Features

Review: SonicWALL Email Security

Review: SonicWALL Email Security

The SonicWall Email Security appliance features protection against threats such as spam, phishing, virus and zero-day attacks.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 15 2007 12:00AM Security
Review: NetClarity Branch Auditor 5.0

Review: NetClarity Branch Auditor 5.0

Last year we reviewed NetClarity’s Enterprise Auditor product and we liked it a lot. This year we looked at its little sibling, the Branch Auditor. We were amazed at the power of this little handful of an appliance.
Peter Stephenson,CeRNS, May 15 2007 12:00AM Security
Review: Core Impact 6.0

Review: Core Impact 6.0

Impact 6.0 from Core Security is a pure penetration testing tool. It is optimised for production use and comes with a suite of pre-programmed exploits. The support agreement provides regular updates with new exploits. Users can write their own exploits and can add to existing ones in the library. Impact can perform pre-configured scenarios or individual exploits.
Peter Stephenson,CeRNS, May 15 2007 12:00AM Security
Review: Utimaco SafeGuard Easy

Review: Utimaco SafeGuard Easy

Utimaco SafeGuard Easy is just what its name promises — the package is easy enough to install that the average end-user could do it. The 24-page installation manual is straightforward and covers both standalone and enterprise installation.
Justin Peltier May 15 2007 12:00AM Security
CIPA key to keeping students safe on the web

CIPA key to keeping students safe on the web

Pornography. Adult Chat Rooms. Violence. Child Stalking. Hacking. There are millions of websites that house offensive content that minors should not be exposed to, and their presence is compounded by their accessibility.
Joshua Block, May 8 2007 4:58PM Security
Training for quick privacy wins

Training for quick privacy wins

A survey of privacy managers at an Open Compliance and Ethics Group (OCEG) event in January revealed that more than two-thirds are seeing moderate to material increases in external scrutiny - with almost half reporting material increases.
Ted Frank, May 8 2007 4:49PM Security
Understanding X-morphic exploitation

Understanding X-morphic exploitation

The concept of malware morphing is not new. For years, malware authors and anti-virus researchers have documented and classified the methods used to obfuscate and hide malware code with each infection.
Gunter Ollmann, May 8 2007 11:13AM Security
Sophisticated web threats flummox most two-factor solutions

Sophisticated web threats flummox most two-factor solutions

The financial industry has been hit hard by the increasing sophistication of web-based threats, including online phishing and identity theft attacks. According to Gartner, these attacks caused losses upwards of US$2.8 billion in 2006 and the numbers don't seem to be abating in 2007.
John Terrill, May 8 2007 11:07AM Security
Review: Forensic Tool Kit v 1.70

Review: Forensic Tool Kit v 1.70

AccessData is one of the venerable developers of computer forensic software. The company’s biggest strength is that it is — and has been since its inception — the go-to supplier of password recovery tools.
Peter Stephenson,CeRNS, May 8 2007 7:54AM Security
Review: DirectPointe security package

Review: DirectPointe security package

DirectPointe provided a hosted security offering which included managed firewall and managed intrusion prevention. The offering uses a SonicWall-based firewall that performs automatic blocking of network attacks.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 8 2007 7:01AM Security
Four steps to guard against data leakage from the endpoint

Four steps to guard against data leakage from the endpoint

The influx of inexpensive storage media — from MP3 players and PDAs to USB thumb drives and external hard drives — in today's enterprise facilitates the dissemination of information further and further away from the enterprise core, and attackers are writing increasingly complex, customised malicious code designed to compromise a company's proprietary information.
Dennis Szerszen, May 7 2007 5:11PM Security
Social networking presents new challenges for business

Social networking presents new challenges for business

The popularity of online streaming videos, social-networking and shopping sites have created new attack vectors for hackers to spread malicious code that could wreak havoc on company networks.
Brett Schechter, May 7 2007 3:07PM Security
Hot or not: Software as a service

Hot or not: Software as a service

SaaS is no longer just about CRM — more security vendors are revamping their applications to be delivered as services over the web.
Amol Sarwate, May 7 2007 2:57PM Security
Review: SSO Express Standard Edition

Review: SSO Express Standard Edition

The Evidian product suite was one of the most complete identity management suites that we tested. As with most complete identity management products that cover provisioning, password self reset, workflow automation and distributed management, it is a complex product to install and configure.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 7 2007 6:00AM Security
Review: LiveWire Investigator v. 3.1.1C

Review: LiveWire Investigator v. 3.1.1C

Live forensics is an emerging field and, although there are a lot of good reasons to use it, there still are caveats.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol May 3 2007 4:15PM Security
Why Vista missed the trick

Why Vista missed the trick

A project that aims to provide laptops for poor children could teach Microsoft a thing or two about security and design.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 24 2007 5:01PM Security
Drivers need patching too

Drivers need patching too

Hard drives are often overlooked when it comes to patching. But an exploit in this area could be fateful.
Ken Munro Apr 24 2007 10:07AM Security
The End: A world without borders

The End: A world without borders

The internet is bringing us closer together, says Ed Gibson. That means more fronts to watch.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 24 2007 10:06AM Security
The End: The dangers of box ticking

The End: The dangers of box ticking

Compliance should be triggered by good security rather than an auditors' visit, says Jen Mack.
Jen Mack, Apr 24 2007 9:03AM Security
Review: EnCase Forensic v. 6

Review: EnCase Forensic v. 6

Of the straight (i.e., not over-the-network) computer forensic tools we examined, EnCase has made the most noticeable changes since last year.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 18 2007 4:08PM Security

Log In

  |  Forgot your password?