Features

Enterprises need strategic view of risk management

Enterprises need strategic view of risk management

Enterprise risk management is taking on a new dimension in publicly traded companies as they face greater regulatory responsibilities and increased public scrutiny.
Margaret Brooks, Apr 12 2007 4:34PM Security
Hot or Not: Local privilege escalation vulnerabilities

Hot or Not: Local privilege escalation vulnerabilities

Due to the interactive nature and required access to exploit, local privilege escalation vulnerabilities have traditionally been thought to have a minimal impact on the strategies enterprise IT departments incorporate to protect networks when compared to other code execution vulnerabilities.
Andre Derek Apr 12 2007 4:31PM Security
The network security food chain

The network security food chain

For the last several years there has been an increased focus on network security, not only from the professionals who run the network, but also from business leaders, industry groups and government bodies.
Jim Doherty, Apr 12 2007 4:25PM Security
Encryption is the last defense for data in a digital world

Encryption is the last defense for data in a digital world

We used to live in an analog world. We played records, radio stations had static interference, we flattened out dollar bills to work in vending machines and we anguished over hanging chads. Sure, everything was converted into bits and bytes in the end, but the world we interacted with was a physical one.
Richard Moulds, Apr 12 2007 4:12PM Security
How to avoid chaos when implementing VoIP

How to avoid chaos when implementing VoIP

Organisations are overlooking the security risks, planning considerations and business needs in the rush to capitalise on VoIP, argues ISPhone’s James Spenceley.
Staff Writers Apr 12 2007 4:05PM Security
Interview: Eugene Kaspersky in Russia

Interview: Eugene Kaspersky in Russia

As Kaspersky Lab targets the global corporate market, its co-founder tells Paul Fisher why he thinks people are not afraid of the Russians.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 11 2007 4:30PM Security
Mobile security: when will it become necessary?

Mobile security: when will it become necessary?

There have been few mobile phone viruses so far, but as more handsets use WiFi and bluetooth, is it just a matter of time? Mark Mayne reports.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 11 2007 4:23PM Security
Review: Rapid7 NeXpose

Review: Rapid7 NeXpose

Rapid7 NeXpose is, generally, an impressive appliance. Although it is a hybrid (vulnerability scanner and penetration test tool), the pen tool is used specifically to validate vulnerabilities and is not intended to be used alone. This is typical of the way an attacker would attempt to penetrate a target.
Peter Stephenson,CeRNS, Apr 10 2007 12:00AM Security
Review: idEngines Ignition

Review: idEngines Ignition

The idEngines Ignition product provides middleware for 802.1x authentication. The product creates an environment where wireless access points, switches and firewalls can authenticate to the Ignition application, which can then relay the 802.1x authentication request to the correct back-end authentication server.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 10 2007 12:00AM Security
Review: eEye REM Security Manager

Review: eEye REM Security Manager

We found the combination of the REM Security Manager and the Retina Scanner to be easy to use and deploy. In fact, ease of use is this product’s hallmark. The user interface is similar to MS Windows Explorer and is among the most intuitive we’ve seen.
Peter Stephenson,CeRNS, Apr 10 2007 12:00AM Security
Review: Packetsure

Review: Packetsure

Palisade Systems' offering in this category has quite a few useful features. For example, it uses content analysis to find possible areas of data leakage or problem emails.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 3 2007 2:37PM Security
Review: Symantec Mail Security 8300

Review: Symantec Mail Security 8300

Symantec's Mail Security appliance offers features such as filter policies that can be set up for regulatory compliance, data leakage, spam and viruses.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 2 2007 12:00AM Security
Review: Proofpoint Messaging Security Gateway

Review: Proofpoint Messaging Security Gateway

By sitting at the gateway between the firewall and mail server the Proofpoint Messaging Security Gateway is able to monitor all incoming and outgoing mail closely for suspicious content or possible threats.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 2 2007 12:00AM Security
Review: BigFix Enterprise Suite

Review: BigFix Enterprise Suite

The BigFix Enterprise Suite (BES) really can do it all when it comes to policy management. The product supports a vast array of different operating systems, including Linux, Unix, Mac and Windows clients.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 2 2007 12:00AM Security
Review: MailMarshal

Review: MailMarshal

MailMarshal features not only email content filtering ability, but can also be integrated with third-party anti-virus and anti-spyware software such as McAfee and CounterSpy.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 2 2007 12:00AM Security
How to protect against Wiki, MySpace and other Web 2.0 threats

How to protect against Wiki, MySpace and other Web 2.0 threats

Time Magazine recently bestowed its prestigious "Person of the Year" honour on "You," recognising the growing social importance of community and collaboration on the web.
Dan Nadir, Mar 28 2007 5:05PM Security
The future of image spam

The future of image spam

In the last six months, image-based spam has pushed its way to the forefront of spam technique discussions. Image-based spam is not new, but it is now wreaking havoc on the effectiveness of many anti-spam products.
Carsten Dietrich, Mar 28 2007 5:00PM Security
Biometric technology attracts venture capital investment

Biometric technology attracts venture capital investment

In response to a security-conscious world, venture capitalists are pumping investment dollars into new surveillance technologies, which are designed to help safeguard people and property.
Deborah Magid, Mar 26 2007 3:45PM Security
Three E approach key to complicated compliance requirements

Three E approach key to complicated compliance requirements

Today's industry regulations are complex and difficult to understand.
Pat Sueltz, Mar 26 2007 10:34AM Security
Hot or not: Reverse code engineering

Hot or not: Reverse code engineering

Hot: It's one of the primary methods that malicious hackers use to find new application and operating system vulnerabilities.
Amol Sarwate, Mar 26 2007 8:03AM Security

Log In

  |  Forgot your password?