Features

Infosec not just IT dept concern

Infosec not just IT dept concern

In today’s ever increasing security conscious market, it is no longer sufficient simply to delegate the information security of an organization to the network administration staff.
John Golden Apr 13 2005 1:06PM Security
Winning the security disinformation war

Winning the security disinformation war

If IT security is a battle, most companies are faced with the problem of managing a motley army of security devices and solutions.
Jean-Francois Dechant Apr 11 2005 2:27PM Security
Review: Webroot Spy Sweeper Enterprise

Review: Webroot Spy Sweeper Enterprise

The emerging spyware threat is spawning a horde of anti-spyware products. Some have been around for a while, such as the excellent AdAware and Spybot – Search and Destroy.

Jon Tullett Apr 11 2005 12:00AM Security
Review: DESlock+

Review: DESlock+

We have looked at DESlock+ before, with its DESkey USB tokens and file encryption software. And while the previous version impressed us enough to win Best Buy in our Data Encryption test last year, it is safe to say that the product has been improved by leaps and bounds since then.

Jon Tullett Apr 8 2005 12:00AM Security
Review: NMS for PC

Review: NMS for PC

NMS for PC v2.8 is a file encryption system with some interesting bells and whistles. The software integrates into the Windows logon process, using logon to ensure that access to encrypted data is limited to authorized users.

Jon Tullett Apr 8 2005 12:00AM Security
Review: PKWARE SecureZIP for Windows

Review: PKWARE SecureZIP for Windows

Using zip archives to compress and transfer files has become such a standard part of everyday computing that the notion of using the same tools for security should come easily to most users.

Jon Tullett Apr 8 2005 12:00AM Security
Review: SafeBoot

Review: SafeBoot

Control Break's SafeBoot offers a lot of features, but we were a bit put off by several being cited as available at an extra cost, including some basic-looking items such as a scripted administration tool, or a database backup utility.

Jon Tullett Apr 8 2005 12:00AM Security
Review: SafeGuard Easy

Review: SafeGuard Easy

SafeGuard Easy encrypts the entire disk and places agent software in the master boot record, requiring authentication before the OS is loaded.

Jon Tullett Apr 8 2005 12:00AM Security
To catch a thief?

To catch a thief?

When we turn our minds to matters of e-security, our first thoughts tend to be about defenses such as firewalls and intrusion detection. And rightly so. After all, there is much wisdom in the pursuit of prevention before cure. But, what happens when our defenses are breached? How should we respond to such an incident?
Robert Brown Apr 6 2005 3:06PM Security
Cleaning up the network

Cleaning up the network

Many industry professionals sensibly opt to converse in analogies, simplifying the clear-as-mud world of four letter acronyms to instead – for example - paint the world of broadband as a motorway with dirt track off-ramps, and draw parallels between airlines and telcos to describe the highly differentiated services-led approaches needed to combat the commoditization of bandwidth.
Jonathan Mepsted Apr 4 2005 2:02PM Security
Changing attitudes towards corporate governance

Changing attitudes towards corporate governance

Scandal, security and strategy. These three S’s are reshaping the corporate governance landscape today.
Patrick Jolly Mar 30 2005 10:17AM Security
Where techies, businessman and lawyers meet

Where techies, businessman and lawyers meet

With the average cost of a single security breach at over half a million dollars, IT professionals acknowledge the need for proactive, enterprise-wide network security.
Vincent Bieri Mar 29 2005 2:27PM Security
Making the grade

Making the grade

In the face of an ever more complex world of electronic communication, businesses have bought into the need for policies and procedures governing the rules and risks associated with email and internet use.
David Guyatt Mar 23 2005 12:04PM Security
Take control of your security

Take control of your security

Let's face it, managing security policies can give you a headache. Coping with the rules and properties and policies affecting hundreds of devices - firewalls, intrusion prevention systems, and anti-virus servers - is hard enough, and that's before trying to manage them, or change their state.
Amit Tailor Mar 21 2005 3:18PM Security
Changing facts of web crime must be faced

Changing facts of web crime must be faced

The internet's no longer dominated by script kiddies looking for bragging rights. So said experts at both the recent RSA Conference in California and the Cyber Security Summit in Florida. Today's attackers want money, not an underground following.
Illena Armstrong Mar 17 2005 3:12PM Security
The industry’s identity crisis must be solved

The industry’s identity crisis must be solved

There was definitely a penitent feel to the RSA Conference in San Francisco. Speakers such as Bill Gates, John Thompson of Symantec and Art Coviello of Computer Associates all tacitly admitted that the industry has failed to deliver what users need.
Ron Condon Mar 17 2005 3:08PM Security
Don’t do it Bill. All this will achieve is more hacking

Don’t do it Bill. All this will achieve is more hacking

In an interview last month for the BBC, Bill Gates once again stressed how seriously Microsoft is now taking security. He spoke proudly, for example, of the 100 million downloads of Service Pack 2 for Windows XP. "Users don't achieve full potential," he said, "if they're having to worry about something like security."
Robert Schifreen Mar 17 2005 3:03PM Security
It’s vital to look back and learn from mistakes

It’s vital to look back and learn from mistakes

One of the great things about mistakes is learning from them. Indeed, it can be argued that many of the greatest advances have come from mistakes. Of course, it's best to learn from the mistakes of others.
Nick Barron Mar 17 2005 2:52PM Security
Jericho finally sets out vision of open networks

Jericho finally sets out vision of open networks

IT security pressure group the Jericho Forum has finally published the white paper outlining its vision for open, secure networks.
René Millman Mar 17 2005 2:46PM Security
UK plc must heed advice in fight against net crime

UK plc must heed advice in fight against net crime

The world of smaller businesses has become the target of two Home Office online security initiatives.
René Millman Mar 17 2005 2:41PM Security

Log In

  |  Forgot your password?