Features

Vista validates encryption for mobile and endpoint security

Vista validates encryption for mobile and endpoint security

Long viewed as a major vector for incoming threats such as viruses, malware and worms, organisations are also increasingly viewing laptops as a primary weakness in the fight against the theft, loss and misuse of information.
Nicko van Dec 6 2006 9:57PM Security
Training to nullify the insider threat

Training to nullify the insider threat

In the last decade, the security of your information on your networks has been focused on protecting the integrity of data from outsiders. Much of the effort has been based on perimeter security - from outsiders trying to break into the network.
Angus MacDonald, Dec 6 2006 9:06PM Security
Hot or not: Holiday threats

Hot or not: Holiday threats

The holiday season is officially underway. Retailers are bustling around to display choice merchandise, while consumers are busy spending. With businesses focused on meeting their end-of-year sales goals and planning for 2007, security may not be a top priority, which can be a costly mistake.
Jennifer Mack, Dec 6 2006 8:49PM Security
A network security strategy for the age of terrorism

A network security strategy for the age of terrorism

Just as bacteria evolve around the technological barriers we put in their place, so too do the tactics and strategies employed by computer attackers. When a security measure is put in place, our enemies immediately set out to exploit its weakness. When they are repelled, they adapt their tactics and strategies, regroup and come back yet again.
G. Robert Dec 5 2006 6:42PM Security
Laptop theft, data exposure the result of poor mobile security management

Laptop theft, data exposure the result of poor mobile security management

Hearing news about yet another lost or stolen laptop and exposure of personal information is almost like having seen too many horror flicks. Shock has shifted to disbelief - plus numb outrage at the apparent inability of corporations and government to protect our private personal data.
Peter Larsson, Dec 5 2006 11:00AM Security
Image spam still growing as threat to email security

Image spam still growing as threat to email security

Today one out of four emails on the internet is an image spam message. This is not because spammers have just realised the marketing benefits of captive colours. Instead, this is because the spammers have identified a weakness in many anti-spam systems and are moving diligently to maximise this opportunity by fully exploiting this weakness.
Paul Judge, Dec 5 2006 10:00AM Security
Review: Symantec IM Manager

Review: Symantec IM Manager

Symantec IM Manager offers instant messaging management and security with support for public IM networks and enterprise IM platforms including AOL, Jabber, IBM Lotus Instant Messaging, ICQ, MSN Messenger, Microsoft Live Communications Server, Reuters, Yahoo! and GoogleTalk.
René Millman Dec 5 2006 9:00AM Security
Patch management doesn't begin or end on Patch Tuesday

Patch management doesn't begin or end on Patch Tuesday

Many organisations appreciate the regularity of Patch Tuesday to better prepare and execute patch deployment. However, few organisations use the time prior to Patch Tuesday to efficiently prepare systems and people for rapid deployment.
Chris Andrew, Dec 5 2006 9:00AM Security
Hot or not: Network embedded device security threats

Hot or not: Network embedded device security threats

Hot: Expect attackers to increasingly target networked, multifunction devices, such as high-end printers, scanners and fax machines, as these devices continue to grow more sophisticated and move away from proprietary operating systems and software.
Amol Sarwate, Dec 5 2006 9:00AM Security
No time for declarations of victory over compliance deadlines

No time for declarations of victory over compliance deadlines

US Financial institutions that meet the Federal Financial Institutions Examination Council's (FFIEC) year-end compliance guidance for stronger customer data and transaction protection will be wise not to declare victory.
Arthur W. Dec 5 2006 9:00AM Security
Review: Nortel VPN Gateway 3050

Review: Nortel VPN Gateway 3050

Setting up this product is not a simple task. Most of the setup is done via the command line, but the documentation does not help guide through this process very well. We found ourselves looking through different guides trying to locate configuration information. The absence of a quickstart card or a getting started guide makes this task even more difficult.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 1 2006 12:00AM Security
Interview with John Viega, Vice President, McAfee Inc

Interview with John Viega, Vice President, McAfee Inc

John Viega, Vice President and Chief Security Architect for global security vendor McAfee Inc sat down to discuss compliance and risk management with SC Magazine during his recent visit to Sydney.
Negar Salek Nov 27 2006 2:40PM Security
Encryption prevents red faces

Encryption prevents red faces

Every week brings another public announcement on some dramatic compromise of confidential, sensitive information. Sometimes, it's the loss, or theft, of a computer or hard drive or the hacking of supposedly confidential files containing individuals' private, identifying data, such as credit-card numbers or health records.
Dr David Nov 27 2006 1:31PM Security
Consultant's view: Internal sender spoofing - Ban mail from

Consultant's view: Internal sender spoofing - Ban mail from

It's easy to make email appear to come from an internal user, warns Ken Munro. So be on the lookout.
Nov 27 2006 9:31AM Security
Review: Check Point IM Security

Review: Check Point IM Security

Part of the very popular endpoint security application developed by ZoneLabs, Check Point Integrity IM Security is billed as a solution that keeps instant messaging conversations private and secure, regardless of the IM service used.
René Millman Nov 27 2006 9:00AM Security
Review: Akonix A6000

Review: Akonix A6000

The Akonix A6000 appliance came as a rebadged Dell PowerEdge 850 box that uses AkOS, the supplier's own hardened operating system that was custom-developed on the Linux 2.6 kernel.
René Millman Nov 27 2006 9:00AM Security
Review: Enterprise Instant Messenger

Review: Enterprise Instant Messenger

Enterprise Instant Messenger from MessageLabs is a comprehensive hosted security solution for IM. We were provided with a simple ten-user license evaluation version of the system.
René Millman Nov 27 2006 9:00AM Security
Review: MS Live Comms Server

Review: MS Live Comms Server

Perhaps the length of time it takes to install Live Communications Server 2005 (LCS 2005) reflects its complexity and the vast scope of its capabilities.
René Millman Nov 22 2006 9:00AM Security
Review: FaceTime Enterprise Edition

Review: FaceTime Enterprise Edition

Another rebadged Dell PowerEdge 850 rack-mountable 1U server, FaceTime RTG500 is aimed at the medium to large enterprise market.
René Millman Nov 22 2006 9:00AM Security
Review: Trend Micro IM Security

Review: Trend Micro IM Security

Trend Micro's IM Security suite is designed to sit on top of a Microsoft Windows Server 2003 machine already running Microsoft Live Communications Server 2005. From the offset we got the feeling that this suite was going to be bolted down pretty tight. For starters, to activate the product you need to log into Trend Micro's website and use your registration key to get an activation code.
René Millman Nov 22 2006 12:00AM Security

Log In

  |  Forgot your password?