Features

Make friends to win influence

Make friends to win influence

The role of the CISO must be folded into the organization’s business lines
Marci McCarthy, May 13 2005 11:58AM Security
Risk is the one constant

Risk is the one constant

Peter Stephenson,CeRNS, May 13 2005 11:56AM Security
Cut cybercriminals off at the pass

Cut cybercriminals off at the pass

Sergio Pinon, May 13 2005 11:51AM Security
Failure must be a part of the plan

Failure must be a part of the plan

The trick is to acknowledge the danger and plan for the inevitable, as former White House advisor Richard Clarke tells Illena Armstrong
Illena Armstrong May 12 2005 5:26PM Security
This is your early warning system

This is your early warning system

Pen testing and vulnerability assessments are essentials. But how often and when these checks are made varies from one company to the next, as Marcia Savage found out
Marcia Savage May 12 2005 4:56PM Security
You can’t stop IM so learn to love it

You can’t stop IM so learn to love it

Instant messaging is the future, says Jim Carr, and there is a world of possibility waiting out there. But there is risk as well as benefit, and it must be faced
Jim Carr May 12 2005 4:36PM Security
Instant futures

Instant futures

Instant messaging has bridged the gap between consumer toy and business tool, says Bill Scott, but development challenges still remain
Bill Scott May 12 2005 4:16PM Security
Will HIPAA bite?

Will HIPAA bite?

Health care organizations are waiting to see how this year’s big legal change is enforced. Marcia Savage takes the industry’s pulse on HIPAA
Marcia Savage May 12 2005 4:06PM Security
Sticking plaster that won’t stick

Sticking plaster that won’t stick

Why has HIPAA failed to achieve the same level of success as SoX, asks Ben Rothke
Ben Rothke May 12 2005 12:11PM Security
Review: LogMeIn

Review: LogMeIn

When 3am Labs asked us to review LogMeIn, we were not sure whether it was really appropriate for SC Magazine. The software is primarily a tool for web-based remote access and administration (there is a "network console" version for enterprise administrators, too). But it has a surprisingly broad set of security features, as well as some clever ways to tie down possible vulnerabilities in remote administration.

Jon Tullett May 12 2005 12:00AM Security
3G dream a security nightmare

3G dream a security nightmare

Smart mobile technology is rapidly gaining in popularity – and hackers and crackers are among its biggest fans! Very few consumers know about the vulnerabilities of 3G technology, and only now is the industry waking up to the potential security nightmare.
Hamid Jahankhani May 11 2005 2:07PM Security
Review: Astaro Security Linux

Review: Astaro Security Linux

Astaro's Security Linux 5.1 takes the open source Linux software and hardens it, but also adds commercial software for a complete security package. It comes with six components: firewall, VPN, anti-virus (provided by Kaspersky), content filtering, anti-spam and intrusion prevention.

Christopher Moody May 11 2005 12:00AM Security
Review: Innominate mGuard PCI

Review: Innominate mGuard PCI

Protecting a single PC from harm usually involves installing a software firewall. However, on a server the overhead this causes can be too much, hence Innominate's mGuard PCI firewall, which has its own 266MHz processor and 32MB of RAM. We tested the professional version. There is also an enterprise version with higher specifications and a greatly improved management interface.

Christopher Moody May 11 2005 12:00AM Security
Review: Celestix MSA4000

Review: Celestix MSA4000

While most firewall appliances will run a custom operating system, or secured version of Linux, Celestix has decided to use Microsoft's Internet Security and Acceleration (ISA) 2004 Server as the basis for its MSA4000 appliance. It runs Windows Server 2003 using 1GB of RAM and an 80GB hard disk. This, obviously, adds to the price of the appliance.

Christopher Moody May 11 2005 12:00AM Security
Review: Check Point Express

Review: Check Point Express

Think of firewalls and Check Point is inevitably the first name that springs to mind, probably followed by thoughts of huge expense. This is not the case with Check Point Express, which brings high-end firewall technology to mid-sized businesses.

Christopher Moody May 11 2005 12:00AM Security
Review: Corporate Guardian 3

Review: Corporate Guardian 3

SmoothWall's Corporate Guardian 3 is one of the best value firewalls on the market. Just provide your own base PC, and the installation will take care of everything else.

Christopher Moody May 11 2005 12:00AM Security
Review: D-Link DFL-1100

Review: D-Link DFL-1100

For the price, D-Link squeezes a lot of features into its Linux-based DFL-1100 appliance, including a SafeNet PCI VPN accelerator card and four Fast Ethernet ports.

Christopher Moody May 11 2005 12:00AM Security
Review: Kerio ServerFirewall

Review: Kerio ServerFirewall

Servers are often entry points to a network, particularly those that are internet visible. Kerio's ServerFirewall, designed for Microsoft operating systems, is designed to combat that by filtering traffic at the server.

Christopher Moody May 11 2005 12:00AM Security
Review: Kerio WinRoute Firewall

Review: Kerio WinRoute Firewall

Kerio's stateful inspection WinRoute Firewall 6 operates on Windows 2000/XP/2003. After a painless and quick installation and reboot, it is ready to run.

Christopher Moody May 11 2005 12:00AM Security
Review: NetOp Desktop Firewall

Review: NetOp Desktop Firewall

With individual PCs being a high risk factor in a network, a personal firewall is an important consideration, particularly when you have notebooks going in and out of the company. CrossTec's NetOp Desktop Firewall is one choice.

Christopher Moody May 11 2005 12:00AM Security

Log In

  |  Forgot your password?