Features

SMEs: Open for business

SMEs: Open for business

Often overlooked when it comes to IT security, vendors and attackers are shifting their attention to smaller enterprises. Steve Gold reports.
Feb 19 2007 11:46AM Security
How to protect your business from VoIP threats

How to protect your business from VoIP threats

As the epidemic of spam and malware continues to barrage email systems, one might think the industry would have learned to build strong security into new communications protocols. Unfortunately, in the case of VoIP - the most important new communications protocol since SMTP - this is not true. Historically, the development of VoIP infrastructure has prioritised quality and reliability over security, with few security measures being built in.
Neel Mehta, Feb 19 2007 9:57AM Security
Pretexting - white lies that can damage your company

Pretexting - white lies that can damage your company

In the wake of recent news at HP, pretexting has become the hot topic in the business world, and its sudden rise to fame broaches numerous questions including: What exactly is pretexting? How are companies liable for it? What are companies doing that is considered pretexting and how can they protect themselves from becoming the next HP?
Matt Leonard, Feb 19 2007 9:21AM Security
Hot or not: Third-party patches

Hot or not: Third-party patches

Last month's race between a group of security researchers who promised to disclose, every day, a newfound vulnerability in the Apple OS X platform, and an opposing group, led by a former Apple employee, to independently plug those security flaws, has sparked new debate around the validity of third-party security patches.
Amol Sarwate, Feb 19 2007 8:00AM Security
Email security: Good policy is the answer

Email security: Good policy is the answer

Spam clogging up the server was only the start. A sound email policy is the only way to handle security breaches and compliance.
David Quainton Feb 16 2007 2:46AM Security
Review: PEARL ECHO SUITE VERSION 1.0

Review: PEARL ECHO SUITE VERSION 1.0

Pearl Echo Suite is a web content filtering software package that installs as client-server architecture. It has the additional ability to function in a peer-to-peer or server-centric environment as well.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Feb 16 2007 12:00AM Security
Why is my spam in colour?

Why is my spam in colour?

Today one out of four emails on the internet is an image spam message. This is not because spammers have just realised the marketing benefits of captive colours. Instead, this is because the spammers have identified a weakness in many anti-spam systems and are moving diligently to maximise this opportunity by fully exploiting this weakness.
Paul Judge, Feb 12 2007 7:31PM Security
Review: ALADDIN eSAFE WEB 5.2

Review: ALADDIN eSAFE WEB 5.2

Aladdin's eSafe content filter is delivered as a software package that requires its own dedicated server. It has a comprehensive suite of features and can be implemented as a transparent bridge, proxy or router.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Feb 12 2007 5:00AM Security
Review: BARRACUDA WEB FILTER

Review: BARRACUDA WEB FILTER

This product was one of the two best of those we reviewed. It is solid, easy to use and well documented. The Barracuda Web Filter blocks access to websites based on content, content category, domain or URL. Supplied as an appliance, this is an attractive proposition for the enterprise market, designed for simple administration and high throughput.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Feb 12 2007 5:00AM Security
Review: WEBSENSE WEB SECURITY 6.3

Review: WEBSENSE WEB SECURITY 6.3

Websense is a venerable player in the web content filtering arena and this year's entry was no exception to its record of solid products. The Web Security Suite 6.3 is a collection of capabilities in a single software package that addresses most challenges of internet access from the enterprise. The product requires its own server and runs in several operating environments, including Windows and Linux.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Feb 12 2007 12:00AM Security
The security implications of Web 2.0

The security implications of Web 2.0

A car that has less options has fewer things that can break. Power steering, power locks, power seats, seat warmers, and the myriad of other car features provide a better experience, but they also have more items that require maintenance.
Michael Weider, Feb 9 2007 7:15AM Security
Review: Tenable Nessus 3

Review: Tenable Nessus 3

Nessus is one of the granddaddies of vulnerability scanners. Today, Nessus is not only a powerful open source product in its own right, it is the basis for some of the most powerful commercial vulnerability scanners available.
Peter Stephenson,CeRNS, Feb 5 2007 12:00AM Security
Review: ISS Proventia Network

Review: ISS Proventia Network

The ISS Proventia Network Enterprise Scanner is part of a larger security management system and, as such, shows its best performance as part of that suite. We tested the product outside of the Proventia suite and we do not recommend this approach. The network scanner requires, at minimum, MS SQLServer and ISS Site Protector to support it. If all you need is a vulnerability scanner, this is not your best bet.
Peter Stephenson,CeRNS, Feb 5 2007 12:00AM Security
Review: WinMagic SecureDoc

Review: WinMagic SecureDoc

WinMagic Data Security’s SecureDoc Hard Disk Encryption provides advanced encryption standard (AES) encryption of the entire hard drive. SecureDoc Hard Disk Encryption also supports two-factor authentication through the use of smart cards and USB tokens.
Justin Peltier Feb 5 2007 12:00AM Security
Review: Saint Scanner + Exploit

Review: Saint Scanner + Exploit

We have been watching Saint a long time. Saint, as many old-timers may recall, began life as an open source version of Satan, one of the first serious open source vulnerability scanners. Eventually the tool was commercialised and it has maintained many of its open source roots.
Peter Stephenson,CeRNS, Feb 5 2007 12:00AM Security
Review: BeCrypt Disk Protect

Review: BeCrypt Disk Protect

BeCrypt Disk Protect provides for two-factor authentication and also advanced encryption standard (AES) encryption of the entire hard drive. We configured BeCrypt Disk Protect to use password authentication, which was a little more difficult to install and configure than some of the other products.
Justin Peltier Feb 5 2007 12:00AM Security
Interview: Tim Pickard

Interview: Tim Pickard

RSA's acquisition by EMC was one of the big stories of 2006. The area VP of international marketing tells Paul Fisher why it's a golden opportunity.
Jan 31 2007 3:46PM Security
Why we need hackers

Why we need hackers

Life would be easier if we didn’t have to patch our operating systems and apps. Patrick Gray explores the real reasons why updating is important.
Patrick Gray Jan 29 2007 2:16PM Security
Airports - a threat to identity security

Airports - a threat to identity security

We all love the convenience of Wi-Fi to stay connected anywhere our laptops take us. In fact, you may be reading this article on your wireless-enabled laptop now. But just as the availability of Wi-Fi services proliferate, so does the number of hackers ready to take advantage of unsuspecting road warriors.
Corey O'Donnell, Jan 29 2007 7:53AM Security
Protecting your company's good name outside of the network

Protecting your company's good name outside of the network

Over the last several years, many well-known organisations have faced the consequences of highly publicised data breaches. These breaches directly impact an organisation's most valuable asset - their customers.
Joe Sturonas, Jan 29 2007 6:33AM Security

Log In

  |  Forgot your password?