Features

Review: WEBSENSE WEB SECURITY 6.3

Review: WEBSENSE WEB SECURITY 6.3

Websense is a venerable player in the web content filtering arena and this year's entry was no exception to its record of solid products. The Web Security Suite 6.3 is a collection of capabilities in a single software package that addresses most challenges of internet access from the enterprise. The product requires its own server and runs in several operating environments, including Windows and Linux.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Feb 12 2007 12:00AM Security
The security implications of Web 2.0

The security implications of Web 2.0

A car that has less options has fewer things that can break. Power steering, power locks, power seats, seat warmers, and the myriad of other car features provide a better experience, but they also have more items that require maintenance.
Michael Weider, Feb 9 2007 7:15AM Security
Review: Tenable Nessus 3

Review: Tenable Nessus 3

Nessus is one of the granddaddies of vulnerability scanners. Today, Nessus is not only a powerful open source product in its own right, it is the basis for some of the most powerful commercial vulnerability scanners available.
Peter Stephenson,CeRNS, Feb 5 2007 12:00AM Security
Review: ISS Proventia Network

Review: ISS Proventia Network

The ISS Proventia Network Enterprise Scanner is part of a larger security management system and, as such, shows its best performance as part of that suite. We tested the product outside of the Proventia suite and we do not recommend this approach. The network scanner requires, at minimum, MS SQLServer and ISS Site Protector to support it. If all you need is a vulnerability scanner, this is not your best bet.
Peter Stephenson,CeRNS, Feb 5 2007 12:00AM Security
Review: WinMagic SecureDoc

Review: WinMagic SecureDoc

WinMagic Data Security’s SecureDoc Hard Disk Encryption provides advanced encryption standard (AES) encryption of the entire hard drive. SecureDoc Hard Disk Encryption also supports two-factor authentication through the use of smart cards and USB tokens.
Justin Peltier Feb 5 2007 12:00AM Security
Review: Saint Scanner + Exploit

Review: Saint Scanner + Exploit

We have been watching Saint a long time. Saint, as many old-timers may recall, began life as an open source version of Satan, one of the first serious open source vulnerability scanners. Eventually the tool was commercialised and it has maintained many of its open source roots.
Peter Stephenson,CeRNS, Feb 5 2007 12:00AM Security
Review: BeCrypt Disk Protect

Review: BeCrypt Disk Protect

BeCrypt Disk Protect provides for two-factor authentication and also advanced encryption standard (AES) encryption of the entire hard drive. We configured BeCrypt Disk Protect to use password authentication, which was a little more difficult to install and configure than some of the other products.
Justin Peltier Feb 5 2007 12:00AM Security
Interview: Tim Pickard

Interview: Tim Pickard

RSA's acquisition by EMC was one of the big stories of 2006. The area VP of international marketing tells Paul Fisher why it's a golden opportunity.
Jan 31 2007 3:46PM Security
Why we need hackers

Why we need hackers

Life would be easier if we didn’t have to patch our operating systems and apps. Patrick Gray explores the real reasons why updating is important.
Patrick Gray Jan 29 2007 2:16PM Security
Airports - a threat to identity security

Airports - a threat to identity security

We all love the convenience of Wi-Fi to stay connected anywhere our laptops take us. In fact, you may be reading this article on your wireless-enabled laptop now. But just as the availability of Wi-Fi services proliferate, so does the number of hackers ready to take advantage of unsuspecting road warriors.
Corey O'Donnell, Jan 29 2007 7:53AM Security
Protecting your company's good name outside of the network

Protecting your company's good name outside of the network

Over the last several years, many well-known organisations have faced the consequences of highly publicised data breaches. These breaches directly impact an organisation's most valuable asset - their customers.
Joe Sturonas, Jan 29 2007 6:33AM Security
Review: Passive Vulnerability Scanner

Review: Passive Vulnerability Scanner

The Tenable Passive Vulnerability Scanner (PVS) is a most interesting product. It is truly passive in that it does not perform active scans of any kind. It is, simply, a very smart sniffer. The product depends for its usefulness on the way that it collects and reports vulnerability data. Since the PVS is always listening, it constantly collects information from the normal data flows on the network. This is superior to active scanners in two important ways.
Peter Stephenson,CeRNS, Jan 29 2007 12:00AM Security
Review: Secude Secure Notebook

Review: Secude Secure Notebook

The Secude Secure Notebook has the ability to authenticate the user using two-factor authentication, such as smart cards and USB tokens. The drive encryption product is broken into two pieces — one that provides the boot time authentication, and a second piece that provides the actual hard drive encryption.
Justin Peltier Jan 29 2007 12:00AM Security
Hot or Not: Remote access breaches

Hot or Not: Remote access breaches

Just like the detectives do on weekly television crime dramas, put yourself in the mind of the bad guy. Pretend that you're the criminal who brokers stolen personal information with organised crime syndicates overseas. Put yourself behind the eyes of the malicious hacker who plans to breach merchant networks and compromise wholesale volumes of consumer payment card information, the kind of information that can be bartered within the internet's dark underbelly.
J. Andrew Jan 24 2007 9:11PM Security
Can security expenditure end with profits?

Can security expenditure end with profits?

Ever since the arrival of the first anti-virus software in the mid-1980s, accountants have been battling with IT managers to control and quantify the efficiency of IT security software.
Steve Gold Jan 24 2007 7:07AM Security
Good enough for your business?

Good enough for your business?

If you're part of a financial institution, chances are you've memorised the Federal Financial Institutions Examination Council (FFIEC) guidance chapter and verse, and, with risk assessment in hand, are in the midst of rolling out some form of consumer authentication.
Joe DeSantis, Jan 24 2007 12:37AM Security
Patching process

Patching process

There are many different names for the second Tuesday of every month: Patch Tuesday, Super Tuesday, Black Tuesday — and maybe even some other unsavory nicknames not suitable for print. This day, when Microsoft rolls out security updates, is the fulcrum around which most organisations' whole patch management cycles revolve. But just as there are different nicknames for the day, there are also differing opinions about how it should be handled and how quickly organisations should respond with changes.
Ericka Chickowski Jan 22 2007 12:14AM Security
Review: DriveCrypt Plus Pack

Review: DriveCrypt Plus Pack

If James Bond had encryption software he would have the DriveCrypt Plus Pack. This software includes many more features than the other products in this category. Are they all useful to the typical corporate road warrior? Probably not, but they are all cool and definitely have some merit.
Justin Peltier Jan 22 2007 12:00AM Security
Train to prevent social media attacks

Train to prevent social media attacks

If there is one certainty in the security business, it is that security professionals and hackers are in a constant battle to protect and exploit vulnerabilities.
Mark Zielinski, Jan 17 2007 11:42PM Security
Implementing compliance through privacy policy

Implementing compliance through privacy policy

The internet age has revolutionised how organisations communicate, publish and find information. While this technology has created new opportunities for global communication and commerce, it has also created new challenges in risk management.
Kurt Mueffelmann, Jan 17 2007 11:22PM Security

Log In

  |  Forgot your password?