Features

Review: Spectator Professional

Review: Spectator Professional

Promisec’s Spectator Professional software combines the functionality of an appliance with the simplicity of standalone software.
Peter Stephenson,CeRNS, Jun 1 2006 12:00AM Security
Review: UTM Plus

Review: UTM Plus

Network Box offers hosted security services based on its own custom appliances installed locally on end users’ networks. The company has a range of services designed to meet the requirements of firms of all sizes – from small home office users to large corporate enterprises.
Jon Tullett Jun 1 2006 12:00AM Security
Review: RFprotect Endpoint

Review: RFprotect Endpoint

Despite the name, this is not similar to the endpoint products in this month’s endpoint security group test, hence its inclusion here on its own.
Jon Tullett Jun 1 2006 12:00AM Security
Dial M for Mobile Authentication

Dial M for Mobile Authentication

Recent efforts by the financial services industry to reduce the extent of credit card fraud are starting to pay off.
Paul Meadowcroft May 24 2006 11:35AM Security
Review: Skybox View 2.5

Review: Skybox View 2.5

This suite of security risk management applications contains components that analyze networks for vulnerabilities, identify risks, spot anomalous activity and report on it, raise alerts and track mitigation, then map the whole lot back to a set of business processes and risk models.
Jon Tullett May 12 2006 12:00AM Security
Review: Configuresoft ECM and SUM

Review: Configuresoft ECM and SUM

Configuresoft’s Enterprise Configuration Manager (ECM) is a management application for configuration, patching, security, audit and compliance – and all from a single, very scalable console view.
Jon Tullett May 12 2006 12:00AM Security
Cashing in on misconfigured systems

Cashing in on misconfigured systems

It’s not news anymore that cyberattackers penetrating corporate networks are after money, not infamy, these days. The bread they can make from these and other online activities, such as spam, is staggering. One only has to look at the recent case of Christopher William Smith, who allegedly made over $20 million illegally selling prescription drugs through spam emails.
Illena Armstrong May 10 2006 8:10PM Security
News briefs

News briefs

The uproar over foreign control over American interests was blamed for the break-up of one nearly successful IT security merger. Check Point Software Technologies Ltd., which is based in Israel, and Maryland-based Sourcefire broke off a $225 million merger that came under intense scrutiny by the Committee on Foreign Investment in the United States (CFIUS). “Basically we agreed to withdraw applications based on a couple of things,” said Michelle Perry, chief marketing officer for Sourcefire. “First the complexities of the overall CFIUS process, the lengthy ongoing delays and the current climate for international acquisitions.
Staff Writers May 10 2006 8:09PM Security
Debate

Debate

NBA systems are the most effective solutions for stopping worms and viruses.
Adam Powers May 10 2006 8:08PM Security
Company news

Company news

Kevin Prince has joined Perimeter Internetworking as chief security officer. Prince will help formulate the managed network security firm’s strategic and product development plans and oversee its strategic relationships. Prince previously founded Red Cliff Solutions and he currently trains federal examiners on security topics such as firewalls, intrusion detection and prevention, and remote access. www.perimeterusa.com
Staff Writers May 10 2006 8:07PM Security
2 minutes on ... Is FISMA effective?

2 minutes on ... Is FISMA effective?

Some believe it is nothing more than a paper exercise. The government earned poor marks on information security this year. Of the 24 agencies graded, seven agencies failed outright and, overall, agencies received an average grade of D+.
Ericka Chickowski May 10 2006 8:07PM Security
Me and my job

Me and my job

How did you get into security? In my case, the question could be phrased, "How did security get into you?" I am not an infosec professional in the usual sense, but rather a business manager with infosec responsibility. I manage business and product development and information security, which is a central thread that composes the fabric of our product offerings.
Aaron Bills May 10 2006 8:07PM Security
Open, transparent and safe?

Open, transparent and safe?

Business in the Participation Age is all about engagement and collaboration. It’s about access, transparency and trust. Today, the isolationist approach to security – the notion of avoiding risk rather than mitigating it – is a surefire way to squash the opportunities and value being created on the network. To be competitive in today’s marketplace, companies must change their mindset and evolve their security culture.
Scott McNealy May 10 2006 8:06PM Security
On colleagues and support

On colleagues and support

We all have colleagues with whom we keep in touch. We all have colleagues who we call on from time to time for help when we run into knotty problems. And we all have organizations we turn to when we need specific advice. The trouble is that many of us do not mix those three groups to the benefit of our systems’ security, and we should.
Peter Stephenson,CeRNS, May 10 2006 8:05PM Security
Reduce risk through vendor onus

Reduce risk through vendor onus

Many of us are struggling to extend security responsibility and accountability to third-party vendors and outsourcing companies.
Richard Lawhorn May 10 2006 8:05PM Security
Got something to say?

Got something to say?

Send your comments, praise or criticisms to scfeedbackus@haymarketmedia.com. We reserve the right to edit letters.
Staff Writers May 10 2006 8:04PM Security
Cover story: If once is good, twice is better

Cover story: If once is good, twice is better

A United States federal government agency didn’t need to point out the weaknesses of username and password authentication to E*Trade Financial’s CIO Greg Framke. He already knew that such an antiquated method for validating online banking customers falls short in today’s era of keyloggers and phishing scams.
Ericka Chickowski May 10 2006 8:03PM Security
Avoiding a hostile host

Avoiding a hostile host

Back in the old days, at least by malicious hacking standards, the simplest way to hijack a PC was to compromise the vulnerable entryways of the operating system.
Dan Kaplan May 10 2006 8:03PM Security
Threats for $ale

Threats for $ale

As if dealing with skyrocketing numbers of new vulnerabilities each day is not enough, the IT security world must now brace for a new challenge: an emerging underground vulnerability market that could result in more zero-day attacks.
Dan Kaplan May 10 2006 8:02PM Security
Risky business

Risky business

Call it another unintentional legacy of Enron, WorldCom and other corporate accounting scandals of the past decade.
Frank Washkuch May 10 2006 8:02PM Security

Log In

  |  Forgot your password?