Features

Give us your views in our 2005 survey

Give us your views in our 2005 survey

Ron Condon Nov 10 2005 4:38PM Security
The Cuthbert conviction

The Cuthbert conviction

Rupert White Nov 10 2005 4:33PM Security
Automation is the answer

Automation is the answer

The shift to automated enforcement will make the problem of security manageable
Dr Gerhard Nov 10 2005 4:26PM Security
Be careful what you measure

Be careful what you measure

Quality-assurance audits are a bit like visits to the dentist; you know you need them, and that they will do you good, but that doesn't make the day itself any more fun. A recent audit I was involved in brought with it the usual flurry of activity to close off outstanding actions and generate the relevant reports.

Nick Barron Nov 10 2005 4:23PM Security
Cast the runes to assess future risk

Cast the runes to assess future risk

As a keen future-gazer, I'm often asked how I justify spending time on all this crystal-ball nonsense. Surely it can't be relevant to my day-to-day work? And clearly it's impossible to predict the future.

David Lacey, Nov 10 2005 4:19PM Security
A new angle on phishing

A new angle on phishing

Mophophishing may prove a threat too far for banking customers, writes Ken Munro
Ken Munro Nov 10 2005 4:13PM Security
Friends reunited

Friends reunited

Former members of the Royal Air Force hold senior IT security roles at many important UK organisations. Ron Condon meets the ‘Rafia’
Ron Condon Nov 10 2005 4:03PM Security
Our man in cyberspace

Our man in cyberspace

Against a backdrop of spooks, geeks and hackers, former NSA man Ira Winkler paints a dark picture of the modern hacker to Ron Condon
Ron Condon Nov 10 2005 3:24PM Security
DKIM authentication is a good start at fixing email

DKIM authentication is a good start at fixing email

The Yahoo-Cisco technology is expected to combat phishing and spoofing, but it's not a magic bullet that can kill spam.
Craig Carpenter Nov 9 2005 4:35PM Security
How business learned to love open source

How business learned to love open source

More and more proprietary security tools use some open-source code. What are the advantages for companies?
Jim Carr Nov 9 2005 4:23PM Security
Find your perfect partner

Find your perfect partner

Outsourcing needn’t be a leap of faith. René Millman looks at how to get the best from third-party security
René Millman Nov 9 2005 3:49PM Security
Review: TriGeo Security Information Manager

Review: TriGeo Security Information Manager

This product is based upon a substantial rack-mount hardware appliance running Linux, and a Windows-based console and reporting capability with which to administer the system. Agents are then placed on target machines across the network and acknowledged at the console.
Julian Ashbourn Nov 1 2005 12:00AM Security
Review: NetIQ Security Manager

Review: NetIQ Security Manager

This comprehensive product seems to offer a great deal: event monitoring and management; intrusion detection; comprehensive reporting and analysis. All this, plus three printed manuals, an installation guide, user guide and programming guide.
Julian Ashbourn Nov 1 2005 12:00AM Security
Review: Lightning Console

Review: Lightning Console

This software-based console collates security-related information into a central entity, in order to enable analysis and response.
Julian Ashbourn Nov 1 2005 12:00AM Security
Review: Applied Watch

Review: Applied Watch

The open source philosophy is still gaining ground. But for some, it still smacks less of enterprise-level IT than the enthusiast working alone in their shed at night.
Julian Ashbourn Nov 1 2005 12:00AM Security
Review: XSGuard X-Series

Review: XSGuard X-Series

The last time we tested XSGuard’s IPS appliance, we could not complete the test due to internet connection difficulties (SC, July 2005, p58). This time, we used a similar methodology as in the earlier test, but went into more detail.
Jon Tullett Nov 1 2005 12:00AM Security
Review: DESlock+

Review: DESlock+

This product, now at version 3.2 after an overall clean-up and the addition of new features, is a desktop encryption system using either software key repositories or hardware tokens.
Jon Tullett Nov 1 2005 12:00AM Security
Keeping out the data thieves

Keeping out the data thieves

The digitization of virtually all of modern businesses’ intellectual property puts us in a situation today where we are vulnerable to a new breed of security threat. High capacity digital storage devices, such as the USB flash drives, home broadband connections with VPN and the threat of malware are all mechanisms by which thieves can get their hands on your data.
Staff Writers Oct 26 2005 3:25PM Security
Start preparing for the next surge now

Start preparing for the next surge now

Illena Armstrong Oct 21 2005 5:33PM Security
Get the small things right, then move on

Get the small things right, then move on

Ron Condon Oct 21 2005 5:26PM Security

Log In

  |  Forgot your password?