Features

Review: McAfee AntiSpyware 2006

Review: McAfee AntiSpyware 2006

This product can either be bought as a standalone or as part of McAfee’s Internet Security Suite. If you opt for the Enterprise version, you also get centralized management using McAfee ePolicy Orchestrator 3.02+ or McAfee Protection Pilot 1.1+. These applications let you manage, control and schedule updates and spyware scans over the whole network, so that you can control what’s going on.
Christopher Moody Jan 1 2006 12:00AM Security
Review: Ad-Aware Enterprise

Review: Ad-Aware Enterprise

Ad-Aware is probably the best-known anti-spyware product around. For its Enterprise edition, Lavasoft bundles Ad-Aware SE and Ad-Watch client applications, tied together with its Ad-Axis management console.
Christopher Moody Jan 1 2006 12:00AM Security
Review: LocalSSL Internet

Review: LocalSSL Internet

Whatever your network and application security, keyloggers can deal a mortal blow to corporate security. Popular with rootkits and trojans, loggers capture keystrokes, revealing passwords, personal information and entire documents before anything can be encrypted or locked down in any other way.
Jon Tullett Jan 1 2006 12:00AM Security
Protecting your investment in VoIP

Protecting your investment in VoIP

Within the next two years, most businesses will either pilot or start widescale deployments of voice over IP (VoIP). Why? To extend the capabilities of their phone system, as well as realize significant cost savings.
Goren Fink Dec 19 2005 10:21PM Security
Social engineering and other threats to internal security

Social engineering and other threats to internal security

How difficult would it be for a good looking woman dressed in a provocative outfit to gain access to your internal network?
Ari Tammam Dec 16 2005 11:46AM Security
Spyware and users are your top demons

Spyware and users are your top demons

As usual, the SC Magazine readership survey has proven to be a most revealing exercise. Now in its fourth year, the end-of-year survey gives an insight into the mood and daily lives of our readers.
Ron Condon Dec 15 2005 11:02PM Security
5 steps for ensuring storage network security

5 steps for ensuring storage network security

The Storage Security Industry Forum (the security forum in SNIA) recommends a five-step review for improved storage network security.
Staff Writers Dec 15 2005 10:43PM Security
Is your SAN or NAS an Achilles heel?

Is your SAN or NAS an Achilles heel?

IT security has long been the focus of corporate attention, while storage security has been — perhaps unnoticeably — absent from the limelight. So it perhaps comes as a surprise to find that the data held in storage environments is frequently left vulnerable, simply because security in this area is so often overlooked.
James Middleton Dec 15 2005 10:36PM Security
10 steps to safety

10 steps to safety

So your systems have been compromised — a distributed denial of service (DDoS) attack shut your network down or a worm infected dozens of your users’ desktop machines. Now what do you do? Here are 10 steps to help safeguard your systems in the future.
Staff Writers Dec 15 2005 10:24PM Security
Relying on the logs to recover

Relying on the logs to recover

When bad things happen to good networks — and no enterprise is completely immune from attacks on its IT infrastructure anymore — how the good guys fight back can make or break the company’s ability to survive the threat.
Jim Carr Dec 15 2005 10:16PM Security
Merger mania takes hold

Merger mania takes hold

With Symantec, Microsoft and Cisco continuing to buy up smaller players to bolster their product portfolios, 2005 was a boon year for consolidation in the IT security industry.
Staff Writers Dec 15 2005 9:55PM Security
The year of compliance

The year of compliance

At the start of the year, most of the talk centered on how IT security would be affected by new federal legislation, such as Sarbanes-Oxley and the Health Insurance Portability and Accountability Act (HIPAA). But as it turned out, it was a California state law that had the most dramatic impact.
Staff Writers Dec 15 2005 9:45PM Security
Others who are making a difference

Others who are making a difference

Richard Clarke, founder and ceo of Good Harbor Consulting, for continuing to unabashedly criticize anyone who is failing to comprehend the security requirements that go along with using the internet as a business-enabling tool. Even after his service to three presidents, Clarke serves up his cybersecurity knowledge whether your like it or not. Besides frequenting the conference circuit, he recently published a fictional account of terrorism in the U.S., The Scorpion’s Gate, slated to become a motion picture in 2007.
Staff Writers Dec 15 2005 9:40PM Security
The top 5 inlfuential IT security thinkers

The top 5 inlfuential IT security thinkers

SC Magazine’s U.S. and U.K. editorial teams spotlight some of the noteworthy people, major merger/acquisitions and leading compliance worries of yet another eventful year in IT security. With the help of our U.S. Editorial Advisory Board, we’ve focused on those eminent IT security professionals who are not only out and about around the globe bringing attention to the various issues surrounding cyberspace, but also tirelessly working to thwart cybercriminals’ attacks on organizations and private citizens. These are the players who continue to influence others in the industry and help to evolve thinking around various IT security issues and threats.
Staff Writers Dec 15 2005 9:36PM Security
Got something to say?

Got something to say?

Send your comments, praise or criticisms to scfeedbackus@haymarketmedia.com
Staff Writers Dec 15 2005 9:16PM Security
30 seconds on

30 seconds on

Demonstrate value: A lifecycle of IT security risk management should demonstrate that you can mitigate risk with what products you are deploying. This evidence will get you the executive trust and support you need.
Staff Writers Dec 15 2005 9:05PM Security
Getting organized to gain support

Getting organized to gain support

If your days are anything like mine, there is no shortage of people who you must keep apprised of your company’s information security and risk information posture. This list of professionals seems endless — peers, the board of directors, executive managers, internal and external auditors, and a myriad of regulators.
Gene Fredriksen Dec 15 2005 8:59PM Security
Good password management

Good password management

Perhaps the single most important thing to remember when creating a new password is to make it hard to guess, but easy to remember. That’s easier said than done, but following some basic guidelines will likely help you become more secure.
Bill Carey Dec 15 2005 8:53PM Security
Defend against cyberwarfare

Defend against cyberwarfare

Most of the national and international TV news is taken up with the “war on terror” or the “war in Iraq.” In our area (metro Detroit), these stories have their own logos and intense theme music. Depending upon the political bent of the news source, these “wars” either are the right or wrong thing to do. We are either winning or we are not.
Peter Stephenson,CeRNS, Dec 15 2005 7:41PM Security
Me and my job

Me and my job

How did you get into security? I came from the physics field to begin with. I jumped in here about 11 years ago. I started as a programmer — Visual Basic, web applications, that sort of thing, and decided after a year or so that I didn’t enjoy that. So I switched over to IT administration…and from there started doing system administration and part of that has to be security. I just sort of moved more and more and taught myself more and more about security as part of system administration. I just took an interest in it.
Bradley Dinerman, Dec 15 2005 7:28PM Security

Log In

  |  Forgot your password?