Features

Review: Password Manager

Review: Password Manager

Citrix Password Manager is a robust user authentication mechanism that can be used as a standalone application or as part of the Access Suite, which also provides VPN and presentation server capabilities.
Julian Ashbourn Mar 1 2006 12:00AM Security
Review: PortWise

Review: PortWise

PortWise’s basic tenet is to protect remote access to organisational assets via a combination of both user and device authorisation.
Julian Ashbourn Mar 1 2006 12:00AM Security
Review: RSA Sign-On Manager

Review: RSA Sign-On Manager

This software provides enterprise-level SSO using either conventional passwords or, preferably, two-factor authentication using the RSA SecureID tokens.
Julian Ashbourn Mar 1 2006 12:00AM Security
Review: Vintela Authentication Services

Review: Vintela Authentication Services

The Vintela Authentication Services enable a single log-on for organisations that have a mixture of Windows, Unix and Linux resources.
Julian Ashbourn Mar 1 2006 12:00AM Security
Endpoint security reaches across the network perimeter

Endpoint security reaches across the network perimeter

The economy may be on the upswing, but increasing global competition combined with a multitude of compliance issues such as regulatory audits continue to pose a costly problem for organisations.
Alan Bentley Feb 27 2006 11:02AM Security
Grudging compliance just isn’t enough

Grudging compliance just isn’t enough

Ron Condon Feb 13 2006 10:28AM Security
Time to stop trusting paper

Time to stop trusting paper

Everybody loves a good conspiracy, whether it’s alien invasion or security services’ plots to subvert governments. There seems to be no protection against such fascinations with increased education or intelligence (see, for example, Michael Shermer’s book Why people believe weird things).
Nick Barron Feb 13 2006 10:10AM Security
We all need to shout louder

We all need to shout louder

As the security community starts another year, it is time to take stock of significant accomplishment. According to the second annual (ISC)2 Global Workforce Study, we are becoming a domain in our own right. Ultimate accountability for information security is moving away from IT and the CIO to CSOs and CEOs. There is also an entrenchment of the security department, with 20 per cent of respondents having direct reporting lines here.

John Colley Feb 13 2006 10:10AM Security
Joe Dauncey, lead security consultant, AT&T Business

Joe Dauncey, lead security consultant, AT&T Business

I got into security about eight years ago as a network configurator for IBM, setting up routers for its Global Network. Then it became part of AT&T. Eventually, I ended up in a unit mediating between the security guys and the network guys.
Staff Writers Feb 13 2006 10:10AM Security
The reaction to WMF

The reaction to WMF

The new year wouldn’t be complete without Microsoft announcing another security flaw. What is different about the latest one, however, is that it seems to affect virtually every single version of Windows right back to that granddaddy version 3.0.
René Millman Feb 13 2006 10:10AM Security
Debate: Defence in depth is turning out to be nothing more than an expensive failure

Debate: Defence in depth is turning out to be nothing more than an expensive failure

Abe Kleinfeld Feb 13 2006 10:10AM Security
We can’t be quite so open any more

We can’t be quite so open any more

a recent article about the growing fear of identity theft reminded me of a recent incident involving one of my colleagues, a hospital doctor. Let’s call him John Smith, and his workplace Greater Manchester Hospital.
Brian Shorten, Feb 10 2006 5:02PM Security
Look behind the firewall

Look behind the firewall

It takes more than a strong perimeter to keep your files safe from loss or theft, writes Stuart Okin
Stuart Okin Feb 10 2006 4:58PM Security
Get the best out of compliance

Get the best out of compliance

Most of the industry regards compliance as annoying, at best, but Jan Babiak tells René Millman why this risks missing a great opportunity
René Millman Feb 10 2006 4:25PM Security
Documented proof

Documented proof

Organisations send millions of documents electronically each day, but only around half manage them securely. Jan Howells reports
Jan Howells Feb 10 2006 4:25PM Security
So what's in store for you this year?

So what's in store for you this year?

Spam, trojans, keyloggers and every variety of virus are on the increase, making life harder for information security professionals. René Millman assesses the scale of this onslaught
René Millman Feb 10 2006 4:25PM Security
One chance to succeed

One chance to succeed

Melissa Loveday asks what’s been done to ensure IT systems for the Winter Olympics have been hardened against attack
Melissa Loveday Feb 10 2006 4:25PM Security
Standing strong: Partnering for a robust IT backbone

Standing strong: Partnering for a robust IT backbone

Former Secretary of the Department of Homeland Security (DHS) Tom Ridge says that no matter if discussions are about cyberterrorist attacks launched at federal agencies or cash-driven assaults targeted at large enterprises, cooperation and collaboration of federal and corporate efforts is crucial to protecting the nation’s IT backbone.
Illena Armstrong Feb 8 2006 9:26PM Security
Cyberattackers take aim

Cyberattackers take aim

Predictions, like fog, are hard to get your arms around, but here is one that will prove more than just a mere exercise in prophesizing: The next wave of security threats will be targeted attacks aimed at specific organizations or individuals within enterprises.
Jim Carr Feb 8 2006 9:00PM Security
Ten ways to counterattack

Ten ways to counterattack

Enterprise database infrastructures, which often contain the crown jewels of an organization, are subject to a wide range of attacks. The most critical of these are listed below, followed by recommendations for mitigating the risk of each.
Amichai Schulman Feb 8 2006 8:51PM Security

Log In

  |  Forgot your password?