Features

Review: FortiGate-1000A

Review: FortiGate-1000A

We were pleased to see that this unit’s web GUI was one of the few being tested that defaults to a secure HTTPS connection. There is also a fully featured console available through serial connection, although it has a blank default password. That can be set, but a lot of users might forget, leaving their systems vulnerable.
Jon Tullett Jul 10 2006 12:00AM Security
Review: Firebox XCore 2500

Review: Firebox XCore 2500

The Firebox range is always easy to pick out of a group, with its trademark red casing. The unit ships with a full complement of hardware, some enabled through software licenses.
Jon Tullett Jul 10 2006 12:00AM Security
Review: DFL-2500

Review: DFL-2500

D-Link’s DFL-2500 offers more network control than we expected, and does it at a good price for its class.
Jon Tullett Jul 10 2006 12:00AM Security
Review: Astaro Security Gateway

Review: Astaro Security Gateway

The ASG 425 is at the top end of Astaro’s 1U appliance range, with several smaller versions and two larger options available. The unit offers eight ports, but just one is active by default and is used for the internal segment (and web management). The rest must be specifically enabled and configured, which is our preferred default configuration: everything blocked by default.
Jon Tullett Jul 10 2006 12:00AM Security
Preventing multiple PII disorder

Preventing multiple PII disorder

I used to think I was the one and only Illena Armstrong. The sobering truth, though, is that there are likely quite a few more of me around nowadays — or, at least, there very well could be soon enough.
Illena Armstrong Jul 7 2006 9:45PM Security
News briefs

News briefs

A laptop that had stored on it the personal information of more than 26.5 million veterans was reportedly stolen in May from the home of an employee of the U.S. Department of Veterans Affairs. The event was not made public until nearly three weeks later. The massive data breach resulted in a shakeup at the department, including the resignation of a deputy assistant secretary and a class action lawsuit. The stolen data may also have included information on 1.1 million active-duty service members, 430,000 National Guardsmen and 645,000 members of the Reserves.
Staff Writers Jul 7 2006 9:36PM Security
Debate

Debate

Is innovation still happening in the information security space?
Jon Callas Jul 7 2006 9:28PM Security
New cybersecurity standards

New cybersecurity standards

The 9/11 attacks may have left the nation's power grid unaffected in 2001, but the August 2003 blackout knocked out power to some 400 million Americans. Combined, these incidents stressed the possible impact a widespread outage could cause and prompted concerns about cybersecurity.
Dan Kaplan Jul 6 2006 10:03PM Security
Company news

Company news

VASCO, a leading authentication provider for the financial sector, has acquired Logico Smart Card Solutions for approximately $1.5 million in cash. The purchase of the Vienna-based Logico, an authentication storage specialist, allows VASCO to expand its presence in the smart card and public key infrastructure markets. Logico has customers in the healthcare, manufacturing and government sectors.
Staff Writers Jul 6 2006 9:59PM Security
Me and my job

Me and my job

What do you like most about your job? The constant challenge and learning keeps me going. Every day I need to investigate a new threat, new product or evaluate a new process. I love that I'm never looking at the same thing, and that my challenges always change.
Larry Pesce Jul 6 2006 9:42PM Security
Is employee blogging a risk?

Is employee blogging a risk?

Risk issues around corporate email monitoring have received a lot of attention in recent years, but as blogging continues to gain in corporate adoption, more risk implications may arise. While executives and IT teams have long recognized the importance of having policies in place to manage external forms of communication like email they are just beginning to realize the importance of applying the same level of scrutiny to their internal and external corporate blogs.
Michael Weider Jul 6 2006 9:34PM Security
Workable risk management

Workable risk management

Information security has evolved from safeguarding systems to protecting business services and brands against risk. Senior security executives must closely understand and monitor the level of risk exposure a company has, how the latest threats impact their risk exposure, which system vulnerabilities and access violations represent an actual exploit risk, and what risks will enter into play with new technology and business initiatives.
Chris Babel Jul 6 2006 9:25PM Security
Access in a compliance world

Access in a compliance world

Regulatory pressures continue to shape the demand for "more security" in IT operations. Sarbanes-Oxley is being implemented with a fair bit of grumbling, but it has caused many organizations to strengthen their security posture. CIOs who were previously stymied in their efforts to implement security programs can now wave the "Sarbanes-Oxley flag" to justify their IT investments.
Mary Ann Jul 6 2006 9:17PM Security
Got something to say?

Got something to say?

Send your comments, praise or criticisms to scfeedbackus@haymarketmedia.com. We reserve the right to edit letters.
Staff Writers Jul 6 2006 9:14PM Security
What pill can I take for cyber insecurity?

What pill can I take for cyber insecurity?

Ahhhhh, the internet. We are hooked, and we better be prepared for the consequences. Real dollars are being lost, identities are being stolen, botnets are running rampant, consumer ATM cards are being compromised, spam is jamming our inboxes, the press is reporting stories that contribute to consumer cyber fears, and mankind again finds itself waging a protracted war — this time against internet insecurity.
Kevin Mandia Jul 6 2006 8:31PM Security
Good Business Practice -Scapegoat or Superstar

Good Business Practice -Scapegoat or Superstar

The World Cup is upon us and so for the next four weeks life comes to a standstill. Already meetings are being planned for the week after the final as everyone assumes that his or her team will feature on July the 10th.
Calum Macleod Jun 20 2006 10:48AM Security
No heroes or villains in McKinnon case

No heroes or villains in McKinnon case

To the United States Department of Justice, Gary McKinnon is a suspected criminal; to a growing number of people in the UK, his country of birth, he’s some kind of hero. The lone hacker from Crouch End that dares to take on the might of a bullying superpower.
Paul Fisher Jun 15 2006 11:26AM Security
Debate: Is there evidence of innovation in the information security industry any more?

Debate: Is there evidence of innovation in the information security industry any more?

Dr. Steve Jun 15 2006 11:07AM Security
.xxx could have marked the spot

.xxx could have marked the spot

At first, the idea to sell a new .xxx domain name suffix to online porn vendors seems rational. Any site using the new suffix would be instantly recognisable by web filters and blocked, if required. Good news for parents, businesses and schools – and an industry seeking to position itself as an acceptable, even necessary, part of Western civilisation.
Paul Fisher Jun 15 2006 10:37AM Security
VoIP threats must be faced

VoIP threats must be faced

“Tell me what you want, and I’ll find a solution. I have many datacentres and options...”
Chris Boyd Jun 15 2006 10:17AM Security

Log In

  |  Forgot your password?