Recent articles by Jon Tullett

Review: Total Event Log Management Suite

Review: Total Event Log Management Suite

This product manages and analyzes Windows server log files. While this activity is not limited to forensics, it is an important incident response tool.

Jon Tullett Jul 21 2005 12:00AM Security
Review: Cyber Alert

Review: Cyber Alert

Author Peter Warren and Michael Streeter

Jon Tullett Jul 1 2005 12:00AM Security
Review: The German Enigma Cipher Machine

Review: The German Enigma Cipher Machine

AuthorB. Winkel, C. Deavours, D. Kahn, D. Kruh

Jon Tullett Jun 30 2005 12:00AM Security
Review: The Art of Intrusion

Review: The Art of Intrusion

Author Kevin Mitnick & William Simon

Jon Tullett Jun 30 2005 12:00AM Security
Review: Windows Server 2003 Security, Volume 2

Review: Windows Server 2003 Security, Volume 2

Author Roberta Bragg

Jon Tullett Jun 30 2005 12:00AM Security
Review: The Black Book on Corporate Security

Review: The Black Book on Corporate Security

Publisher Larstan

Jon Tullett Jun 29 2005 12:00AM Security
Touchdown for ISO27000

Touchdown for ISO27000

Forget ISO17799, there’s a new standard on the way, says Jon Tullett
Jon Tullett Jun 16 2005 11:00AM Security
Review: ArcSight ESM

Review: ArcSight ESM

ArcSight's flagship product, the ArcSight Enterprise Security Manager, is a security event management (SEM) tool capable of analyzing large mounts of network data in real time. The IDS model fell down because the flood of unfiltered alerts overwhelmed the resources of security teams, but SEM provides correlation, filtering and analysis to, in theory, allow the few real threats to be picked out of the blizzard of less important alerts and false positives.

Jon Tullett Jun 15 2005 12:00AM Security
Review: Sourcefire 3D System

Review: Sourcefire 3D System

Sourcefire calls its 3D System a "network defense system," avoiding the now loaded terms IDS and IPS. But while some of its components are strictly IDS or IPS, the package as a whole deserves a much broader description.

Jon Tullett Jun 15 2005 12:00AM Security
MyDoom: whodunit?

MyDoom: whodunit?

A new worm spread rapidly through the Internet at the end of last month, using clever tactics to dupe users and a sneaky payload which may have diverted attention from its real goal.
Jon Tullett May 23 2005 3:45PM Security
Review: LogMeIn

Review: LogMeIn

When 3am Labs asked us to review LogMeIn, we were not sure whether it was really appropriate for SC Magazine. The software is primarily a tool for web-based remote access and administration (there is a "network console" version for enterprise administrators, too). But it has a surprisingly broad set of security features, as well as some clever ways to tie down possible vulnerabilities in remote administration.

Jon Tullett May 12 2005 12:00AM Security
Review: Webroot Spy Sweeper Enterprise

Review: Webroot Spy Sweeper Enterprise

The emerging spyware threat is spawning a horde of anti-spyware products. Some have been around for a while, such as the excellent AdAware and Spybot – Search and Destroy.

Jon Tullett Apr 11 2005 12:00AM Security
Review: DESlock+

Review: DESlock+

We have looked at DESlock+ before, with its DESkey USB tokens and file encryption software. And while the previous version impressed us enough to win Best Buy in our Data Encryption test last year, it is safe to say that the product has been improved by leaps and bounds since then.

Jon Tullett Apr 8 2005 12:00AM Security
Review: NMS for PC

Review: NMS for PC

NMS for PC v2.8 is a file encryption system with some interesting bells and whistles. The software integrates into the Windows logon process, using logon to ensure that access to encrypted data is limited to authorized users.

Jon Tullett Apr 8 2005 12:00AM Security
Review: PKWARE SecureZIP for Windows

Review: PKWARE SecureZIP for Windows

Using zip archives to compress and transfer files has become such a standard part of everyday computing that the notion of using the same tools for security should come easily to most users.

Jon Tullett Apr 8 2005 12:00AM Security
Review: SafeBoot

Review: SafeBoot

Control Break's SafeBoot offers a lot of features, but we were a bit put off by several being cited as available at an extra cost, including some basic-looking items such as a scripted administration tool, or a database backup utility.

Jon Tullett Apr 8 2005 12:00AM Security
Review: SafeGuard Easy

Review: SafeGuard Easy

SafeGuard Easy encrypts the entire disk and places agent software in the master boot record, requiring authentication before the OS is loaded.

Jon Tullett Apr 8 2005 12:00AM Security
RSA strides out of safe zone to secure future

RSA strides out of safe zone to secure future

RSA launched a consumer service offering and an appliance at its San Francisco annual conference late February, strategic steps analysts said were bold but necessary.
Jon Tullett Mar 17 2005 12:34PM Security
Review: RSA SecurID for Microsoft Windows

Review: RSA SecurID for Microsoft Windows

Replacing the weak security of passwords with two-factor authentication is a no-brainer for security today, but there are still situations where passwords remain.

Jon Tullett Mar 15 2005 12:00AM Security
Mobile phones are soft targets for virus writers

Mobile phones are soft targets for virus writers

Malware targeting mobile devices is evolving too fast for security technology to keep up.
Jon Tullett Feb 18 2005 8:13PM Security

Log In

  |  Forgot your password?