May 2015 Issue of SCMagazine

May 2015 Issue of SCMagazine

May issue of SC Magazine

Editorial

Trifecta 2.0: Trust, privacy and security

Trust directly correlates to our expectations of privacy, says Illena Armstrong, VP, editorial.

Update

News briefs May 2015

Premera Blue Cross breached, an executive order to combat cyber-enabled activities, and other IT security news.

Briefs: Company news (May 2015)

Personnel moves and other goings on in the IT security space.

Threat of the month

Threat of the month: May 2015

Apache Cordova Cross-Application Scripting (XAS)

2 minutes on

Solutions going to waste

Communicating properly with upstream management might help you and your company avoid shelfware, security solutions that are neither deployed nor used.

Skills in Demand

Skills in demand (May 2015)

As demand for security professionals skyrockets, the ability to find and attract this talent is limited by organizations' recruiting process and talent.

Debate

Debate: Congress should mandate that the payment card industry adopt safer technology.

Debate: Congress should mandate that the payment card industry adopt safer technology.

Opinion

IT only guards the front gate

It's time for a dramatic reimagining of how companies approach security.

To thine own self be true

Much needs to be done to convince boardrooms of the importance of information security.

CSO's desk

Staying safe in cyber land

It is important for everybody to stay vigilant when online, says Lena Smart, CIO, New York Power Authority.

Features

Privacy matters

Greater connectivity has changed the way we view privacy - and the Fourth Amendment, says Hilary Wandall, CPO at Merck. Teri Robinson reports.

Sign on the digital line: Case study

Biopharma companies need a secure digital signing infrastructure. SureClinical found an answer for them, reports Greg Masters.

The data backlash: Privacy

Is resistance forming against data-sharing in America? The consensus seems to be a resounding 'yes,' reports Ashley Carman.

Passing the buck: Data breach

The battle over who pays what to cover the cost of stolen credit card information is heating up, reports Lee Sustar.

Product opener

UTM, SIEM. What's the difference?

It is clear that these are two entirely different beasts. But do we need both?

Group Test 1

AlienVault Unified Security Management (USM)

The AlienVault Unified Security Management platform is one of the most unique products we have ever had the pleasure of reviewing.

Check Point Software Technologies 1180 Next Generation Threat Prevention Appliance

Check Point Software 1180 Next Generation Threat Prevention Appliance (NGTP) is a unified threat management (UTM) firewall, router, gateway and wireless access point.

CorreLog SIEM Correlation Server v5.5.0

The CorreLog SIEM Correlation Server is a flexible solution to strengthening security on a network.

Cyberoam Technologies CR1000iNG-XP

Cyberoam CR1000iNG-XP is a next-generation firewall appliance that includes VPN, email, anti-virus, HTTP and HTTPS and FTP anti-virus, anti-spam and IPS with custom signatures inside ...

Dell SonicWALL NSA 3600

The Dell SonicWALL NSA 3600, along with its TotalSecure license bundle, is the company’s offering for the UTM gateway and next-generation firewall market.

EiQ Networks SecureVue

The EiQ Networks SecureVue software suite is a comprehensive log and asset management system that lets network administrators quickly get the full picture of what ...

EventTracker Security Center v7.6

The EventTracker Security Center v7.6 is a great solution for enterprise security information and event management (SIEM).

LogRhythm Security Intelligence Platform

LogRhythm is a security information and event manager that is extremely customizable, functional and user friendly.

ManageEngine EventLog Analyzer v10.0

The EventLog Analyzer from ManageEngine is quickly installed and easily scalable software that can be implemented for a network’s SIEM solution.

McAfee Enterprise Security Manager (ESM)

Intel Security’s McAfee Enterprise Security Manager (ESM) is a security information and event management suite. It is available as a VM or hardware appliance and ...

Netikus EventSentry v3.1.1.29

The EventSentry from Netikus brings to the table a plethora of functionality to ensure system security.

NetIQ Sentinel v7.3

The NetIQ Sentinel may be one of the best SIEM solutions for your network.

SolarWinds Log & Event Manager

SolarWinds Log & Event Manager is one of the most popular SIEMs on the market today – and with good reason.

WatchGuard Firebox M440

The Firebox M440 is the latest next-generation firewall offering from WatchGuard.

ZyXEL Communications USG1900

The ZyXEL Communications USG1900 is a comprehensive UTM firewall that is brilliantly simple to set up.

Last Word

Data exfiltration defense

A single solution won't stop data theft, says ADP's Roland Cloutier.

Watch out for third-party apps

Vendors bundling software with open source libraries caught the IT community unprepared, says Secunia's Kasper Lindgaard.