Features

 Me and my job

Me and my job

Staff Writers Jul 29 2005 2:33PM Security
Old school rules, new school tools

Old school rules, new school tools

It was a great security conference. The sponsored lunch had gone down a treat, the wine was excellent. The next speaker was being announced: "...will talk on the CIA Principles of Information Security." Yawn, that guy must be old enough to predate punched cards.
Andrew Yeomans Jul 29 2005 2:16PM Security
Pharming for DNS flaws

Pharming for DNS flaws

Pentesting now builds in the latest tricks. But there’s still more to do, says Gunter Ollmann
Gunter Ollmann Jul 29 2005 2:12PM Security
A new role to play for Mr Microsoft

A new role to play for Mr Microsoft

Stuart Okin once spent his life arguing that Microsoft was taking security seriously. Now he has to put this into practice. David Quainton reports
David Quainton Jul 29 2005 2:05PM Security
How to locate intruders

How to locate intruders

Tracking down unwanted wireless access points can be a tricky task. Matthew Gray suggests that RF fingerprinting is the best way to go
Matthew Gray Jul 29 2005 1:52PM Security
No room for excessive trust

No room for excessive trust

Would you let a convicted fraudster look after your financial affairs? Leave your wallet in a room with a known former thief? Give matches to an ex-arsonist? Perhaps feel comfortable knowing that an ex-terrorist hijacker just boarded an aeroplane with you?<
Alan Phillips Jul 27 2005 4:29PM Security
Lights, camera, and… hacker

Lights, camera, and… hacker

There was a good article in a recent issue of Bulletin of the Atomic Scientists about the portrayal of national security issues on film and TV (http://tinyurl.com/dec6v). As you might imagine, modern fiction is often, well, fictional in its portrayal of nuclear weapons, "homeland security" and the like.
Nick Barron Jul 27 2005 4:14PM Security
Move by the DHS is the first right step

Move by the DHS is the first right step

We've all heard the saying, life's not a destination but a journey. The same holds true for security, according to the Federal Trade Commission's Orson Swindle, who talked at a CSO Summit last month in D.C., organized in part by the Information Systems Security Association (ISSA).
Illena Armstrong Jul 27 2005 3:53PM Security
It’s tough on the front line

It’s tough on the front line

Chrisan Herrod, the first CSO at the Securities & Exchange Commission, took a battering from the recent GAO report. Here she gives us her side of the story. By John Sterlicchi, with additional reporting by Marcia Savage
John Sterlicchi Jul 27 2005 3:38PM Security
Spyware, adware and unaware

Spyware, adware and unaware

Spyware is public enemy number one. Web advertising networks are strongly lobbying to make sure that the anti-Spyware bill known as the Spy Act is watered down a bit before passage (Bill H.R. 29).
Paul Myer Jul 27 2005 10:14AM Security
Review: DeadMan’s Handle

Review: DeadMan’s Handle

DeadmanMan's Handle is a data security product that is simple in concept – if an unauthorized user attempts to use the machine, it deletes any sensitive files.

Jon Tullett Jul 27 2005 12:00AM Security
Review: Active Folders Content Manager

Review: Active Folders Content Manager

Active Folders is an email search engine that looks for multiple attributes. It automates the manual task of finding unwanted attachments or abusive emails, or can be used to bring together all communications on a specific subject.

Eric Doyle Jul 27 2005 12:00AM Security
Review: MIMEsweeper for SMTP

Review: MIMEsweeper for SMTP

This is a security and routing application for email systems. It protects them from spam, malware and DoS attacks, but its main feature is the ability to direct messaging traffic based on content, rather than the destination address.

Eric Doyle Jul 27 2005 12:00AM Security
Review: Adobe LiveCycle Policy Server

Review: Adobe LiveCycle Policy Server

Policy Server appeared with the release of Acrobat 7 earlier this year. It builds substantially on the encryption and password security of past editions of Acrobat and provides control over how Acrobat PDF format documents are accessed.

Eric Doyle Jul 27 2005 12:00AM Security
Review: Enterprise Configuration Manager

Review: Enterprise Configuration Manager

ECM started as a Windows inventory management tool, but has moved with the times. This release turns it into a systems policy management and compliance system for Windows, Solaris and Red Hat.

Eric Doyle Jul 27 2005 12:00AM Security
Review: NETconsent

Review: NETconsent

Targeting policies for email and web use, NETconsent is an on-screen employee policy development environment.

Eric Doyle Jul 27 2005 12:00AM Security
Review: Policy Commander

Review: Policy Commander

Configuring the security settings on Windows servers, desktops and notebooks is an overly complex chore. Ensuring that the users do not reset any of the settings just adds to the headache. Policy Commander automates this task using predetermined policies.

Eric Doyle Jul 27 2005 12:00AM Security
Review: PolicyMatter

Review: PolicyMatter

Technology can only go so far in imposing policies, and there are times when text-based policies must be used. Legal requirements, health and safety, and personal conduct issues require employees to read and digest information.

Eric Doyle Jul 27 2005 12:00AM Security
Review: UniGuard-V34 & Port Authority 44

Review: UniGuard-V34 & Port Authority 44

The UniGuard-V34 modem and Port Authority 44 (PA44) offer secure out-of-band control of networking hardware and servers.

Eric Doyle Jul 27 2005 12:00AM Security
Review: UNIX Privilege Manager

Review: UNIX Privilege Manager

In the Unix world, anyone who knows the root password has access to the root account. This gives them complete control, as there is no way to delegate specific privileges. The systems admin has to decide to control everything, or allow other users root access to perform specific tasks allocated to them. One way leads to overwork, the other to security compromise.

Eric Doyle Jul 27 2005 12:00AM Security

Log In

  |  Forgot your password?