April 01, 2006 | SC Media

Print Issue: April 01, 2006

Your invitation to the SC Forum

At the SC Magazine Forum, you could gain information, advice and great contacts to help you more readily achieve your goals as an IT security pro. Read on to see if you qualify for a free delegate place.

IDM: Moving up

Knowing who’s accessing what on enterprise networks that often lack defined perimeters is a necessity. So many company executives are trying to sort out the problems associated with establishing, controlling and terminating their employees’ various user rights.

Raising information exchange

SC Magazine is providing an exclusive look at abridged versions of various chapters included in the just-released Larstan’s “The Black Book on Government Security,” as part of an agreement with Larstan Publishing. This month’s excerpt will be available in an extended form on http://www.scmagazine.com.

Cover story: Defining trust

As the mastermind of the Bali nightclub bombings awaited execution, he published a jailhouse autobiography teaching others to follow in his footsteps.

Controlling the endpoint

There’s yet another IT security bandwagon onto which any number of vendors are jumping. And, whether companies refer to it as network access management (NAM), network access control (NAC), or network access protection (NAP), the main question is: Who has the real deal?

Locking down WLANs

If I say the word security to you, what comes to mind? Do you think of the access card keys that allow you into your buildings; firewalls to protect your IT infrastructure; or cameras to monitor facilities? Perhaps you think of how to protect the data on your laptop if it is stolen.

Got something to say

Send your comments, praise or criticisms to scfeedbackus@haymarketmedia.com. We reserve the right to edit letters.

Paying the cost to be the boss


In our organizations, we need to take a strong lead in many areas. The first area is awareness. There used to be a commercial where an executive, with a bit of a smirk, tells an IT engineer that he just opened an email attachment — like he was told not to. In our organizations, we know that sort of thing is happening somewhere in the company.

The worm turns on Apple

Macintosh enthusiasts have long used the security of their systems as a flag to wave in the faces of their Windows-using counterparts. With the recent announcement of some key holes in Mac OS X, that flag is drooping.

Next post in News