Features

Debate: Should the UK government have access to search engine records to help fight crime?

Debate: Should the UK government have access to search engine records to help fight crime?

Conleth McCallan Apr 7 2006 5:21PM Security
Bad news from the DTI

Bad news from the DTI

The latest Information Security Breaches Survey from the DTI threw up worrying statistics on the nature of security breaches in UK businesses.
René Millman Apr 7 2006 4:35PM Security
Simon Janes, International operations director, Ibas

Simon Janes, International operations director, Ibas

I used to be the detective in charge of operations at the Metropolitan Police computer crimes unit. I was there for six years. I spent a total of 22 years at the Metropolitan Police. I retired in 1998 and since then I’ve been in computer forensics in the private sector.
Staff Writers Apr 7 2006 4:35PM Security
Simplicity, speed, intelligence

Simplicity, speed, intelligence

Bruce Lee, the King of Kung Fu, had it right when he said that simplicity is the key to brilliance. That is, protecting yourself from a gang of sword-toting attackers might be enormously difficult, but it should never be made complicated. Wise words the IT security industry would do well to heed.
Jeff Prince Apr 7 2006 2:51PM Security
Knowing how to react is everything

Knowing how to react is everything

I have always emphasised the importance of visibility and forward thinking in enterprise security. However, in my experience, incident management is the most important, yet least well-executed, skill in all organisations.
David Lacey, Apr 7 2006 12:44PM Security
The too long arm of the law

The too long arm of the law

The UK’s main law against IT criminals, the Computer Misuse Act, is 16 years old this year. The Act has received plenty of criticism, and led to only a few prosecutions, but recent interpretations and proposed changes are worrying.
Nick Barron Apr 7 2006 12:44PM Security
Breaking up the attack

Breaking up the attack

The industry must learn about packet fragmentation techniques, writes Gunter Ollmann
Gunter Ollmann Apr 7 2006 12:44PM Security
SC Magazine Awards Europe 2006

SC Magazine Awards Europe 2006

It’s only a few more weeks until the IT security industry’s big night out
Staff Writers Apr 7 2006 12:44PM Security
SC Forum 2006

SC Forum 2006

Staff Writers Apr 6 2006 10:16AM Security
Talk is cheap: learn to use it carefully

Talk is cheap: learn to use it carefully

It can be hard to separate facts from hype in the infosec business. Talk to one source and ID theft is a major concern that should have every right-thinking citizen reaching for the shredder. Everything from the latest utility bill to an invitation to tea is turned to dust.
Paul Fisher Apr 6 2006 10:16AM Security
A show of strength

A show of strength

Free up your diary and get down to Europe’s biggest infosec exhibition
Staff Writers Apr 5 2006 4:56PM Security
Avoiding an identity crisis

Avoiding an identity crisis

ID management is fast becoming essential to business, but deployment needs careful planning. René Millman reports
René Millman Apr 5 2006 4:48PM Security
A dress code for your network

A dress code for your network

The huge explosion in mobile working has made organisations recognise the need for effective endpoint security, writes Robert Jaques.
Robert Jaques Apr 5 2006 3:43PM Security
The engineer of change

The engineer of change

Rolls-Royce’s Nick Bleech tells Ron Condon why, as business embraces collaborative and mobile working, new rules need to be applied
Ron Condon Apr 5 2006 2:32PM Security
Security on the shop floor

Security on the shop floor

Network security has always been an important consideration in office environments but it has been largely overlooked in manufacturing. But as the shop floor has become increasingly linked to the back office and with the expansion of industrial Ethernet, production managers are now taking network security more seriously.
Olaf Siemens Apr 5 2006 12:18PM Security
Review: Bluesocket BSC 2100

Review: Bluesocket BSC 2100

The BSC 2100 is one of the most advanced products around. One of its key strengths is that Bluesocket realises that wireless networks should integrate with existing networks with as little hassle as possible.
Christopher Moody Apr 1 2006 12:00AM Security
Review: InCharge RF Manager Server

Review: InCharge RF Manager Server

This device is similar in operation to RFprotect, but it comes with a 1U rack-mountable server, which configures the remote sensors.
Christopher Moody Apr 1 2006 12:00AM Security
Review: RFprotect Distributed 5

Review: RFprotect Distributed 5

Standard network tools don’t work to detect and monitor your company’s wireless network policy, which is where this product steps in.
Christopher Moody Apr 1 2006 12:00AM Security
Review: StormShield

Review: StormShield

Wireless notebooks should be just as well protected as corporate wireless networks. SkyRecon’s StormShield achieves that.
Christopher Moody Apr 1 2006 12:00AM Security
Review: WiSentry

Review: WiSentry

One of the biggest threats a company can face is unauthorised access points being added to its network. These can often go undetected, but open a gaping hole in your company’s defences. WiSentry is designed to detect and monitor for these events and warn you as soon as they happen.
Christopher Moody Apr 1 2006 12:00AM Security

Log In

  |  Forgot your password?