Features

Evolution of the species

Evolution of the species

Now that ever more apps are made for the web, a technology born there is getting a chance to shine.
Marcia Savage Jul 21 2005 3:18PM Security
How to make clueless users ‘clueful’

How to make clueless users ‘clueful’

Little green men? Aliens from another world? Nope, it’s just Winn Schwartau’s latest obsession
Winn Schwartau Jul 21 2005 11:46AM Security
Review: EnCase Forensic

Review: EnCase Forensic

Guidance Software's EnCase product is the undisputed heavyweight of the forensic software market, and version 5.0 introduces a slew of new features that will keep its opposition firmly on the ropes.

Jon Tullett Jul 21 2005 12:00AM Security
Review: Forensic Field Kit

Review: Forensic Field Kit

WiebeTech's forensic kits tackle two very specific points of pain for forensic investigators: conducting field acquisition and transporting data safely (to prevent damage and ensure the chain of evidence is unchallengeable).

Jon Tullett Jul 21 2005 12:00AM Security
Review: Inforenz Forager

Review: Inforenz Forager

This tool is designed to help search file systems during forensic examinations. It collects information and meta data associated with files, and offers strong searching and indexing capabilities, although limited to Windows file systems.

Jon Tullett Jul 21 2005 12:00AM Security
Review: NetWitness Appliance

Review: NetWitness Appliance

NetWitness is a network forensics and analysis package available in both software and appliance (really just a preconfigured server) formats.

Jon Tullett Jul 21 2005 12:00AM Security
Review: ProDiscover Incident Response

Review: ProDiscover Incident Response

This product is the big brother of its family, including all the forensic capabilities of other versions with the additional ability to conduct investigations over the network and compare live systems to known-good baselines to establish whether a machine has been compromised or tampered with.

Jon Tullett Jul 21 2005 12:00AM Security
Review: Stellar Phoenix FAT & NTFS

Review: Stellar Phoenix FAT & NTFS

Stellar Phoenix is a product aimed at data recovery, rather than strict forensics, although of course recovery is an important part of incident response. Confronted with a disk with damaged or missing data, the software will attempt to recover information and reconstruct partial data.

Jon Tullett Jul 21 2005 12:00AM Security
Review: Total Event Log Management Suite

Review: Total Event Log Management Suite

This product manages and analyzes Windows server log files. While this activity is not limited to forensics, it is an important incident response tool.

Jon Tullett Jul 21 2005 12:00AM Security
Steps for ensuring storage network security

Steps for ensuring storage network security

Most companies routinely assess their data security with overall security policy health checks, site surveys, and reviews of processes, systems, networks, and applications. Yet each of these activities rests on fundamental assumptions about where the data resides and how the data "behind the server" is secured.
Brandon Hoff Jul 20 2005 11:45AM Security
Moving towards two-factor authentication

Moving towards two-factor authentication

Protecting data in the digital age is essential. Recent years have seen a decline in “recreational hacking” and a new wave of commercial hacking as illustrated in the example of the keystroke logger placed at the Sumitomo bank in an effort to steal £220m earlier this year and the various efforts at Denial of Service (DoS) blackmail.
John Handelaar Jul 18 2005 2:16PM Security
Why IPS won't break your network

Why IPS won't break your network

Back in 2003 Gartner declared Intrusion Detection Systems (IDS) as dead. Whether this is true, it is an increasing reality that intrusion protection or prevention systems are increasingly becoming a part of many company's networks. While IDS may be waning, IPS (Intrusion Protection Systems) are on the up, yet there is still a pervasive feeling that such technology can cause a network to break or malfunction.
Simon Smith Jul 12 2005 11:28AM Security
Securing instant messaging

Securing instant messaging

It was only recently that IM was the preserve of teens and net-savvy companies. But like so many applications that start small, IM has made the leap from cool tool to useful business application. US analyst Gartner suggests that IM "will rival email in terms of both volume and ubiquity." In 2005 alone, it believes half of all companies will be using enterprise-level IM clients.
David Beesley Jul 6 2005 10:38AM Security
Noticed that big grey thing over there?

Noticed that big grey thing over there?

The latest Global Security Survey from Deloitte Touche Tohmatsu underlines what many of us had conveniently forgotten – that most of the threats to our systems come from inside the organisation.
Ron Condon Jul 1 2005 4:31PM Security
Congress must lead the way on privacy

Congress must lead the way on privacy

It took 34 years for radio to reach 50 million users. Television got to the same number of people in 13 years. The internet hit that 50-million-user mark in just four years.
Illena Armstrong Jul 1 2005 4:27PM Security
Debate» Ethical hacking courses fail to provide practical information to security professionals

Debate» Ethical hacking courses fail to provide practical information to security professionals

Prof. Ken Jul 1 2005 4:20PM Security
Me and my job

Me and my job

Staff Writers Jul 1 2005 3:37PM Security
Consumer data storage

Consumer data storage

David Quainton Jul 1 2005 3:29PM Security
Me and my job

Me and my job

Staff Writers Jul 1 2005 3:20PM Security
So far, it’s a very bad year

So far, it’s a very bad year

The relentless stream of data security breaches is putting pressure on Congress to beef up consumer privacy protection.
Marcia Savage Jul 1 2005 3:16PM Security

Log In

  |  Forgot your password?