Features

Friends reunited

Friends reunited

Former members of the Royal Air Force hold senior IT security roles at many important UK organisations. Ron Condon meets the ‘Rafia’
Ron Condon Nov 10 2005 4:03PM Security
Our man in cyberspace

Our man in cyberspace

Against a backdrop of spooks, geeks and hackers, former NSA man Ira Winkler paints a dark picture of the modern hacker to Ron Condon
Ron Condon Nov 10 2005 3:24PM Security
DKIM authentication is a good start at fixing email

DKIM authentication is a good start at fixing email

The Yahoo-Cisco technology is expected to combat phishing and spoofing, but it's not a magic bullet that can kill spam.
Craig Carpenter Nov 9 2005 4:35PM Security
How business learned to love open source

How business learned to love open source

More and more proprietary security tools use some open-source code. What are the advantages for companies?
Jim Carr Nov 9 2005 4:23PM Security
Find your perfect partner

Find your perfect partner

Outsourcing needn’t be a leap of faith. René Millman looks at how to get the best from third-party security
René Millman Nov 9 2005 3:49PM Security
Review: TriGeo Security Information Manager

Review: TriGeo Security Information Manager

This product is based upon a substantial rack-mount hardware appliance running Linux, and a Windows-based console and reporting capability with which to administer the system. Agents are then placed on target machines across the network and acknowledged at the console.
Julian Ashbourn Nov 1 2005 12:00AM Security
Review: NetIQ Security Manager

Review: NetIQ Security Manager

This comprehensive product seems to offer a great deal: event monitoring and management; intrusion detection; comprehensive reporting and analysis. All this, plus three printed manuals, an installation guide, user guide and programming guide.
Julian Ashbourn Nov 1 2005 12:00AM Security
Review: Lightning Console

Review: Lightning Console

This software-based console collates security-related information into a central entity, in order to enable analysis and response.
Julian Ashbourn Nov 1 2005 12:00AM Security
Review: XSGuard X-Series

Review: XSGuard X-Series

The last time we tested XSGuard’s IPS appliance, we could not complete the test due to internet connection difficulties (SC, July 2005, p58). This time, we used a similar methodology as in the earlier test, but went into more detail.
Jon Tullett Nov 1 2005 12:00AM Security
Review: DESlock+

Review: DESlock+

This product, now at version 3.2 after an overall clean-up and the addition of new features, is a desktop encryption system using either software key repositories or hardware tokens.
Jon Tullett Nov 1 2005 12:00AM Security
Review: Applied Watch

Review: Applied Watch

The open source philosophy is still gaining ground. But for some, it still smacks less of enterprise-level IT than the enthusiast working alone in their shed at night.
Julian Ashbourn Nov 1 2005 12:00AM Security
Keeping out the data thieves

Keeping out the data thieves

The digitization of virtually all of modern businesses’ intellectual property puts us in a situation today where we are vulnerable to a new breed of security threat. High capacity digital storage devices, such as the USB flash drives, home broadband connections with VPN and the threat of malware are all mechanisms by which thieves can get their hands on your data.
Staff Writers Oct 26 2005 3:25PM Security
Start preparing for the next surge now

Start preparing for the next surge now

Illena Armstrong Oct 21 2005 5:33PM Security
Get the small things right, then move on

Get the small things right, then move on

Ron Condon Oct 21 2005 5:26PM Security
Debate: The digital Mafia isn’t just hype – it really exists, and it has the power to do real damage

Debate: The digital Mafia isn’t just hype – it really exists, and it has the power to do real damage

Pete Simpson Oct 21 2005 5:21PM Security
Spyware’s criminal tendency

Spyware’s criminal tendency

René Millman Oct 21 2005 5:17PM Security
Me and my job

Me and my job

Staff Writers Oct 21 2005 5:13PM Security
Debate: Traditional firewalls have outlived their usefulness and should be thrown out with the trash

Debate: Traditional firewalls have outlived their usefulness and should be thrown out with the trash

Andrew Stern Oct 21 2005 5:06PM Security
Katrina demonstrates need for disaster recovery plans

Katrina demonstrates need for disaster recovery plans

Marcia Savage Oct 21 2005 5:01PM Security
Me and my job

Me and my job

Staff Writers Oct 21 2005 4:56PM Security

Log In

  |  Forgot your password?