Features

Pen testing: Access denied

Pen testing: Access denied

How can you be sure your security works unless someone tried to crack it - and failed? Rob Buckley delves into the world of penetration testing.
Staff Writers Sep 4 2006 3:56PM Security
VoIP: Can we talk?

VoIP: Can we talk?

VoIP cuts costs and streamlines communication for enterprises, but are the benefits worth the security risks? Dan Kaplan investigates.
Staff Writers Sep 4 2006 3:56PM Security
Recruitment: People on the move - Appointment at Deloitte

Recruitment: People on the move - Appointment at Deloitte

David Bettesworth has been appointed to Deloitte's technology assurance and advisory practice as head of the investment banking technology risk team.
Staff Writers Sep 4 2006 3:56PM Security
Recruitment: People on the move - Appointment at Internet Security
Systems

Recruitment: People on the move - Appointment at Internet Security Systems

Internet Security Systems (ISS) has added Andrew Lawton and Bridget Charles to its northern European management team.
Staff Writers Sep 4 2006 3:56PM Security
Recruitment: People on the move - Appointment at PatchLink

Recruitment: People on the move - Appointment at PatchLink

Patrick Clawson has left CyberGuard Corporation to take up the position of chairman, CEO and president of PatchLink.
Staff Writers Sep 4 2006 3:56PM Security
Recruitment: People on the move - Appointment at ConSentry
Networks

Recruitment: People on the move - Appointment at ConSentry Networks

Former Juniper Networks man Dan Leary has joined ConSentry Networks as vice-president of marketing. The appointment comes at a time of fundamental change in the way enterprises build LANs. www.consentry.com.
Staff Writers Sep 4 2006 3:56PM Security
Recruitment: People on the move - Appointment at Integralis

Recruitment: People on the move - Appointment at Integralis

Integralis has promoted Graham Jones to chief operating officer.
Staff Writers Sep 4 2006 3:56PM Security
Events: Seminars

Events: Seminars

SEPTEMBER
Staff Writers Sep 4 2006 3:56PM Security
Editorial: Keeping up with the world we live in

Editorial: Keeping up with the world we live in

Sometimes, events conspire to focus the mind. The happenings of the past month fall into this category. It started when Dell and Apple were forced into an expensive recall of millions of laptop batteries after the evidence that they were liable to cause fires became overwhelming.
Paul Fisher, Sep 4 2006 3:56PM Security
The Month: Twice as safe at Barclays

The Month: Twice as safe at Barclays

Barclays has announced that it will trial two-factor authentication devices for online customers. A calculator-sized card reader will generate a unique 12-digit authentication code when a bank card is inserted. The bank expects to deploy the devices throughout 2007.
Staff Writers Sep 4 2006 3:56PM Security
Opinion: From the CSO's desk - Think before you hit the send

Opinion: From the CSO's desk - Think before you hit the send

One of the "advantages" of being the head of a security team for a major company is that my email account is an easy first port of call for security product vendors to introduce themselves. Over the past couple of years, I have seen this means of communication grow exponentially.
Paul Dorey, Sep 4 2006 3:56PM Security
Opinion: Chase the cowboys out of town

Opinion: Chase the cowboys out of town

Now that I am looking for a position, I have put my CV on Job Board, Job Serve, Monster Board, etc, which means just about every recruiter in the world has access to my CV. Recently, I got a message from a recruiter asking me to call back:
Richard Starnes, Sep 4 2006 3:56PM Security
Opinion: Good night, and good luck

Opinion: Good night, and good luck

After the better part of ten years, Microsoft has at last announced that Windows 98 is no longer supported. As the company's least secure operating system, you might think that most people would be grateful to see the back of it.
Nick Barron, Sep 4 2006 3:56PM Security
Review: Identity Manager 3

Review: Identity Manager 3

Novell have been around since the very early 1980s and will be associated by many with NetWare and, more latterly, their work in the open source area. With offices around the world, the company is active in many technology areas, including consultancy. It is therefore well placed to understand the eccentricities of network access control, corporate directories, provisioning and such like.
Julian Ashbourn Sep 1 2006 12:00AM Security
Review: Identity Manager 3

Review: Identity Manager 3

Novell have been around since the very early 1980s and will be associated by many with NetWare and, more latterly, their work in the open source area. With offices around the world, the company is active in many technology areas, including consultancy. It is therefore well placed to understand the eccentricities of network access control, corporate directories, provisioning and such like.
Julian Ashbourn Sep 1 2006 12:00AM Security
Review: Enterprise Security Analyzer

Review: Enterprise Security Analyzer

Although this program is simple to use, we found it took a little time to work with set-up and configuration. Set-up is guided by the main set-up wizard, which guides the user through installation and a bit of initial configuration. Once the main install is completed, there are follow-up steps of creating SSL certificates for IIS and possibly many other loose ends, depending on the environment.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Sep 1 2006 12:00AM Security
Review: NetIQ Security Manager

Review: NetIQ Security Manager

In our experience, the implementation of this product is no walk in the park. The Security Manager is a small part of a much larger complete security solution by NetIQ. Deployment of this product is massive, with dozens of pre-install steps to be completed on each of the different machines necessary for full deployment. This includes configuration of a database server, a log database computer and a central computer.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Sep 1 2006 12:00AM Security
Industry Views: Wireless, compliance two drivers of strong investment in IT security

Industry Views: Wireless, compliance two drivers of strong investment in IT security

Security remains a key growth area for venture capital investment and shows no sign of slowing down. Although the IPO market may be weak (as it is for nearly all categories of venture investment), mergers and acquisitions (M&A) are on the rise. And many new security companies are being created. Think about these compelling statistics:
Deborah Magid, Aug 28 2006 6:55PM Security
Patch management: Hold it together

Patch management: Hold it together

The constant need for patch management is a pain, taking up precious time and resources. Is there a better way? Gary Flood investigates.
Staff Writers Aug 14 2006 2:44PM Security
Recruitment - People on the move - Appointment at Enterasys
Networks

Recruitment - People on the move - Appointment at Enterasys Networks

Leon Woo has been promoted to executive vice-president and chief technology officer at Enterasys Networks.
Staff Writers Aug 14 2006 2:44PM Security

Log In

  |  Forgot your password?