Features

Review: Websense Enterprise

Review: Websense Enterprise

This suite of programs is designed to control access to the internet and keep the enemy at bay. It integrates with many third-party defense applications to offer a war room in a browser from which the state of the defenses can be examined, as well as dictating how the various units work together to shield the internal network.

Eric Doyle Jul 27 2005 12:00AM Security
Review: Workshare Protect

Review: Workshare Protect

Distributing information in Microsoft Office documents can reveal more than was intended.

Eric Doyle Jul 27 2005 12:00AM Security
Can you keep a secret?

Can you keep a secret?

With increasingly extended and dynamic enterprises, the distinction between insiders and outsiders is becoming blurred and what organizations can expect to control is less clear.
Paul Galwas Jul 25 2005 10:58AM Security
Debate» Voice over IP networks pose a security threat to enterprises and their users

Debate» Voice over IP networks pose a security threat to enterprises and their users

David Endler Jul 22 2005 3:27PM Security
The new breed of trojans

The new breed of trojans

A sinister new trend is emerging, with specially crafted trojans targeted at individual companies. The threat reveals the use of malware in industrial or even state-sponsored espionage.
René Millman Jul 22 2005 3:17PM Security
Me and my job

Me and my job

Staff Writers Jul 22 2005 3:10PM Security
Blogging your secrets away?

Blogging your secrets away?

Blogs aren’t all bad. And there are practices you can adopt to protect trade secrets
Staff Writers Jul 22 2005 2:36PM Security
The next generation is here

The next generation is here

I recently attended the graduation of the latest class of Norwich University's Master of Science in Information Assurance program. It was one of the high points of my lengthy career. In the spirit of full disclosure, I've been teaching in this program, for mid-career adults, since its inception. This was the second graduation in the 18-month program.
Peter Stephenson,CeRNS, Jul 22 2005 2:32PM Security
Review: East-Tec Eraser 2005

Review: East-Tec Eraser 2005

East-Tec Eraser 2005 is a dual-purpose product, combining secure file deletion with clean-up tools to erase traces from PCs.

Jon Tullett Jul 22 2005 12:00AM Security
Law is nothing without enforcement

Law is nothing without enforcement

There is a great deal of legislation being proposed that could have a big impact on information security, most of it the result of concerns over ID theft.
Dave Cullinane Jul 21 2005 5:27PM Security
WANTED: A new breed of superhero

WANTED: A new breed of superhero

Phishing and identity theft is becoming more sophisticated and more successful, despite high-profile legal triumphs. David Quainton looks at how the phishers have advanced, and what we need to do to match them
David Quainton Jul 21 2005 3:43PM Security
Evolution of the species

Evolution of the species

Now that ever more apps are made for the web, a technology born there is getting a chance to shine.
Marcia Savage Jul 21 2005 3:18PM Security
How to make clueless users ‘clueful’

How to make clueless users ‘clueful’

Little green men? Aliens from another world? Nope, it’s just Winn Schwartau’s latest obsession
Winn Schwartau Jul 21 2005 11:46AM Security
Review: EnCase Forensic

Review: EnCase Forensic

Guidance Software's EnCase product is the undisputed heavyweight of the forensic software market, and version 5.0 introduces a slew of new features that will keep its opposition firmly on the ropes.

Jon Tullett Jul 21 2005 12:00AM Security
Review: Forensic Field Kit

Review: Forensic Field Kit

WiebeTech's forensic kits tackle two very specific points of pain for forensic investigators: conducting field acquisition and transporting data safely (to prevent damage and ensure the chain of evidence is unchallengeable).

Jon Tullett Jul 21 2005 12:00AM Security
Review: Inforenz Forager

Review: Inforenz Forager

This tool is designed to help search file systems during forensic examinations. It collects information and meta data associated with files, and offers strong searching and indexing capabilities, although limited to Windows file systems.

Jon Tullett Jul 21 2005 12:00AM Security
Review: NetWitness Appliance

Review: NetWitness Appliance

NetWitness is a network forensics and analysis package available in both software and appliance (really just a preconfigured server) formats.

Jon Tullett Jul 21 2005 12:00AM Security
Review: ProDiscover Incident Response

Review: ProDiscover Incident Response

This product is the big brother of its family, including all the forensic capabilities of other versions with the additional ability to conduct investigations over the network and compare live systems to known-good baselines to establish whether a machine has been compromised or tampered with.

Jon Tullett Jul 21 2005 12:00AM Security
Review: Stellar Phoenix FAT & NTFS

Review: Stellar Phoenix FAT & NTFS

Stellar Phoenix is a product aimed at data recovery, rather than strict forensics, although of course recovery is an important part of incident response. Confronted with a disk with damaged or missing data, the software will attempt to recover information and reconstruct partial data.

Jon Tullett Jul 21 2005 12:00AM Security
Review: Total Event Log Management Suite

Review: Total Event Log Management Suite

This product manages and analyzes Windows server log files. While this activity is not limited to forensics, it is an important incident response tool.

Jon Tullett Jul 21 2005 12:00AM Security

Log In

  |  Forgot your password?