Features

IDM: Moving up

IDM: Moving up

Knowing who’s accessing what on enterprise networks that often lack defined perimeters is a necessity. So many company executives are trying to sort out the problems associated with establishing, controlling and terminating their employees’ various user rights.
Rene Millman Apr 14 2006 8:14PM Security
Controlling the endpoint

Controlling the endpoint

There’s yet another IT security bandwagon onto which any number of vendors are jumping. And, whether companies refer to it as network access management (NAM), network access control (NAC), or network access protection (NAP), the main question is: Who has the real deal?
Jim Carr Apr 14 2006 8:14PM Security
Cover story: Defining trust

Cover story: Defining trust

As the mastermind of the Bali nightclub bombings awaited execution, he published a jailhouse autobiography teaching others to follow in his footsteps.
Dan Kaplan Apr 14 2006 8:14PM Security
Locking down WLANs

Locking down WLANs

If I say the word security to you, what comes to mind? Do you think of the access card keys that allow you into your buildings; firewalls to protect your IT infrastructure; or cameras to monitor facilities? Perhaps you think of how to protect the data on your laptop if it is stolen.
Ray Cavanaugh Apr 14 2006 8:14PM Security
Got something to say

Got something to say

Send your comments, praise or criticisms to scfeedbackus@haymarketmedia.com. We reserve the right to edit letters.
Staff Writers Apr 14 2006 8:14PM Security
Taking on the protection challenge

Taking on the protection challenge

It is an old truism that crime goes where the money is. And today, the money is in the data, so that’s where we find the electronic crime.
Tim Mather Apr 14 2006 8:14PM Security
Paying the cost to be the boss

Paying the cost to be the boss

In our organizations, we need to take a strong lead in many areas. The first area is awareness. There used to be a commercial where an executive, with a bit of a smirk, tells an IT engineer that he just opened an email attachment — like he was told not to. In our organizations, we know that sort of thing is happening somewhere in the company.
Peter Stephenson,CeRNS, Apr 14 2006 8:14PM Security
Reducing risk of online ID theft

Reducing risk of online ID theft

The total cost of U.S. identity fraud in 2004 was $52.6 billion, with 11.6 percent of stolen identity information obtained online, according to Javelin Strategy & Research and the Better Business Bureau. The proliferation of online applications providing access to confidential identity data has magnified vulnerabilities that are not adequately addressed by traditional network security techniques. The following policies, procedures and systems are recommended to implement a security program for online applications.
Bruce Pharr Apr 14 2006 8:14PM Security
Me and my job

Me and my job

What do you like about your job?
Nancy Edwards Apr 14 2006 8:14PM Security
The worm turns on Apple

The worm turns on Apple

Macintosh enthusiasts have long used the security of their systems as a flag to wave in the faces of their Windows-using counterparts. With the recent announcement of some key holes in Mac OS X, that flag is drooping.
Ericka Chickowski Apr 14 2006 8:14PM Security
Company news

Company news

»Information Consulting Group has acquired project management firm Net Solutions. The merger provides the business consultant organization’s customers with IT security management solutions. ICG specializes in financial services, consumer products, healthcare and manufacturing. http://www.infoconsultgroup.com
Staff Writers Apr 14 2006 8:14PM Security
Debate: Federated identity will become a reality in the not too distant future

Debate: Federated identity will become a reality in the not too distant future

For, by Nishant Kaushik, architect, security and identity products, Oracle
Staff Writers Apr 14 2006 8:14PM Security
News briefs

News briefs

Security and privacy experts voiced their concerns over whether or not Google’s latest desktop feature is a threat because of a controversial feature that allows users to run remote searches across multiple computers. The internet search giant contended that the “search across computers” feature of Google Desktop 3 Beta, “helps users easily access information from all their computers so they don’t need to remember where all of their documents are organized or filed.” However, the Electronic Frontier Foundation said that the feature would make personal data more susceptible to government subpoenas and hackers.
Staff Writers Apr 14 2006 8:14PM Security
A new kid on the training block

A new kid on the training block

So what proof is there that IT security professionals are truly armed with the know-how they may promote?
Illena Armstrong Apr 14 2006 8:14PM Security
Review: FortiGate-300A and FortiAnalyzer-100A

Review: FortiGate-300A and FortiAnalyzer-100A

This unit is an appliance and is very complex from the moment you take it out of the box and plug it in.
Peter Stephenson,CeRNS, Apr 14 2006 12:00AM Security
Review: MIMEsweeper for Web

Review: MIMEsweeper for Web

Clearswift's MIMEsweeper for Web applies the company's email filtering system to the internet. It will install on a single Windows 2000/2003 server and works as a web proxy, scanning all requests.
Peter Stephenson,CeRNS, Apr 14 2006 12:00AM Security
Review: SurfControl Web Filter

Review: SurfControl Web Filter

This venerable product is, as one would expect from one with its pedigree, fully loaded with features. As well as a full-service customizable URL filter, SurfControl contains an anti-spam agent, spyware shield, instant messaging and peer-to-peer shields, anti-virus, and games protection. The differences between this product and our Best Buys are minimal and we rate SurfControl highly recommended.
Peter Stephenson,CeRNS, Apr 14 2006 12:00AM Security
Review: WebMarshal

Review: WebMarshal

WebMarshal lacks documentation and an intuitive interface, which makes it very difficult to work with and configure.
Peter Stephenson,CeRNS, Apr 14 2006 12:00AM Security
Review: Websense Security Suite - Lockdown Edition

Review: Websense Security Suite - Lockdown Edition

This is a very popular product and you can see why from the moment you insert the CD, all the way through to having it completely up and ready for use. Websense is easy to use and configure. The set-up wizard has very clear steps and leaves no doubt to the installer that the program is installing correctly.
Peter Stephenson,CeRNS, Apr 14 2006 12:00AM Security
Review: WebWasher CSM

Review: WebWasher CSM

This was the second of our Best Buys. It is very simple to set up and work with.
Peter Stephenson,CeRNS, Apr 14 2006 12:00AM Security

Log In

  |  Forgot your password?