July 2016 Issue of SCMagazine

July 2016 Issue of SCMagazine

July-August

Editorial

Advocating for gender diversity together

Accomplished, intelligent and experienced women are filling executive leadership roles, says Illena Armstrong.

Analysis

Pervasive security in a connected world

In an increasingly connected world, we will need the right security, in the right place, at the right time, says Cisco CSO Edna Conway.

As the imagination allows

You can map your own route to a cybersecurity career, says HPE's Jewel Timpe.

Opinion

Diversity means better results

My gender doesn't matter, but my skills and actions do, says Caroline Wong, security initiative director, Cigital.

CSO's desk

Demystifying CASB

Cloud access security brokers are becoming a key initiative for many CISOs, says Latha Maripuri, SVP and global CISO, News Corp.

Features

Power Players

These 10 women were selected for their longstanding contributions to the IT security space.

Equal? Not quite

It's time to broaden the concept of what a career in information security looks like, particularly for women, reports Teri Robinson.

That '70s show: Sexual harassment

New legislation and evolving corporate policies are fighting back against online harassment, reports Doug Olenick.

Where are they now?

Executive Editor Teri Robinson caught up with a few women we've honored in the past to see how their careers - and the security landscape ...

Equality revolution

The pace may be slow but we're moving forward. We explore gender diversity and more in our third annual Women in Security issue.

Women of influence

These eight women are featured for their noteworthy efforts, which have impacted the field of online security and data privacy for the better.

Women to watch

We selected seven women whose achievements struck us as not only remarkable but deserving of wider recognition.

Product opener

Managing a herd of escaped cats

The big challenge today with mobile device security, of course, continues to be BYOD.

Group Test 1

Citrix XenMobile

Of the products we reviewed, Citrix XenMobile was the easiest to deploy, use and provision.

IBM MaaS360

Security is excellent and the policy capabilities are what you should expect in a product of this type.

Sophos Mobile Control

Out of the gate we need to say that this product impressed us.

VMware AirWatch Enterprise Mobility Management

This product is well thought-out and has a lot of good functionality.

First Look

First Look: Exabeam Threat Hunter

Threat Hunter from Exabeam focuses on the user's behavior and builds a model.

Last Word

The rise of cyber hunting

Employ cyber hunters who can find malicious activity within the network, says Kristin Lovejoy.