Features

Company news

Company news

Former ceo of Hewlett-Packard Carly Fiorina has joined Cybertrust’s board. Fiorina said in a statement that “information security will be a key driver of growth and innovation in the technology industry for years to come, and Cybertrust is uniquely positioned to lead the global security market.” Fiorina also served as HP’s chairman from 2000 to 2005.

www.cybertrust.com

Staff Writers Dec 15 2005 7:20PM Security
2 minutes on ... multi-factor authentication

2 minutes on ... multi-factor authentication

A recent news story jumped off the page at George Waller.
Frank Washkuch Dec 15 2005 6:58PM Security
Call me a silly optimist

Call me a silly optimist

When pondering the top information security thinkers of the year, a slew of names came to the minds of our editorial staff. In considering who we wanted highlighted in this issue’s end-of-the-year wrap-up, as well as what main themes of 2005 we thought worth rehashing, we had to think about how IT security was being viewed, what people and issues were helping to push associated issues forward, and how this year’s happenings will affect the industry’s future.
Illena Armstrong Dec 15 2005 6:44PM Security
Debate

Debate

Signature-based solutions are not necessary to organizations' security infrastructures.
Dennis Szerszen Dec 15 2005 5:26PM Security
News Briefs

News Briefs

Sony-BMG Entertainment has been under fire from a blogger-fueled media storm after the discovery of spyware-like technology in its CDs. Windows security expert Mark Russinovich first revealed the existence of a rootkit device on 20 of Sony’s musical selections in late October, and within days trojan writers were taking advantage of the cloaking technology to gain access to PCs. A handful of internet weblogs called for boycotts of Sony products less than a month before the holiday shopping season was about to begin, and on Nov. 13 Sony released a statement saying it would withdraw the application from its CD-Roms. Business PC users were concerned the cloaking technology could lead to the compromise of sensitive corporate information, voicing their concerns in a November Sophos poll that showed 98 percent of enterprise users felt the digital rights management technology was a threat.
Staff Writers Dec 15 2005 5:14PM Security
The good, the bad... the annoying

The good, the bad... the annoying

Our fourth annual survey of our readers’ hopes, fears and exasperations provides a fascinating insight into the industry. Ron Condon reports
Ron Condon Dec 15 2005 11:16AM Security
Whisper it softly, but times are changing

Whisper it softly, but times are changing

Ron Condon Dec 9 2005 5:25PM Security
Debate: IP telephony is insecure and cannot be used in an organisation’s infrastructure just yet

Debate: IP telephony is insecure and cannot be used in an organisation’s infrastructure just yet

Tim Keanini Dec 9 2005 5:21PM Security
The SANS top 20 flaws

The SANS top 20 flaws

René Millman Dec 9 2005 5:16PM Security
Ulf Linnarsson, IT security coordinator, Volvo IT Global Security

Ulf Linnarsson, IT security coordinator, Volvo IT Global Security

Staff Writers Dec 9 2005 5:08PM Security
Run Windows XP SP2 now

Run Windows XP SP2 now

One of the few known antidotes to the IFRAME launchpad for these attacks is SP2
Christopher Boyd Dec 9 2005 4:59PM Security
Management right or wrong?

Management right or wrong?

Nick Barron Dec 9 2005 4:51PM Security
Your mission? Explain the basics

Your mission? Explain the basics

Paul Simmonds Dec 9 2005 4:38PM Security
Get your priorities right

Get your priorities right

With a bit more effort, threats can be more accurately assessed and prioritised, says Gunter Ollmann
Gunter Ollmann Dec 9 2005 3:49PM Security
Leaders of the industry pack

Leaders of the industry pack

We turn the spotlight on the noteworthy professionals who are influencing the future of information security. By Illena Armstrong
Illena Armstrong Dec 9 2005 3:40PM Security
How to be a survivor

How to be a survivor

Using the information supplied through your IDS and IPS in the right way could dramatically improve your incident response plans, discovers Jim Carr
Jim Carr Dec 9 2005 3:24PM Security
Time to focus on storage

Time to focus on storage

Storage area networks and network-attached storage are all very well, but how do you secure them properly? And does anyone care, wonders James Middleton
James Middleton Dec 9 2005 2:35PM Security
Virus detection new to GMail

Virus detection new to GMail

GMail, Google's email service, has added virus scanning to its list of features.
Frank Washkuch Dec 6 2005 2:55PM Security
Review: SecureDoc

Review: SecureDoc

SecureDoc is a competent full disk encryptor that uses the AES algorithm and SHA-2 hashing. It works with a token to which the user can save the key file, rather than saving it on the computer. This adds significant extra security – if the user does not store the USB token in their laptop case. The product also supports basic password security and quite a wide range of third-party pre-boot authentication products.
Peter Stephenson,CeRNS, Nov 20 2005 12:00AM Security
Review: Command Center

Review: Command Center

Meta Security Group’s Command Center aims to provide scalability and auditability to one of the key processes of any security program – security policy lifecycle management. The service, hosted at Meta Security Group data centers, is accessible by SSL web browser. Its administration capabilities include user management, portal branding and customization and other general housekeeping.
Keith Pasley Nov 20 2005 12:00AM Security

Log In

  |  Forgot your password?