Features

Legal matters: How to make AUPs stick

Legal matters: How to make AUPs stick

Can organisations enforce Acceptable Use Policies? Tamzin Matthew investigates.
Jan 17 2007 12:15PM Security
Review: PGP Whole Disk Encryption 9.5

Review: PGP Whole Disk Encryption 9.5

PGP Whole Disk Encryption provides the easiest to install hard drive encryption package we tested. Both the standalone and enterprise products were easy to configure and were easy enough that most end-users could perform the installation with only the quick start guide.
Justin Peltier Jan 15 2007 12:00AM Security
Hot or not: Early Vista flaws

Hot or not: Early Vista flaws

There's been plenty of talk about the security capabilities of Windows Vista, but what's at the heart of the security defenses within Microsoft's latest operating system? This article aims to take a close look at the technology that will make a difference.
Amol Sarwate, Jan 10 2007 10:29PM Security
From Carriage to Content - The future of telcos

From Carriage to Content - The future of telcos

Carriers have long acknowledged that they need to bolt innovative and appealing content services onto their fixed and mobile communications services if they are going to weather the inevitable decline in access charges.
David Binning Jan 10 2007 12:04PM Telco/ISP
Product Section: Two staples of information protection

Product Section: Two staples of information protection

This month, we have juxtaposed two of the foundations of information security: data protection and vulnerability assessment. On the protection side, we look at some of the key products in the area of whole disk encryption.
Peter Stephenson,CeRNS, Jan 8 2007 10:02PM Security
Review: SealedMedia E-DRM

Review: SealedMedia E-DRM

SealedMedia is a client/server implementation with four components. A license server manages what the company calls a classification-based rights model; a management website offers provisioning for users, rights model management and documentation; and a management console is used for administration. The final part is the desktop, the user's tool for sealing documents.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Jan 8 2007 12:00AM Security
Beyond v1@gr@ - spam's new image

Beyond v1@gr@ - spam's new image

We've all heard about the recent rise in spam, and while I dislike spam as much as the next person, I recently received a spam message that got me quite excited.
Andrew Graydon, Jan 2 2007 11:05PM Security
Is someone listening to your keyboard?

Is someone listening to your keyboard?

Floppies are obsolete, CRT monitors are a dying breed and CPU cores are multiplying every year. Since the early days of modern computers, research companies have redesigned, reinvented and revolutionised every aspect of computers except one: the ever faithful keyboard.
Gil Sever, Jan 2 2007 10:57PM Security
Match your company policies with your solutions

Match your company policies with your solutions

The headlines are scary for both CIOs and the companies they work for. "Stolen Computer Holds Information of 16,000 Driver's License Holders," "Vulnerability Auctions Killing Responsible Disclosure," "Hacking for Dollars: Is The Botnet Battle Already Lost?" "Online Brokerage Account 'Incursions' Worry SEC."
Dan Farmer, Jan 2 2007 9:30PM Security
Virtualisation - the next step in enterprise security

Virtualisation - the next step in enterprise security

The complexity, frequency, and malicious intent of security attacks from many sources are increasing in today's enterprise.
Leo Cohen, Jan 2 2007 8:16PM Security
Encryption a perfect response to the Year of the Breach

Encryption a perfect response to the Year of the Breach

2006 will be recorded as the year that security breaches reached the consciousness and awareness of the mainstream consumer. Breaches are certainly not a new phenomena, especially to security professionals.
Phillip M. Dec 27 2006 9:57PM Security
Tailor your mobile security plan for the iPod generation

Tailor your mobile security plan for the iPod generation

Ever since the emergence of iPod back in 2004, GFI and other experts including Gartner analysts, Ruggero Contu and John Girard have been warning that iPods are a potential danger to the corporate network.
Andre' Muscat, Dec 27 2006 9:39PM Security
Review: Multi Network Firewall 2

Review: Multi Network Firewall 2

Mandriva's Multi Network Firewall 2 uses the open source OpenVPN and takes some of the difficulty out of using this approach. We found that the web interface helps make simple steps of creating users and user certificates, which streamlines the process immensely. We liked the organized web interface and found it easy to use.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 18 2006 12:00AM Security
Review: Tenable Security Center

Review: Tenable Security Center

The Tenable Security Center has massive capability wrapped in a single, easy-to-navigate interface. While the overall use of the application is fairly intuitive, once users explore more deeply, they may find that it becomes complex and intricate. This allows for great flexibility, but also requires some time of using the product and learning how to maximize its capability for the specific environment.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 18 2006 12:00AM Security
Review: TriGeo SIM

Review: TriGeo SIM

From the time it is plugged in, all the way through day-to-day management, TriGeo SIM is simple to use. The appliance comes with many rule sets already preconfigured for most security situations, while setting rules for specific environments is made easy by the Rule Builder. This tool uses different modules with rule parts that you just drag and drop into the right place and the rule is created. Filters also are easy to configure using the same process. The main console interface is simple and intuitive to navigate as well.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 18 2006 12:00AM Security
Securing the future of information technology

Securing the future of information technology

Running parallel to the huge business benefits brought about by the ubiquitous and increasingly open-access use of computers are huge risks resulting from information security breaches.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 15 2006 12:14PM Security
Make sure your end users are in compliance

Make sure your end users are in compliance

With the ubiquity of the internet, Wi-Fi hotspots and USB devices, the possibilities for unauthorised software on company PCs now seem endless.
Todd Brennan, Dec 11 2006 11:36AM Security
Review: Activeworx Security Center

Review: Activeworx Security Center

We found this product required some time to work with and to learn about its massive capability. Set-up overall was fairly simple, but the user interface is a little clumsy in the beginning. The Security Center desktop is quite overwhelming at first, with multiple view selections, tabs and tree menus. But once we started working with the interface, we found it quite efficient.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 11 2006 12:00AM Security
Review: ID-Certify

Review: ID-Certify

We now find ourselves in a world of regulatory compliance. It didn't use to be that way, but it is a fact of life we cannot ignore. In a sense, it is good for us who administer and manage IT systems as it forces us to adopt responsible practices, especially around access control.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 11 2006 12:00AM Security
Review: Solsoft Policy Server 7

Review: Solsoft Policy Server 7

Within any sizeable network, the issues around maintaining known configurations from a security perspective can become problematic. Similarly, maintaining a compliant infrastructure, together with its attendant processes, can represent quite a challenge. Add to this the requirements for change control, access control and other factors, and one can readily appreciate that this challenge can become significant in terms of both resource and cost.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 11 2006 12:00AM Security

Log In

  |  Forgot your password?