Features

Review: SafeBoot

Review: SafeBoot

Control Break's SafeBoot offers a lot of features, but we were a bit put off by several being cited as available at an extra cost, including some basic-looking items such as a scripted administration tool, or a database backup utility.

Jon Tullett Apr 8 2005 12:00AM Security
Review: SafeGuard Easy

Review: SafeGuard Easy

SafeGuard Easy encrypts the entire disk and places agent software in the master boot record, requiring authentication before the OS is loaded.

Jon Tullett Apr 8 2005 12:00AM Security
To catch a thief?

To catch a thief?

When we turn our minds to matters of e-security, our first thoughts tend to be about defenses such as firewalls and intrusion detection. And rightly so. After all, there is much wisdom in the pursuit of prevention before cure. But, what happens when our defenses are breached? How should we respond to such an incident?
Robert Brown Apr 6 2005 3:06PM Security
Cleaning up the network

Cleaning up the network

Many industry professionals sensibly opt to converse in analogies, simplifying the clear-as-mud world of four letter acronyms to instead – for example - paint the world of broadband as a motorway with dirt track off-ramps, and draw parallels between airlines and telcos to describe the highly differentiated services-led approaches needed to combat the commoditization of bandwidth.
Jonathan Mepsted Apr 4 2005 2:02PM Security
Changing attitudes towards corporate governance

Changing attitudes towards corporate governance

Scandal, security and strategy. These three S’s are reshaping the corporate governance landscape today.
Patrick Jolly Mar 30 2005 10:17AM Security
Where techies, businessman and lawyers meet

Where techies, businessman and lawyers meet

With the average cost of a single security breach at over half a million dollars, IT professionals acknowledge the need for proactive, enterprise-wide network security.
Vincent Bieri Mar 29 2005 2:27PM Security
Making the grade

Making the grade

In the face of an ever more complex world of electronic communication, businesses have bought into the need for policies and procedures governing the rules and risks associated with email and internet use.
David Guyatt Mar 23 2005 12:04PM Security
Take control of your security

Take control of your security

Let's face it, managing security policies can give you a headache. Coping with the rules and properties and policies affecting hundreds of devices - firewalls, intrusion prevention systems, and anti-virus servers - is hard enough, and that's before trying to manage them, or change their state.
Amit Tailor Mar 21 2005 3:18PM Security
Changing facts of web crime must be faced

Changing facts of web crime must be faced

The internet's no longer dominated by script kiddies looking for bragging rights. So said experts at both the recent RSA Conference in California and the Cyber Security Summit in Florida. Today's attackers want money, not an underground following.
Illena Armstrong Mar 17 2005 3:12PM Security
The industry’s identity crisis must be solved

The industry’s identity crisis must be solved

There was definitely a penitent feel to the RSA Conference in San Francisco. Speakers such as Bill Gates, John Thompson of Symantec and Art Coviello of Computer Associates all tacitly admitted that the industry has failed to deliver what users need.
Ron Condon Mar 17 2005 3:08PM Security
Don’t do it Bill. All this will achieve is more hacking

Don’t do it Bill. All this will achieve is more hacking

In an interview last month for the BBC, Bill Gates once again stressed how seriously Microsoft is now taking security. He spoke proudly, for example, of the 100 million downloads of Service Pack 2 for Windows XP. "Users don't achieve full potential," he said, "if they're having to worry about something like security."
Robert Schifreen Mar 17 2005 3:03PM Security
It’s vital to look back and learn from mistakes

It’s vital to look back and learn from mistakes

One of the great things about mistakes is learning from them. Indeed, it can be argued that many of the greatest advances have come from mistakes. Of course, it's best to learn from the mistakes of others.
Nick Barron Mar 17 2005 2:52PM Security
Jericho finally sets out vision of open networks

Jericho finally sets out vision of open networks

IT security pressure group the Jericho Forum has finally published the white paper outlining its vision for open, secure networks.
René Millman Mar 17 2005 2:46PM Security
UK plc must heed advice in fight against net crime

UK plc must heed advice in fight against net crime

The world of smaller businesses has become the target of two Home Office online security initiatives.
René Millman Mar 17 2005 2:41PM Security
FoIA exposes a public sector rife with misuse

FoIA exposes a public sector rife with misuse

Computer misuse within major public sector bodies is rife.
David Quainton Mar 17 2005 2:27PM Security
Florida ITCEs and SEI bid to improve software quality

Florida ITCEs and SEI bid to improve software quality

National and international organizations are joining forces to help strengthen the security of software and systems on which businesses rely.
Staff Writers Mar 17 2005 2:19PM Security
Top groups join together to get state’s attention

Top groups join together to get state’s attention

Top security experts contend that many IT security jobs will require CISOs/CSOs to handle operational aspects as well as IT and physical security.
Illena Armstrong Mar 17 2005 2:16PM Security
Web services will need managed IDs to stay safe

Web services will need managed IDs to stay safe

As web services evolve from app-to-app to more complex transactions, they introduce new challenges for CSOs to consider.
Merritt Maxim Mar 17 2005 2:12PM Security
Failing to protect systems will turn you into roadkill

Failing to protect systems will turn you into roadkill

It must be conference season. I've never asked my colleagues on the speaking circuit if they've made this observation, but it seems I get a lot of questions that indicate that, although security folks protect their enterprises, they don't protect their security assets.
Peter Stephenson Mar 17 2005 2:04PM Security
Collaboration is key to infosecurity future says Symantec’s Thompson

Collaboration is key to infosecurity future says Symantec’s Thompson

Symantec CEO John Thompson used his keynote speech at the San Francisco RSA conference to demand radical reform in the security market, and dismissed Microsoft's efforts as insufficient.
Staff Writers Mar 17 2005 2:00PM Security

Log In

  |  Forgot your password?