Features

News briefs

News briefs

The uproar over foreign control over American interests was blamed for the break-up of one nearly successful IT security merger. Check Point Software Technologies Ltd., which is based in Israel, and Maryland-based Sourcefire broke off a $225 million merger that came under intense scrutiny by the Committee on Foreign Investment in the United States (CFIUS). “Basically we agreed to withdraw applications based on a couple of things,” said Michelle Perry, chief marketing officer for Sourcefire. “First the complexities of the overall CFIUS process, the lengthy ongoing delays and the current climate for international acquisitions.
Staff Writers May 10 2006 8:09PM Security
Debate

Debate

NBA systems are the most effective solutions for stopping worms and viruses.
Adam Powers May 10 2006 8:08PM Security
Company news

Company news

Kevin Prince has joined Perimeter Internetworking as chief security officer. Prince will help formulate the managed network security firm’s strategic and product development plans and oversee its strategic relationships. Prince previously founded Red Cliff Solutions and he currently trains federal examiners on security topics such as firewalls, intrusion detection and prevention, and remote access. www.perimeterusa.com
Staff Writers May 10 2006 8:07PM Security
2 minutes on ... Is FISMA effective?

2 minutes on ... Is FISMA effective?

Some believe it is nothing more than a paper exercise. The government earned poor marks on information security this year. Of the 24 agencies graded, seven agencies failed outright and, overall, agencies received an average grade of D+.
Ericka Chickowski May 10 2006 8:07PM Security
Me and my job

Me and my job

How did you get into security? In my case, the question could be phrased, "How did security get into you?" I am not an infosec professional in the usual sense, but rather a business manager with infosec responsibility. I manage business and product development and information security, which is a central thread that composes the fabric of our product offerings.
Aaron Bills May 10 2006 8:07PM Security
Open, transparent and safe?

Open, transparent and safe?

Business in the Participation Age is all about engagement and collaboration. It’s about access, transparency and trust. Today, the isolationist approach to security – the notion of avoiding risk rather than mitigating it – is a surefire way to squash the opportunities and value being created on the network. To be competitive in today’s marketplace, companies must change their mindset and evolve their security culture.
Scott McNealy May 10 2006 8:06PM Security
On colleagues and support

On colleagues and support

We all have colleagues with whom we keep in touch. We all have colleagues who we call on from time to time for help when we run into knotty problems. And we all have organizations we turn to when we need specific advice. The trouble is that many of us do not mix those three groups to the benefit of our systems’ security, and we should.
Peter Stephenson,CeRNS, May 10 2006 8:05PM Security
Reduce risk through vendor onus

Reduce risk through vendor onus

Many of us are struggling to extend security responsibility and accountability to third-party vendors and outsourcing companies.
Richard Lawhorn May 10 2006 8:05PM Security
Got something to say?

Got something to say?

Send your comments, praise or criticisms to scfeedbackus@haymarketmedia.com. We reserve the right to edit letters.
Staff Writers May 10 2006 8:04PM Security
Cover story: If once is good, twice is better

Cover story: If once is good, twice is better

A United States federal government agency didn’t need to point out the weaknesses of username and password authentication to E*Trade Financial’s CIO Greg Framke. He already knew that such an antiquated method for validating online banking customers falls short in today’s era of keyloggers and phishing scams.
Ericka Chickowski May 10 2006 8:03PM Security
Avoiding a hostile host

Avoiding a hostile host

Back in the old days, at least by malicious hacking standards, the simplest way to hijack a PC was to compromise the vulnerable entryways of the operating system.
Dan Kaplan May 10 2006 8:03PM Security
Threats for $ale

Threats for $ale

As if dealing with skyrocketing numbers of new vulnerabilities each day is not enough, the IT security world must now brace for a new challenge: an emerging underground vulnerability market that could result in more zero-day attacks.
Dan Kaplan May 10 2006 8:02PM Security
Risky business

Risky business

Call it another unintentional legacy of Enron, WorldCom and other corporate accounting scandals of the past decade.
Frank Washkuch May 10 2006 8:02PM Security
SC Forum: It's almost here

SC Forum: It's almost here

Gain insight and contacts to help achieve your goals as an IT security professional, but act fast.
Staff Writers May 10 2006 8:01PM Security
An integrated approach

An integrated approach

SC Magazine is providing an exclusive look at abridged versions of various chapters included in the just-released Larstan’s The Black Book on Government Security, as part of an agreement with Larstan Publishing.
Doron Cohen May 10 2006 8:00PM Security
Backup tapes can't be neglected

Backup tapes can't be neglected

In 2005, storage security losses frequently garnered a storm of media attention, with one organization losing computer backup tapes with personal information on current and former employees. In another instance, a financial services organization lost several backup tapes, with records detailing the financial information of government employees because an overnight shipping company lost their tapes.
Peter Elliman May 10 2006 7:59PM Security
Andreas Wuchner

Andreas Wuchner

The Novartis security chief is delivering on his mission to create a compliant, globally managed risk system. Ron Condon reports
Ron Condon May 9 2006 4:24PM Security
The strength of the pound

The strength of the pound

One simple way to improve your firm’s password security is incorporating non-US characters. Ken Munro explains
Ken Munro May 9 2006 4:24PM Security
Time to welcome another acronym

Time to welcome another acronym

As a relatively recent recruit to the world of security, I have two overwhelming impressions – first, the enormous number of abbreviations and acronyms, and second, the incredible professionalism and deep knowledge of my colleagues.
Mark Hughes May 9 2006 4:24PM Security
Time to call a spade a spade

Time to call a spade a spade

If you’re paranoid like me, one of your regular daily routines will be a check of your corporate anti-virus to make sure that it is receiving updates regularly. This is not an unreasonable precaution; several times I have seen major brand products silently go into a sulk and stop talking to the update server.
Nick Barron May 9 2006 4:23PM Security

Log In

  |  Forgot your password?