Features

Review: Protector v3.1

Review: Protector v3.1

The Safend Protector offers many features to provide a high level of USB security both at the interface and removable media levels.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 31 2007 8:57AM Security
USB - the Achilles' heel of data security

USB - the Achilles' heel of data security

Few can imagine going back to a world without tools for mobility. The ability to access and process digital information with laptops and other handheld devices has forever changed our lives.
Peter Larsson, May 29 2007 4:40PM Security
Tips for a security team's role in e-discovery

Tips for a security team's role in e-discovery

Electronic discovery (e-discovery) is a topic generally limited to legal circles. Although recent case law and the revised Federal Rules of Civil Procedure (FRCP) are aimed squarely at judges and lawyers, both have profound implications for IT and security organisations, given the significant amount of electronically stored information (ESI) that is relevant for court cases.
Trent Henry, May 29 2007 4:36PM Security
Darknets provide globally scoped analysis

Darknets provide globally scoped analysis

The internet has come under a sustained and significant threat from network malware, especially since the emergence of the global Windows network worm in 2001 with Code Red and Nimda. Prior to this, most network worms were on a small, localised scale.
Jose Nazario, May 29 2007 4:32PM Security
Go from 'visibly victimised' to 'silently competent'

Go from 'visibly victimised' to 'silently competent'

When Dr. Gene Spafford and I wrote the original version of the Tripwire software program in 1992, it was to help solve the security problem of how to restore systems to a known good state after they have been compromised.
Gene Kim, May 29 2007 4:28PM Security
We're only trying to help

We're only trying to help

User feedback can provide free online consumer research and security reports, so why is it impossible to leave any?
Nick Barron May 29 2007 4:23PM Security
How SOX shaped technology

How SOX shaped technology

It all started with PCs in the workplace, then client-server architectures, then broad adoption of the internet with its openness and broad file-transfer capabilities and instant messaging and more.
Steve Elliott, May 29 2007 10:05AM Security
Hot or not: Local buffer overflow vulnerabilities

Hot or not: Local buffer overflow vulnerabilities

Buffer overflows have long been a primary vector of attack against computer systems — and the rise of local buffer overflow vulnerabilities and zero-day attacks makes it a problem that's likely to grow more troublesome.
Amol Sarwate, May 29 2007 9:58AM Security
The End: We need to rethink fraud

The End: We need to rethink fraud

Responsibility for spotting identity fraud should rest with business, says Bruce Schneier.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 25 2007 10:11AM Security
SC Forum: Be a part of the future

SC Forum: Be a part of the future

With more workshops and an international line-up of speakers, the SC Forum is bigger and better than ever. So make sure you join us.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 23 2007 5:08PM Security
Image spam: In the picture

Image spam: In the picture

Spammers are finding new ways to bypass filters, but that doesn't mean you have to let them bombard your inbox. Rob Buckley reports
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 23 2007 5:02PM Security
Coping with a new virtualised business

Coping with a new virtualised business

Virtualisation is the new business reality. Forrester Research recently issued a report stating that 51 percent of North American companies have deployed or are testing virtualisation technology.
Kurt Johnson, May 23 2007 4:22PM Security
Review: 800 Mobility Controller

Review: 800 Mobility Controller

The Aruba 800 Mobility Controller is an appliance-based device which provides central management of wireless access points.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 23 2007 4:04PM Security
Review: RF Manager

Review: RF Manager

The Colubris Networks RF Manager is another appliance-based offering which uses a web-enabled interface to manage the device. The product has a large feature set and can perform most tasks associated with wireless security management.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 23 2007 3:52PM Security
Review: DataTraveler Secure PE

Review: DataTraveler Secure PE

The Kingston DataTraveler Secure Privacy Edition is a USB thumb drive that encrypts everything on it all the time.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 23 2007 3:07PM Security
Review: DeviceWall v4.5

Review: DeviceWall v4.5

The DeviceWall product goes way beyond typical USB security features. DeviceWall can be used as a complete endpoint security product.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 23 2007 3:03PM Security
Risk management: Growing pains

Risk management: Growing pains

As security becomes a board-level concern, those in charge of it can no longer hide behind the doors of the IT department.
Rhymer Rigby May 15 2007 5:06PM Security
Long term data integrity and compliance tips

Long term data integrity and compliance tips

As 90 per cent of a company's data is located near- or online, long-term data integrity and protection requirements are becoming increasingly important, especially when facing compliance audits.
Robert Sims, May 15 2007 4:27PM Security
Wireless security: Balancing act

Wireless security: Balancing act

Organisations need to weigh the convenience of wireless networking against the risks to the integrity of their IT systems. Steve Gold reports.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 15 2007 3:59PM Security
Review: R3000 & ENTERPRISE REPORTER

Review: R3000 & ENTERPRISE REPORTER

The 8e6 R3000 and Enterprise Reporter is a superb product. The feature-rich appliance was easy to set up and performed well. The setup procedure is typical of more advanced appliances. Once a keyboard and monitor are connected to the appliance, a wizard guides the user through setup. Once the initial configuration is complete, policy development is quick and easy thanks to the intuitive web interface.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 15 2007 7:00AM Security

Log In

  |  Forgot your password?