separate DDoS packets from legitimate packets.
The notion of authentication is one that is so familiar to most of us that it hardly bears discussing. Or does it?
Now we get to the meat of the issue: Protecting the data directly.
These tools define and manage the security infrastructure by managing risk and implementing policy.
The cloud and its core enabling architecture virtualization needs a special kind of security.
This year's inductees have a loyal following, good year-on-year growth and the right stuff for their respective niches
Protecting the perimeter is usually about dealing with threats and this year's Innovators do a great job of addressing that.
This year, the information security industry has given all of us a gift of sorts: a bumper crop of new tools. And, we're calling out a number of Innovators, selected for standing out above the crowd.
It's all about protecting enterprise data, says Peter Stephenson, technology editor.
When we talk about access control, we usually assume that we are discussing all of its aspects, including identification, authentication and authorization.
There are two times when we need analysis and testing: before and after an event.
For the third year in a row, students in the computer forensic class of SC Magazine Technology Editor Peter Stephenson have produced this month's Group Test for digital forensic tools.