Features

Review: LiveWire Investigator v. 3.1.1C

Review: LiveWire Investigator v. 3.1.1C

Live forensics is an emerging field and, although there are a lot of good reasons to use it, there still are caveats.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 3 2007 4:15PM Security
Why Vista missed the trick

Why Vista missed the trick

A project that aims to provide laptops for poor children could teach Microsoft a thing or two about security and design.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 24 2007 5:01PM Security
Drivers need patching too

Drivers need patching too

Hard drives are often overlooked when it comes to patching. But an exploit in this area could be fateful.
Ken Munro Apr 24 2007 10:07AM Security
The End: A world without borders

The End: A world without borders

The internet is bringing us closer together, says Ed Gibson. That means more fronts to watch.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 24 2007 10:06AM Security
The End: The dangers of box ticking

The End: The dangers of box ticking

Compliance should be triggered by good security rather than an auditors' visit, says Jen Mack.
Jen Mack, Apr 24 2007 9:03AM Security
Review: EnCase Forensic v. 6

Review: EnCase Forensic v. 6

Of the straight (i.e., not over-the-network) computer forensic tools we examined, EnCase has made the most noticeable changes since last year.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 18 2007 4:08PM Security
Review: LR1000 v. 3.5

Review: LR1000 v. 3.5

This is one of those "almost there" products that will, we are certain, give competitors a run for their money fairly soon. The LR1000 is a log analysis appliance and has a lot to recommend it.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 18 2007 12:00AM Security
Review: P2 Enterprise Shuttle

Review: P2 Enterprise Shuttle

Beam me up, Scotty, there’s a new over-the-network forensics tool in the lab. The Paraben P2 Enterprise Shuttle is a tool that accesses computers remotely over the network and allows the user to perform a suite of forensic tests.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 18 2007 12:00AM Security
Review: ProDiscover IR v 4.9

Review: ProDiscover IR v 4.9

ProDiscover IR is an over-the-network computer forensics tool. It connects to any computer that has the ProDiscover agent and performs a suite of forensic tests that can be scripted using ProScript, a variant of Perl.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 18 2007 12:00AM Security
Review: Device Seizure v. 1.1

Review: Device Seizure v. 1.1

Device seizure is a neat little product that lets you seize and perform forensic analysis on mobile phones, PDAs and other mobile devices.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 17 2007 3:04PM Security
Review: Solutionary ActiveGuard

Review: Solutionary ActiveGuard

Solutionary provides a complete outsourced offering. It includes hosting, managed firewall and managed intrusion prevention.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 17 2007 3:03PM Security
Review: SecureWorks

Review: SecureWorks

The SLA for the offering included three-hour response for low-level threats, one-hour for medium-level threats, and 15 minutes for high-level threats. SecureWorks responded inside of 10 minutes to all threat categories.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 17 2007 3:02PM Security
Review: Alert Logic Threat Manager

Review: Alert Logic Threat Manager

The Service Level Agreement (SLA) for the Threat Manager offering ensured response within 30 minutes of the detection and escalation of security incidents.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 17 2007 12:00AM Security
Review: Secure Computing IronMail

Review: Secure Computing IronMail

Secure Computing's IronMail appliance can protect against many outside email threats, including viruses, spam, and phishing.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 13 2007 12:00AM Security
How the TJX breach may change security awareness

How the TJX breach may change security awareness

Despite the recent TJX security breach, it is natural to conclude that companies will continue to ignore the seething vulnerabilities that lead to massive thefts of sensitive information.
J. Patrick Apr 12 2007 4:41PM Security
Enterprises need strategic view of risk management

Enterprises need strategic view of risk management

Enterprise risk management is taking on a new dimension in publicly traded companies as they face greater regulatory responsibilities and increased public scrutiny.
Margaret Brooks, Apr 12 2007 4:34PM Security
Hot or Not: Local privilege escalation vulnerabilities

Hot or Not: Local privilege escalation vulnerabilities

Due to the interactive nature and required access to exploit, local privilege escalation vulnerabilities have traditionally been thought to have a minimal impact on the strategies enterprise IT departments incorporate to protect networks when compared to other code execution vulnerabilities.
Andre Derek Apr 12 2007 4:31PM Security
The network security food chain

The network security food chain

For the last several years there has been an increased focus on network security, not only from the professionals who run the network, but also from business leaders, industry groups and government bodies.
Jim Doherty, Apr 12 2007 4:25PM Security
Encryption is the last defense for data in a digital world

Encryption is the last defense for data in a digital world

We used to live in an analog world. We played records, radio stations had static interference, we flattened out dollar bills to work in vending machines and we anguished over hanging chads. Sure, everything was converted into bits and bytes in the end, but the world we interacted with was a physical one.
Richard Moulds, Apr 12 2007 4:12PM Security
How to avoid chaos when implementing VoIP

How to avoid chaos when implementing VoIP

Organisations are overlooking the security risks, planning considerations and business needs in the rush to capitalise on VoIP, argues ISPhone’s James Spenceley.
Staff Writers Apr 12 2007 4:05PM Security

Log In

  |  Forgot your password?