August 2012 Issue of SCMagazine

August 2012 Issue of SCMagazine

August 2012


Staying out of the headlines

Yahoo presumably took no measures to ensure sensitive stuff like customer account credentials were kept safe and sound.


Company news: SysAid Technologies appoints a new CEO, Invincea receives big contract

Personnel moves, government contracts and other news in the security industry.

News briefs: Anonymous takes credit for hack, and other security news

Anonymous, WikiLeaks, DNSChanger, Stratfor, global cyber crime ring...and other breaking news.

Debate: The evasiveness of Flame may have been what prevented

The evasiveness of Flame may have been what prevented traditional AV technology from catching it sooner.

Threat of the month: MS zero-day

The threat of the month for August is the MS zero-day.

2 minutes on

U.S. cyber coordinator moves on

Security veteran Howard Schmidt filled a spot few others reportedly wanted: the role of U.S. cyber security coordinator. Two-and-a-half years later, he's leaving the job, ...

Skills in Demand

Skills in demand: Project management and risk planning

IT business continuity (BC) and disaster recovery (DR) specialists have been in great and continuously growing demand, says Prescient Solutions' Jerry Irvine.

Me and my job

Me and my job: Walter Strycharz Jr.

Walter Strycharz Jr., a senior IS auditor at the University System of Maryland, discusses some of the concerns, challenges and achievements he has experienced.


Needed: Better app control

Many of today's applications are designed to work over any port, which increases chances they won't be blocked by firewalls.

Infrastructure wake up call

The increasing connectedness of infrastructure increases the cascading effect an attack can have on other infrastructure sectors and capabilities.

CSO's desk

First: Define critical infrastructure

Consensus needs to be developed around how critical infrastructure is defined, says Mark Clancy, managing director and CISO for The Depository Trust & Clearing Corp.


Sharing the pie: Threat collaboration

Many view information sharing as an elusive quest, hampered by various roadblocks. But Georgia Tech researchers want to tear down these hurdles with a new ...

Measuring success: Performance metrics

Security metrics remain elusive for many organizations, but key performance indicators, or KPIs, are achievable measurements that can help guide business planning and strategy.

Embracing BYOD: Mobile challenge

Businesses may no longer be able to turn away employees who want to bring their smartphones and tablets to work, and connect to the corporate ...

Product opener

Pervasive protection: Endpoint security

Endpoint security today is responding to the needs of the enterprise in ways it has not in the past, says Technology Editor Peter Stephenson.

Group Test 1

Check Point Endpoint Security

Endpoint Security from Check Point offers up a lot of functionality that can be customized for the needs of the environment.

DeviceLock Endpoint DLP Suite

The Endpoint DLP Suite from DeviceLock offers full control over devices, peripherals and ports throughout the enterprise.

ESET Endpoint Security

Endpoint Security from ESET focuses on malware prevention and overall system security to mitigate threats throughout the enterprise.

GFI EndPointSecurity 2012

GFI EndPointSecurity 2012 provides administrators a simple way to lock down computers across the enterprise network to ensure only authorized removable media devices are used ...

Identity Finder DLP Suite

Administrators can use this product to remotely scan and search remote machines for personal information. It then can remediate possible compliance violations by shredding, redacting, ...

McAfee Total Protection for Endpoint

Total Protection for Endpoint from McAfee offers just what the name says: a full-scale suite of tools to protect and secure endpoints throughout the enterprise ...

Novell Endpoint Protection Suite

The Endpoint Protection Suite can leverage already existing Microsoft Active Directory or Novell eDirectory structures to manage policies based on users or computers, thus offering ...

Wave Systems EMBASSY Remote Administration Server

Administrators can use this product to quickly and easily manage many types of both hardware- and software-based encryption throughout the enterprise.

Arkoon Network Security StormShield v6.x

StormShield is designed to enhance endpoint security through user control, system level security, data protection and network connectivity.

Bit9 Parity Suite V6.0.2

Bit9 Parity is a policy-driven whitelisting solution for managing the applications and devices that can run on Windows computers.

Kaspersky Endpoint Security 8

Kaspersky Endpoint Security 8 provides a centralized solution for managing corporate network anti-virus security systems based on Kaspersky Lab applications included in Kaspersky Open Space ...

Lumension Endpoint Management and Security Suite v7.1

Lumension Endpoint Management and Security Suite (LEMSS) is an application that serves as a platform for other applications that protect a network from security risks.

Quarri Technologies Protect On Q v2.7

Protect On Q (POQ) from Quarri Technologies is a security software solution that empowers organizations to protect browser-delivered content from compromise on the endpoint.

Sophos Endpoint Protection v10

Sophos Endpoint Protection v10 provides a single, automated console for Windows, Mac, Unix, Linux and virtual platforms to centrally manage anti-virus, firewall, intrusion prevention, web ...

Symantec Endpoint Protection 12 v12.1

Symantec Endpoint Protection 12 is a client-server solution that protects laptops, desktops, Mac computers and servers in a network against malware.

Trend Micro Enterprise Security for Endpoints

Trend Micro Enterprise Security for Endpoints is a centrally managed security suite for desktops, laptops and mobile devices.

First Look

Ping Identity

Authenticating to a SaaS application in the cloud should be simple. It now Is.

Ping Identity PingOne

Cloud-based federated identity management for “cloud identity management switch.”

Last Word

New partnerships required

Only through collaboration can government and the private sector thwart cyber attacks, says Raymond Choo.