Features

Company news

Company news

Louis Turpen, former CEO of San Francisco International Airport, has joined Vidient Systems' Board of Advisors. Turpen will lend his counterterrorism experience while on the board at Vidient, a developer of behavior recognition software used to detect breaches. Turpen joins other notable figures on the board, including Richard Clarke, former White House cybersecurity adviser. www.vidient.com
Staff Writers Aug 7 2006 9:05PM Security
2 minutes on ... EMC and RSA unite

2 minutes on ... EMC and RSA unite

This year has been a big one for security mergers and acquisitions, but it is likely that no deal will be as momentous as the one announced by EMC Corporation and RSA Security in July.
Ericka Chickowski Aug 7 2006 8:59PM Security
Me and my job

Me and my job

What do you like the most about your job? The changing demands in security. Never the same problem twice. I have never had two days the same.
Scott Brown, Aug 7 2006 8:54PM Security
An inescapable evolution

An inescapable evolution

A few years ago, the notion of carrying around a phone with communicator-like capabilities would have sounded far-fetched. Yet, the arrival of dual-mode phones and wireless LAN phone systems is rapidly changing our ideas about mobility.
Luc Roy, Aug 7 2006 8:45PM Security
Sometimes, things just work

Sometimes, things just work

I write a group review in this magazine just about every month. As you might imagine, we get a lot of argument about some of our reviews that didn't live up to the expectations of the PR people. That certainly was not the case recently with a product from Top Layer that we reviewed. We did not cover the product with glory, although it was a good product. It was one of those that we liked, but perhaps not quite as much as we liked something else. It happens.
Peter Stephenson, Aug 7 2006 8:39PM Security
Remember: answer the questions

Remember: answer the questions

Most of the different methods of security reporting deal with the specifics of what data points to collect, when to collect them, and where to report the results. Security metrics are simply tools designed to facilitate the decision-making process. They will ultimately help improve performance through the collection, analysis and reporting of information-security-related data points. But, looking at security reporting systems from the customer perspective may lead you in a new, more user-focused direction.
Gene Fredriksen, Aug 7 2006 8:27PM Security
Got something to say?

Got something to say?

Send your comments, praise or criticisms to scfeedbackus@haymarketmedia.com. We reserve the right to edit letters.
Staff Writers Aug 7 2006 8:22PM Security
Missing laptop, missing policy

Missing laptop, missing policy

A dedicated federal civil servant took work home. Unfortunately, the federal agency he worked for had not taken easy steps to make that practice safe and secure. Thus, when a neighborhood gang of thieves broke into his house and stole the laptop, identity information about millions of veterans and members of the armed forces was potentially compromised. It was a typical Washington story, typical because no one suggested doing anything to solve the real problem revealed by the incident. It reminded me of the two giant paintings in the piazza in Sienna, Italy. One image is of dysfunctional Bad Government, the other of progressive Good Government.
Richard Clarke Aug 7 2006 8:00PM Security
Industry views: What's consolidation doing to development?

Industry views: What's consolidation doing to development?

With the recent announcement that EMC will be buying RSA Security, it is clear that the consolidation wave is rolling through the identity authentication and management space. This wave probably began in December of 2005 when RSA bought Cyota, but while that deal could be viewed as a one-off acquisition of a private company by a much larger public company, this $2 billion acquisition signals the start of real changes to come.
Kevin Watson, Aug 1 2006 3:57PM Security
Review: DESlock+

Review: DESlock+

DESlock+ is a useful and comprehensive collection of encryption tools for Windows environments, packaged in an intuitive, easy-to-use manner.
Julian Ashbourn Aug 1 2006 12:00AM Security
Review: DeviceWall

Review: DeviceWall

Even comprehensive security at the desktop and network periphery can sometimes be defeated by something as simple as a USB stick or mobile device. But solutions have been few and far between.
Julian Ashbourn Aug 1 2006 12:00AM Security
Review: ProtectDrive

Review: ProtectDrive

ProtectDrive encrypts disk drives, either wholly or in part, an approach that may well appeal to organizations or government agencies which run a fleet of laptops, or have multi-user access to fixed workstations. In such cases, concerns about data being misappropriated from the disk drives, should they fall into the wrong hands, can be very real.
Julian Ashbourn Aug 1 2006 12:00AM Security
Review: SecureDoc

Review: SecureDoc

This is not just a simple plug-and-play product. It is perhaps better thought of as an encryption methodology for those who understand IT security and wish to incorporate robust protection for sensitive data resident on their hard drives or portable media.
Julian Ashbourn Aug 1 2006 12:00AM Security
Review: Laplink PCdefense

Review: Laplink PCdefense

Everyone above a certain age remembers Laplink. Back before PCs were easily networked, you copied files from A to B by connecting serial or parallel cables and firing up the Laplink DOS agent. The firm has come a long way since then, and its range of data management and migration tools has expanded over the years.
Jon Tullett Aug 1 2006 12:00AM Security
On compliance: Congress must act on cyber security to avoid confusion

On compliance: Congress must act on cyber security to avoid confusion

Over the next year or so, this space will provide a monthly guest perspective on various aspects of regulatory compliance from the leading information security companies that make up our CSIA's membership. For our inaugural column, I'd like to focus on the need for Congressional action on data security.
Paul Kurtz, Jul 20 2006 7:52PM Security
Industry views: Look for more spending on convergence, insider threats

Industry views: Look for more spending on convergence, insider threats

The speed of change in IT security is intense and often seemingly chaotic. Security solutions today must constantly morph to reflect not only the shifting needs of customers, but also the advancing capabilities of security threats. The proliferation and progression of DoS attacks and phishing sites, to name a few, demand new means to detect and block criminals. Senior executives, meanwhile, want simplicity and better command and control over the many security solutions they implement. Despite this ever-changing landscape, there are, however, a number of general trends that, from our view as investors, are likely to organize and drive development of IT security products and services over the near and intermediate term.
David Shapiro Jul 18 2006 8:19PM Security
Be careful where you leave your keys

Be careful where you leave your keys

The internet now has 1.07 billion users worldwide and more people buy online than ever before. But this growth in ecommerce has also created a fertile environment for fraud and security threats.
Richard Moulds Jul 13 2006 11:56AM Security
Tangible ROI is possible for IT purchases

Tangible ROI is possible for IT purchases

Return on investment. How many times have you heard or used that phrase in your career? If the answer is never, it's a surprise, but not a total surprise. Measuring the return on investment on IT procurement has not always been the major driving factor – too often, technical specs and whizzy feature lists have clouded purchasing decisions.
Paul Fisher Jul 12 2006 5:01PM Security
Debate: Can there be any justification for organisations monitoring their staff's email?

Debate: Can there be any justification for organisations monitoring their staff's email?

Mark Hughes Jul 12 2006 4:50PM Security
The rise and rise of the quiet trojan

The rise and rise of the quiet trojan

Trojans made up more than 80 per cent of new malware infections over the past six months, according to research from Sophos. Graham Cluley, senior technology consultant at Sophos, said it was because "financially-motivated hackers don't want to infect millions of emails because it draws attention to their malware".
Melissa Loveday Jul 12 2006 4:40PM Security

Log In

  |  Forgot your password?