www.fgks.org »
Address
:
[go:
up one dir
,
main page
]
Include Form
Remove Scripts
Accept Cookies
Show Images
Show Referer
Rotate13
Base64
Strip Meta
Strip Title
Session Cookies
Mobile Version
Subscribe
Contact Us
About Us
Advertising
Editorial
SC UK
SC Aus/NZ
Home
News
Features
Opinions
Congress News & Opinions
Products
Sectors
News Bytes
Canada News
Newsletters
Products
Group Tests
First Looks
Products
About Reviews
Blogs
The News Team Blog
The Data Breach Blog
The SC Magazine Awards Blog
Buyers Guide
Whitepapers
Jobs
Events
SC World Congress NYC
SC Congress Canada
SCWC 24/7
Editorial Webcasts
Vendor Webcasts
Podcasts
SC Awards U.S.
SC Awards Canada
Subscribe
Newsletters
Subscribe to SC
Archive
SC World Congress
Archive
Topic Center:
Financial Services
Health Care
Retail
Government
SC Awards
SC Canada
SC Scholars
Cybercrime Corner
RSS
|
Login
|
Register
Home
>
Reviews
> First Looks
First Looks
RedSeal Systems Network Advisor v4.0
A bird’s eye view into enterprise security configuration.
This is your SIM on steroids
Trying to dig up deeply hidden packets in huge amounts of data has always been among the most important tools in my analysis arsenal. But, then along came massive numbers of regulatory requirements and SIMs/SEMs became SIEMs with the focus moving to suites of reports to satisfy compliance audits.
Yes, Virginia, you can have a secure virtual environment
The emerging popularity of virtual computing has very few blemishes considering its youth. One of those, unfortunately, is security both of the underlying operating environment and of the individual virtual machines.
Lifecycle management of data: A special type of DLP
Identity Finder starts with a very simple premise: If you want to keep data from leaking, protect it where it lies. That way, if someone steals it, they get nothing. As simple as that sounds, it’s a bit harder to execute.
Access management from a different perspective
The appliance can be accessed through SSH, but only the customized Rohati commands are available, and there are no services turned on that are not TNS-specific. No daemons, which are not needed for the TNS to operate, are present either. This improves the security of the device itself. If you ...
The end of DNS attacks?
This month’s First Look is one of those products that really holds a unique and important place in the pantheon of information assurance tools
Another unified security gateway? Not quite.
Unified security gateway is a term we are hearing with increasing frequency. Some products that have traditionally referred to themselves as UTMs – unified threat managers – are changing their stripes. In some cases, this change is justified. In some cases, it’s marketing hype. The Finjan Vital Security Web Appliance ...
Good thing in a small package
Every now and then, I pluck a product out of our test queue because it intrigues me. This product is one of those.
Mac forensics on Macs? You bet! And it’s easy.
The idea of performing forensics on Macs may seem strange, but the Mac Marshal brings a uniqueness that we don’t see often. It is unique because the tool uses many of the native capabilities of the Mac to assist it in performing comprehensive forensic analysis of the OS X release ...
Two-factor authentication, or not two-factor?
The notion of true multifactor authentication is based on the concept of combining into a single authentication mechanism something you have, something you know and something you are. Combine two or more of these and you have multifactor authentication.
more »
Most Popular
Most Emailed
Most Recent
Adobe to issue emergency updates for Reader, Acrobat
Ten years of evolving threats: A look back at the impact of notable malicious wares of the past decade
McAfee CEO: Get ready for tidal wave of mobile attacks
Thinking outside the box for threat intelligence
Mobile application threat not here yet, but it's on the way
Software assurance has reached a crisis point
Senate debates DHS, reporting responsibility post Stuxnet
Web applications remain a pressing concern
Malaysian man charged with hacking into bank systems
Consider privacy when deploying smart grid technology
Trojan found disguised as Microsoft anti-virus product
Facebook, Twitter fail latest security assessment
Federal gov't releases draft cloud security guidelines
Firefox zero day being exploited in the wild
Indiana attorney general sues WellPoint over breach
Law enforcement of cybercrime: Bringing justice
Breaches cost health care industry $6 billion annually
Firefox add-on allows session hijacking of popular sites
SC World Congress continues success in its third year
Eight questions CIOs should ask on cloud security
Senate debates DHS, reporting responsibility post Stuxnet
Malaysian man charged with hacking into bank systems
SC Congress Canada slideshow
McAfee CEO: Get ready for tidal wave of mobile attacks
Web applications remain a pressing concern
Stoddart: Handle data in "thoughtful, systematic" way
Thinking outside the box for threat intelligence
Mobile application threat not here yet, but it's on the way
Consider privacy when deploying smart grid technology
Virtual Segmentation - Beyond the Firewall
Popular Topics
Adobe
Apple Threats
Application Security
Awareness Training
Breaches & Exposures
Counterintelligence
Critical Infrastructure
Cyber Attacks
Cyber Threat Intelligence
Cybercrime
Cyberespionage
Data Breaches
Data Theft
Email Security
Finance
Government
Hackers
Industrial Espionage
Malware
Mobile Endpoint Security
Mobile Security
Patch Management
Stuxnet
Threat Information
Vulnerabilities & Flaws
Sponsored Links