Features

Cover Story: Custom building defenses

Cover Story: Custom building defenses

Three IT security pros explain that a reliable network is key, no matter the size of the company.
Staff Writers Jan 13 2006 8:09PM Security
ID theft: beyond fear to opportunity

ID theft: beyond fear to opportunity

In the last few months, it has become nearly impossible to read a magazine or watch television without coming across a story about identity theft. Identity theft is causing a significant amount of angst among consumers and businesses alike.
Sara Gates Jan 13 2006 7:54PM Security
Got something to say?

Got something to say?

Send your comments, praise or criticisms to scfeedbackus@haymarketmedia.com. We reserve the right to edit letters.
Staff Writers Jan 13 2006 7:29PM Security
30 seconds on...

30 seconds on...

Outsourcing option

Unilever confirmed last month that it is discussing outsourcing parts of its finance, human resources and IT operations to Accenture and IBM. An outsourcing agreement would apply chiefly to Unilever's European staff.

Staff Writers Jan 13 2006 7:15PM Security
Efficiency and effectiveness

Efficiency and effectiveness

I had the pleasure of attending a session with a "guturist" recently — a gentleman by the name of Michael Tchong. He spends much of his time analyzing trends and patterns in technology, human behavior and other areas and uses that information to forecast future trends and directions. While his technology and business predictions were fascinating, one of the comments he made struck me as particularly appropriate to those of us in information security: "If you can't do it for the same cost or lower — outsource it."
Dave Cullinane Jan 11 2006 10:26PM Security
Security starts with coding

Security starts with coding

A mix of regulatory requirements coupled with front-page news stories regarding security breaches worldwide have unveiled an array of application security issues.
Brad Arkin Jan 11 2006 10:20PM Security
Innovation still exists

Innovation still exists

I just attended the Computer Security Institue’s 32nd Annual Conference and this year there were rumblings on the show floor about the lack of anything new.
Peter Stephenson,CeRNS, Jan 11 2006 10:11PM Security
Me and my job

Me and my job

What does your job entail? Anything involving the network – basically making sure people get the information they are looking for. We have 400 restaurants and all of the information captured there needs to find its way to headquarters.
Chris Cahalin Jan 11 2006 10:02PM Security
Company news

Company news

Sun Microsystems and Dartmouth College have announced a collaboration to increase security features in the college’s OpenSolaris project. Dartmouth will also develop a graduate-level operating system course based on the project, and experts from its Public Key Infrastructure Laboratory will explore the integration of OpenSolaris with trusted computing technology.
Staff Writers Jan 11 2006 9:54PM Security
2 minutes on...Securing energy facilities for the future

2 minutes on...Securing energy facilities for the future

The monitoring systems of power plants and other industrial installments will become better defended against internet-based threats in coming years, one leading security analyst has predicted.
Frank Washkuch Jan 11 2006 9:46PM Security
Threat of the month: DRM Rootkits

Threat of the month: DRM Rootkits

What is it? DRM stands for Digital Rights Management, describing any number of methods that content providers enlist to try to exercise control over what you can do with a digital document. Recently Sony BMG released a CD protected by a “rootkit,” a tool often used by hackers/malware authors to hide their tracks on a system.
Staff Writers Jan 11 2006 9:41PM Security
Debate

Debate

IT security will get a bigger piece of the fiduciary pie in 2006
David Raanan Jan 11 2006 9:29PM Security
News Briefs

News Briefs

Breach law signed in N.Y.
Staff Writers Jan 11 2006 9:14PM Security
Securing IT is innovative thinking

Securing IT is innovative thinking

Nothing new is really going down in information security right now. At least that’s the take of some of SC’s Editorial Advisory Board members. There is no innovation, some say. The industry is stuck in a rut, say others. And it seems they’re not alone.
Illena Armstrong Jan 11 2006 8:50PM Security
Endpoint security reaches across the network perimeter

Endpoint security reaches across the network perimeter

The economy may be on the upswing, but increasing global competition combined with a multitude of compliance issues such as regulatory audits continue to pose a costly problem for organizations.
Alan Bentley Jan 6 2006 12:26PM Security
Review: LocalSSL Internet

Review: LocalSSL Internet

Whatever your network and application security, keyloggers can deal a mortal blow to corporate security. Popular with rootkits and trojans, loggers capture keystrokes, revealing passwords, personal information and entire documents before anything can be encrypted or locked down in any other way.
Jon Tullett Jan 1 2006 12:00AM Security
Review: Ad-Aware Enterprise

Review: Ad-Aware Enterprise

Ad-Aware is probably the best-known anti-spyware product around. For its Enterprise edition, Lavasoft bundles Ad-Aware SE and Ad-Watch client applications, tied together with its Ad-Axis management console.
Christopher Moody Jan 1 2006 12:00AM Security
Review: McAfee AntiSpyware 2006

Review: McAfee AntiSpyware 2006

This product can either be bought as a standalone or as part of McAfee’s Internet Security Suite. If you opt for the Enterprise version, you also get centralized management using McAfee ePolicy Orchestrator 3.02+ or McAfee Protection Pilot 1.1+. These applications let you manage, control and schedule updates and spyware scans over the whole network, so that you can control what’s going on.
Christopher Moody Jan 1 2006 12:00AM Security
Review: CounterSpy Enterprise

Review: CounterSpy Enterprise

CounterSpy Enterprise is built for remote management and administration. One of its main tasks is to distribute the agent to PCs on your network. You can either push the installation using Windows Domain rights, or create an MSI installer package – probably the preferred approach for large networks as they can use existing distribution tools.
Christopher Moody Jan 1 2006 12:00AM Security
Review: CyberGuard WW 1000

Review: CyberGuard WW 1000

This appliance is designed to monitor, scan and block internet-based threats. Its anti-spyware functions come from a range of different protection options, accessed through the appliance’s web front-end. For larger installations, you can also use the Global Command Center for centralized management.
Christopher Moody Jan 1 2006 12:00AM Security

Log In

  |  Forgot your password?