Features

Profile: Gary McKinnon mastermind behind US military hack

Profile: Gary McKinnon mastermind behind US military hack

Being public enemy number one is a lot more mundane than you might think, the notorious hacker tells Paul Fisher as he awaits extradition.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Jun 4 2007 11:07AM Security
Review: Proventia Desktop

Review: Proventia Desktop

Proventia Desktop focuses on two areas, the first being protection from spyware. This product analyses network downloads to stop the spread of new spyware, and also stops existing spyware from running by stopping unauthorised application communication outside the desktop.
Peter Stephenson,CeRNS, Jun 1 2007 12:00AM Security
Review: NOD32

Review: NOD32

This product contains several pieces that integrate very well. When combined, it covers protection from viruses, worms, spyware and other malicious attacks. The pieces include anti-virus monitor, email monitor, document monitor and internet monitor. The monitors are delegated to serve their specific purpose; therefore, protection is complete and no one monitor is overburdened. The monitors work nicely together to proactively protect the computers.
Peter Stephenson,CeRNS, Jun 1 2007 12:00AM Security
Google Mapplets and Google Gears details

Google Mapplets and Google Gears details

Amazing new web technology announced at Google Developer Day in Sydney. What has Google invented now?
Ed Dawson , David Field May 31 2007 12:23PM Software
Review: Protector v3.1

Review: Protector v3.1

The Safend Protector offers many features to provide a high level of USB security both at the interface and removable media levels.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 31 2007 8:57AM Security
USB - the Achilles' heel of data security

USB - the Achilles' heel of data security

Few can imagine going back to a world without tools for mobility. The ability to access and process digital information with laptops and other handheld devices has forever changed our lives.
Peter Larsson, May 29 2007 4:40PM Security
Tips for a security team's role in e-discovery

Tips for a security team's role in e-discovery

Electronic discovery (e-discovery) is a topic generally limited to legal circles. Although recent case law and the revised Federal Rules of Civil Procedure (FRCP) are aimed squarely at judges and lawyers, both have profound implications for IT and security organisations, given the significant amount of electronically stored information (ESI) that is relevant for court cases.
Trent Henry, May 29 2007 4:36PM Security
Darknets provide globally scoped analysis

Darknets provide globally scoped analysis

The internet has come under a sustained and significant threat from network malware, especially since the emergence of the global Windows network worm in 2001 with Code Red and Nimda. Prior to this, most network worms were on a small, localised scale.
Jose Nazario, May 29 2007 4:32PM Security
Go from 'visibly victimised' to 'silently competent'

Go from 'visibly victimised' to 'silently competent'

When Dr. Gene Spafford and I wrote the original version of the Tripwire software program in 1992, it was to help solve the security problem of how to restore systems to a known good state after they have been compromised.
Gene Kim, May 29 2007 4:28PM Security
We're only trying to help

We're only trying to help

User feedback can provide free online consumer research and security reports, so why is it impossible to leave any?
Nick Barron May 29 2007 4:23PM Security
How SOX shaped technology

How SOX shaped technology

It all started with PCs in the workplace, then client-server architectures, then broad adoption of the internet with its openness and broad file-transfer capabilities and instant messaging and more.
Steve Elliott, May 29 2007 10:05AM Security
Hot or not: Local buffer overflow vulnerabilities

Hot or not: Local buffer overflow vulnerabilities

Buffer overflows have long been a primary vector of attack against computer systems — and the rise of local buffer overflow vulnerabilities and zero-day attacks makes it a problem that's likely to grow more troublesome.
Amol Sarwate, May 29 2007 9:58AM Security
The End: We need to rethink fraud

The End: We need to rethink fraud

Responsibility for spotting identity fraud should rest with business, says Bruce Schneier.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 25 2007 10:11AM Security
SC Forum: Be a part of the future

SC Forum: Be a part of the future

With more workshops and an international line-up of speakers, the SC Forum is bigger and better than ever. So make sure you join us.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 23 2007 5:08PM Security
Image spam: In the picture

Image spam: In the picture

Spammers are finding new ways to bypass filters, but that doesn't mean you have to let them bombard your inbox. Rob Buckley reports
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 23 2007 5:02PM Security
Coping with a new virtualised business

Coping with a new virtualised business

Virtualisation is the new business reality. Forrester Research recently issued a report stating that 51 percent of North American companies have deployed or are testing virtualisation technology.
Kurt Johnson, May 23 2007 4:22PM Security
Review: 800 Mobility Controller

Review: 800 Mobility Controller

The Aruba 800 Mobility Controller is an appliance-based device which provides central management of wireless access points.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 23 2007 4:04PM Security
Review: RF Manager

Review: RF Manager

The Colubris Networks RF Manager is another appliance-based offering which uses a web-enabled interface to manage the device. The product has a large feature set and can perform most tasks associated with wireless security management.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 23 2007 3:52PM Security
Review: DataTraveler Secure PE

Review: DataTraveler Secure PE

The Kingston DataTraveler Secure Privacy Edition is a USB thumb drive that encrypts everything on it all the time.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 23 2007 3:07PM Security
Review: DeviceWall v4.5

Review: DeviceWall v4.5

The DeviceWall product goes way beyond typical USB security features. DeviceWall can be used as a complete endpoint security product.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 23 2007 3:03PM Security

Log In

  |  Forgot your password?