Features

Review: Laplink PCdefense

Review: Laplink PCdefense

Everyone above a certain age remembers Laplink. Back before PCs were easily networked, you copied files from A to B by connecting serial or parallel cables and firing up the Laplink DOS agent. The firm has come a long way since then, and its range of data management and migration tools has expanded over the years.
Jon Tullett Aug 1 2006 12:00AM Security
On compliance: Congress must act on cyber security to avoid confusion

On compliance: Congress must act on cyber security to avoid confusion

Over the next year or so, this space will provide a monthly guest perspective on various aspects of regulatory compliance from the leading information security companies that make up our CSIA's membership. For our inaugural column, I'd like to focus on the need for Congressional action on data security.
Paul Kurtz, Jul 20 2006 7:52PM Security
Industry views: Look for more spending on convergence, insider threats

Industry views: Look for more spending on convergence, insider threats

The speed of change in IT security is intense and often seemingly chaotic. Security solutions today must constantly morph to reflect not only the shifting needs of customers, but also the advancing capabilities of security threats. The proliferation and progression of DoS attacks and phishing sites, to name a few, demand new means to detect and block criminals. Senior executives, meanwhile, want simplicity and better command and control over the many security solutions they implement. Despite this ever-changing landscape, there are, however, a number of general trends that, from our view as investors, are likely to organize and drive development of IT security products and services over the near and intermediate term.
David Shapiro Jul 18 2006 8:19PM Security
Be careful where you leave your keys

Be careful where you leave your keys

The internet now has 1.07 billion users worldwide and more people buy online than ever before. But this growth in ecommerce has also created a fertile environment for fraud and security threats.
Richard Moulds Jul 13 2006 11:56AM Security
Tangible ROI is possible for IT purchases

Tangible ROI is possible for IT purchases

Return on investment. How many times have you heard or used that phrase in your career? If the answer is never, it's a surprise, but not a total surprise. Measuring the return on investment on IT procurement has not always been the major driving factor – too often, technical specs and whizzy feature lists have clouded purchasing decisions.
Paul Fisher Jul 12 2006 5:01PM Security
Debate: Can there be any justification for organisations monitoring their staff's email?

Debate: Can there be any justification for organisations monitoring their staff's email?

Mark Hughes Jul 12 2006 4:50PM Security
The rise and rise of the quiet trojan

The rise and rise of the quiet trojan

Trojans made up more than 80 per cent of new malware infections over the past six months, according to research from Sophos. Graham Cluley, senior technology consultant at Sophos, said it was because "financially-motivated hackers don't want to infect millions of emails because it draws attention to their malware".
Melissa Loveday Jul 12 2006 4:40PM Security
People are the weakest link

People are the weakest link

"The consensus was that people and processes are often the lowest common denominator in identity theft"
Mike Maddison Jul 12 2006 3:56PM Security
IT folk aren't nearly so shy

IT folk aren't nearly so shy

Security commentators, myself included, regularly comment on the security patching cycle and the problems associated with it. What we tend not to do, though, is comment on the ‘patching' problem for physical security systems.
Nick Barron Jul 12 2006 3:39PM Security
Only we can save the world wide web

Only we can save the world wide web

One of the delegates at the closed Executive Security Action Forum, held before the RSA conference this year, asked: "What will the internet look like – and will it even be there for our children?"
Paul Simmonds Jul 12 2006 2:35PM Security
Don't get cocky about RFID

Don't get cocky about RFID

Are RFID keycards the next big thing? Only if they can see off power attacks, warns Ken Munro
Ken Munro Jul 12 2006 2:13PM Security
Cleaning out the closet

Cleaning out the closet

Compliance has made the case for efficient storage solutions. Use them to deliver long-term business benefits, says Ian Cook
Ian Cook Jul 12 2006 1:01PM Security
Cutting to the chase

Cutting to the chase

Confused and disheartened by the explosion in regulatory hoops your organisation must jump through? Alan Calder points to an easier way
Alan Calder Jul 12 2006 12:42PM Security
Paul Wood

Paul Wood

A need for a coherent response to threat led insurance company Aviva to create its group business protection director role. Ron Condon reports
Ron Condon Jul 12 2006 12:24PM Security
Intruding on the bottom line

Intruding on the bottom line

Are intrusion prevention systems worth the effort of managing them? Or can you get away with a good firewall? Rob Buckley investigates
Rob Buckley Jul 12 2006 12:06PM Security
Has Microsoft finally done it?

Has Microsoft finally done it?

Microsoft appears to be taking security far more seriously with the successor to Windows XP. But has it done it right? Mark Mayne reports
Mark Mayne Jul 12 2006 11:47AM Security
Review: Coroner's Toolkit

Review: Coroner's Toolkit

The Coroner’s Toolkit, or TCT is an open-source set of forensic tools for performing post-mortem analysis on Unix systems. Written by Dan Farmer and Wietse Venema, both very well known in security circles for such programs as SATAN, TCT is not an easy product to use. A serious knowledge of Unix is a prerequisite for success, but if you can manage it, this is an extremely powerful set of tools.
Peter Stephenson,CeRNS, Jul 11 2006 12:00AM Security
Review: EnCase Forensic

Review: EnCase Forensic

This new version of EnCase shows its pedigree as the oldest of the GUI-based IT forensic tools. We found it very simple to operate and use.
Peter Stephenson,CeRNS, Jul 11 2006 12:00AM Security
Review: Forensic ToolKit

Review: Forensic ToolKit

The Forensic ToolKit (FTK) is very powerful and comes loaded with features, although it is naturally difficult to make such a powerful tool completely simple to use. The program interface can overwhelm at first glance, with all its different features and options, but after reading the documentation and getting to know the program, it becomes much more intuitive.
Peter Stephenson,CeRNS, Jul 11 2006 12:00AM Security
Review: i2 Analyst's Notebook

Review: i2 Analyst's Notebook

This is a very different type of analysis tool from those infosec professionals are used to. Link analysis, a crucial aspect of incident response, is usually done manually or by trying to use log correlators. This is a true link analyser with a long pedigree in analysing complex crimes and security incidents.
Peter Stephenson,CeRNS, Jul 11 2006 12:00AM Security

Log In

  |  Forgot your password?