Features

No time for declarations of victory over compliance deadlines

No time for declarations of victory over compliance deadlines

US Financial institutions that meet the Federal Financial Institutions Examination Council's (FFIEC) year-end compliance guidance for stronger customer data and transaction protection will be wise not to declare victory.
Arthur W. Dec 5 2006 9:00AM Security
Review: Nortel VPN Gateway 3050

Review: Nortel VPN Gateway 3050

Setting up this product is not a simple task. Most of the setup is done via the command line, but the documentation does not help guide through this process very well. We found ourselves looking through different guides trying to locate configuration information. The absence of a quickstart card or a getting started guide makes this task even more difficult.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 1 2006 12:00AM Security
Interview with John Viega, Vice President, McAfee Inc

Interview with John Viega, Vice President, McAfee Inc

John Viega, Vice President and Chief Security Architect for global security vendor McAfee Inc sat down to discuss compliance and risk management with SC Magazine during his recent visit to Sydney.
Negar Salek Nov 27 2006 2:40PM Security
Encryption prevents red faces

Encryption prevents red faces

Every week brings another public announcement on some dramatic compromise of confidential, sensitive information. Sometimes, it's the loss, or theft, of a computer or hard drive or the hacking of supposedly confidential files containing individuals' private, identifying data, such as credit-card numbers or health records.
Dr David Nov 27 2006 1:31PM Security
Consultant's view: Internal sender spoofing - Ban mail from

Consultant's view: Internal sender spoofing - Ban mail from

It's easy to make email appear to come from an internal user, warns Ken Munro. So be on the lookout.
Nov 27 2006 9:31AM Security
Review: Check Point IM Security

Review: Check Point IM Security

Part of the very popular endpoint security application developed by ZoneLabs, Check Point Integrity IM Security is billed as a solution that keeps instant messaging conversations private and secure, regardless of the IM service used.
René Millman Nov 27 2006 9:00AM Security
Review: Akonix A6000

Review: Akonix A6000

The Akonix A6000 appliance came as a rebadged Dell PowerEdge 850 box that uses AkOS, the supplier's own hardened operating system that was custom-developed on the Linux 2.6 kernel.
René Millman Nov 27 2006 9:00AM Security
Review: Enterprise Instant Messenger

Review: Enterprise Instant Messenger

Enterprise Instant Messenger from MessageLabs is a comprehensive hosted security solution for IM. We were provided with a simple ten-user license evaluation version of the system.
René Millman Nov 27 2006 9:00AM Security
Review: MS Live Comms Server

Review: MS Live Comms Server

Perhaps the length of time it takes to install Live Communications Server 2005 (LCS 2005) reflects its complexity and the vast scope of its capabilities.
René Millman Nov 22 2006 9:00AM Security
Review: FaceTime Enterprise Edition

Review: FaceTime Enterprise Edition

Another rebadged Dell PowerEdge 850 rack-mountable 1U server, FaceTime RTG500 is aimed at the medium to large enterprise market.
René Millman Nov 22 2006 9:00AM Security
Review: Trend Micro IM Security

Review: Trend Micro IM Security

Trend Micro's IM Security suite is designed to sit on top of a Microsoft Windows Server 2003 machine already running Microsoft Live Communications Server 2005. From the offset we got the feeling that this suite was going to be bolted down pretty tight. For starters, to activate the product you need to log into Trend Micro's website and use your registration key to get an activation code.
René Millman Nov 22 2006 12:00AM Security
Industry views: Who's stealing your brand name?

Industry views: Who's stealing your brand name?

It has been estimated that there are US$50 billion of illegal counterfeit and gray market goods sold on the internet annually and with the amazing growth in popularity of online auction sites and business-to-business (B2B) exchanges, all indications are that this trend is going to get worse before it gets better.
Laura Mather, Nov 21 2006 10:23PM Security
Editorial: People will always be the weakest link

Editorial: People will always be the weakest link

At the recent RSA conference Europe, the final keynote speaker was the former politician and governor of Hong Kong, Chris Patten.
Paul Fisher, Nov 20 2006 1:31PM Security
Two become one: Making sense of storage and security convergence

Two become one: Making sense of storage and security convergence

The merging of two IT industries always leads to the formation of a new buzzword, followed by a period of furious head-scratching as to what exactly it means. Integrators and their customers are best advised to wait on the sidelines until the dust settles, standards are set and commodification, that harbinger of good value, arrives.
Sholto Macpherson Nov 15 2006 10:46AM Storage
Market heats up after feeding frenzy

Market heats up after feeding frenzy

In an industry swimming with fish of all sizes, 2006 will remembered as the year in which the storage predators went to lunch. After its multi-billion dollar purchase of industry leader RSA Security, EMC is looking like the cat that got the cream.
Sholto Macpherson Nov 15 2006 10:43AM Storage
MSSPs: At your service

MSSPs: At your service

With security becoming increasingly complex to manage, formerly reluctant organisations are embracing outsourcing, says Rob Buckley.
Rob Buckley Nov 13 2006 1:31PM Security
Interview: Patricia Sueltz, CEO of SurfControl

Interview: Patricia Sueltz, CEO of SurfControl

SurfControl's CEO may be a relative newcomer to the infosec world, but she is already pursuing an aggressive growth policy for the security vendor, Paul Fisher reports.
Paul Fisher Nov 13 2006 1:31PM Security
How are businesses facing up to the compliance challenge?

How are businesses facing up to the compliance challenge?

As businesses try to get to grips with an ever growing list of regulations, could the legislators actually be doing them a favour? I fought the law, and the law won - wise words indeed from The Clash, and the logic is indisputable. However, in the world of business compliance, not everything is black and white: what does your business need to comply with, and how? Will the process be a hindrance or a business boon?
Mark Mayne Nov 13 2006 1:31PM Security
Opinion: Remember: less can be more

Opinion: Remember: less can be more

Discussing the pros and cons of radio frequency identification (RFID), the technology that allows interaction between small chips and nearby readers without physical contact, is a surefire way to get a good argument going.
Nick Barron, Nov 13 2006 1:31PM Security
Interview: Mike Maddison

Interview: Mike Maddison

Deloitte's corporate logo has a very deliberate green full stop at the end. It suggests that what the company offers is backed up by solid expertise and decades of experience and thought. Potential clients need look no further. This is the complete package. End of story.
Paul Fisher Nov 9 2006 12:21PM Security

Log In

  |  Forgot your password?