Features

A new kid on the training block

A new kid on the training block

So what proof is there that IT security professionals are truly armed with the know-how they may promote?
Illena Armstrong Apr 14 2006 8:14PM Security
Review: FortiGate-300A and FortiAnalyzer-100A

Review: FortiGate-300A and FortiAnalyzer-100A

This unit is an appliance and is very complex from the moment you take it out of the box and plug it in.
Peter Stephenson,CeRNS, Apr 14 2006 12:00AM Security
Review: MIMEsweeper for Web

Review: MIMEsweeper for Web

Clearswift's MIMEsweeper for Web applies the company's email filtering system to the internet. It will install on a single Windows 2000/2003 server and works as a web proxy, scanning all requests.
Peter Stephenson,CeRNS, Apr 14 2006 12:00AM Security
Review: SurfControl Web Filter

Review: SurfControl Web Filter

This venerable product is, as one would expect from one with its pedigree, fully loaded with features. As well as a full-service customizable URL filter, SurfControl contains an anti-spam agent, spyware shield, instant messaging and peer-to-peer shields, anti-virus, and games protection. The differences between this product and our Best Buys are minimal and we rate SurfControl highly recommended.
Peter Stephenson,CeRNS, Apr 14 2006 12:00AM Security
Review: WebMarshal

Review: WebMarshal

WebMarshal lacks documentation and an intuitive interface, which makes it very difficult to work with and configure.
Peter Stephenson,CeRNS, Apr 14 2006 12:00AM Security
Review: Websense Security Suite - Lockdown Edition

Review: Websense Security Suite - Lockdown Edition

This is a very popular product and you can see why from the moment you insert the CD, all the way through to having it completely up and ready for use. Websense is easy to use and configure. The set-up wizard has very clear steps and leaves no doubt to the installer that the program is installing correctly.
Peter Stephenson,CeRNS, Apr 14 2006 12:00AM Security
Review: WebWasher CSM

Review: WebWasher CSM

This was the second of our Best Buys. It is very simple to set up and work with.
Peter Stephenson,CeRNS, Apr 14 2006 12:00AM Security
Debate: Should the UK government have access to search engine records to help fight crime?

Debate: Should the UK government have access to search engine records to help fight crime?

Conleth McCallan Apr 7 2006 5:21PM Security
Bad news from the DTI

Bad news from the DTI

The latest Information Security Breaches Survey from the DTI threw up worrying statistics on the nature of security breaches in UK businesses.
René Millman Apr 7 2006 4:35PM Security
Simon Janes, International operations director, Ibas

Simon Janes, International operations director, Ibas

I used to be the detective in charge of operations at the Metropolitan Police computer crimes unit. I was there for six years. I spent a total of 22 years at the Metropolitan Police. I retired in 1998 and since then I’ve been in computer forensics in the private sector.
Staff Writers Apr 7 2006 4:35PM Security
Simplicity, speed, intelligence

Simplicity, speed, intelligence

Bruce Lee, the King of Kung Fu, had it right when he said that simplicity is the key to brilliance. That is, protecting yourself from a gang of sword-toting attackers might be enormously difficult, but it should never be made complicated. Wise words the IT security industry would do well to heed.
Jeff Prince Apr 7 2006 2:51PM Security
Knowing how to react is everything

Knowing how to react is everything

I have always emphasised the importance of visibility and forward thinking in enterprise security. However, in my experience, incident management is the most important, yet least well-executed, skill in all organisations.
David Lacey, Apr 7 2006 12:44PM Security
The too long arm of the law

The too long arm of the law

The UK’s main law against IT criminals, the Computer Misuse Act, is 16 years old this year. The Act has received plenty of criticism, and led to only a few prosecutions, but recent interpretations and proposed changes are worrying.
Nick Barron Apr 7 2006 12:44PM Security
Breaking up the attack

Breaking up the attack

The industry must learn about packet fragmentation techniques, writes Gunter Ollmann
Gunter Ollmann Apr 7 2006 12:44PM Security
SC Magazine Awards Europe 2006

SC Magazine Awards Europe 2006

It’s only a few more weeks until the IT security industry’s big night out
Staff Writers Apr 7 2006 12:44PM Security
SC Forum 2006

SC Forum 2006

Staff Writers Apr 6 2006 10:16AM Security
Talk is cheap: learn to use it carefully

Talk is cheap: learn to use it carefully

It can be hard to separate facts from hype in the infosec business. Talk to one source and ID theft is a major concern that should have every right-thinking citizen reaching for the shredder. Everything from the latest utility bill to an invitation to tea is turned to dust.
Paul Fisher Apr 6 2006 10:16AM Security
A show of strength

A show of strength

Free up your diary and get down to Europe’s biggest infosec exhibition
Staff Writers Apr 5 2006 4:56PM Security
Avoiding an identity crisis

Avoiding an identity crisis

ID management is fast becoming essential to business, but deployment needs careful planning. René Millman reports
René Millman Apr 5 2006 4:48PM Security
A dress code for your network

A dress code for your network

The huge explosion in mobile working has made organisations recognise the need for effective endpoint security, writes Robert Jaques.
Robert Jaques Apr 5 2006 3:43PM Security

Log In

  |  Forgot your password?