Features

SC Forum: It's almost here

SC Forum: It's almost here

Gain insight and contacts to help achieve your goals as an IT security professional, but act fast.
Staff Writers May 10 2006 8:01PM Security
An integrated approach

An integrated approach

SC Magazine is providing an exclusive look at abridged versions of various chapters included in the just-released Larstan’s The Black Book on Government Security, as part of an agreement with Larstan Publishing.
Doron Cohen May 10 2006 8:00PM Security
Backup tapes can't be neglected

Backup tapes can't be neglected

In 2005, storage security losses frequently garnered a storm of media attention, with one organization losing computer backup tapes with personal information on current and former employees. In another instance, a financial services organization lost several backup tapes, with records detailing the financial information of government employees because an overnight shipping company lost their tapes.
Peter Elliman May 10 2006 7:59PM Security
Andreas Wuchner

Andreas Wuchner

The Novartis security chief is delivering on his mission to create a compliant, globally managed risk system. Ron Condon reports
Ron Condon May 9 2006 4:24PM Security
The strength of the pound

The strength of the pound

One simple way to improve your firm’s password security is incorporating non-US characters. Ken Munro explains
Ken Munro May 9 2006 4:24PM Security
Time to welcome another acronym

Time to welcome another acronym

As a relatively recent recruit to the world of security, I have two overwhelming impressions – first, the enormous number of abbreviations and acronyms, and second, the incredible professionalism and deep knowledge of my colleagues.
Mark Hughes May 9 2006 4:24PM Security
Time to call a spade a spade

Time to call a spade a spade

If you’re paranoid like me, one of your regular daily routines will be a check of your corporate anti-virus to make sure that it is receiving updates regularly. This is not an unreasonable precaution; several times I have seen major brand products silently go into a sulk and stop talking to the update server.
Nick Barron May 9 2006 4:23PM Security
Boards need to pay the cost

Boards need to pay the cost

In our organisations, we need to take a strong lead in many areas. The first is awareness. I remember a commercial where a smirking executive tells an IT engineer that he just opened an email attachment – like he was told not to. We know that sort of thing happens somewhere in our organisations.
Peter Stephenson,CeRNS, May 9 2006 4:23PM Security
Simon Heron, director, Network Box

Simon Heron, director, Network Box

It was almost inevitable that I got into security. I started off as a developer before moving into managing people. There I realised I had an interest in network security.

Staff Writers May 9 2006 4:23PM Security
Cyber-crime gets easier

Cyber-crime gets easier

Last month’s launch of the government’s new Serious Organised Crime Agency (SOCA) was welcomed by many commentators. With a growing threat from international drug gangs and the rise in people trafficking, a need was seen for a national agency with the teeth to tackle organised crime and the human misery it causes.
Paul Fisher May 9 2006 4:23PM Security
Handle risk better and reap the rewards

Handle risk better and reap the rewards

It’s been a busy month. By the time you read this, three highlights of the infosec year will have passed in quick succession: Infosecurity Europe, Jericho Forum’s annual conference and, of course, the SC Magazine Awards, Europe 2006. If you weren’t there on the night, the full list of winners and finalists is enclosed with this issue in the commemorative book of the night. Congratulations to all those who went home with one of the coveted gongs.
Paul Fisher May 9 2006 4:23PM Security
Debate: Should companies use unofficial patches to fix vulnerabilities?

Debate: Should companies use unofficial patches to fix vulnerabilities?

Alan Bentley May 9 2006 4:23PM Security
Protection for hire

Protection for hire

Hosted services are gaining in popularity. But should you put your faith in the people who offer IT security? Robert Jaques reports
Robert Jaques May 2 2006 4:35PM Security
Chance assessment

Chance assessment

It’s time to get real when measuring risk against acceptable loss. Business needs a more intelligent approach, says Gary Flood
Gary Flood May 2 2006 3:10PM Security
Review: ActiveScout

Review: ActiveScout

The ActiveScout appliance is a very basic intrusion prevention system that uses behaviour, not signatures to address a possible attack. It will identify whether the network is being scanned and then attempt to block the potential intrusion.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Review: Ally ip100

Review: Ally ip100

We were amazed at what this little product could do and how strong it was. When it first arrived, we did not believe that this little piece of plastic could be a functional IPS. We were wrong.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Review: FortiGate-300A

Review: FortiGate-300A

The FortiGate-300A is a fullfunction front-end system for protecting a network in a way that goes far beyond intrusion prevention. It also has a built-in firewall and anti-virus protection as well as web filtering. Each port on the unit can be firewalled with specific rules and policies, allowing protected VLANs and isolated networks to be created.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Review: InstaGate PRO

Review: InstaGate PRO

The InstaGate has several interesting features. It can become more than just a firewall and IPS, as eSoft offers different software extensions, called SoftPaks. These include anti-virus, web filters, and IM and peer-to-peer filters. Apart from being an all-in-one device, it has a range of customisable reports and alert logs. It also includes several real-time monitors and keeps track of all internal and external activity.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Review: ipANGEL

Review: ipANGEL

This device features real-time vulnerability discovery on the network and can tune and adapt its policies for the best protection. As it learns more about the network, it customises its defences for the environment.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security
Review: Nortel Threat Protection System

Review: Nortel Threat Protection System

The Nortel Threat Protection System runs on a Sourcefire platform, something that surprised us. The product is a flexible system composed of multiple sensors and a management console.
Peter Stephenson,CeRNS, May 1 2006 12:00AM Security

Log In

  |  Forgot your password?