Features

Review: PassGo Defender

Review: PassGo Defender

This is an easy two-factor system that a new administrator can implement to boost an existing system.

Peter Stephenson,CeRNS, Feb 11 2005 12:00AM Security
Review: WikID Authentication System

Review: WikID Authentication System

WikID systems has a strong offering for the medium-to-large business with this two-factor authentication system.

Peter Stephenson,CeRNS, Feb 11 2005 12:00AM Security
Review: ActivCard Single Sign-On

Review: ActivCard Single Sign-On

ActivCard Single Sign-On is an intelligently designed solution that will easily integrate into most enterprise environments.

Julian Ashbourn Feb 11 2005 12:00AM Security
Review: ActivCard Secure Remote Access Solution

Review: ActivCard Secure Remote Access Solution

ActivCard AAA Server has been designed for industrial or large-scale implementation. Its separate administrative console allows for delegation of multiple administrator roles if the situation calls for it. Installation of the software only requires a system large enough to hold Windows Server 2003 running as a Domain Controller.

Peter Stephenson,CeRNS, Feb 10 2005 12:00AM Security
Combating the hidden dangers of Adware

Combating the hidden dangers of Adware

To most companies, the perception is that the biggest threat to their users’ security continues to come from email and Spam.
Dr. Horst Feb 9 2005 12:53PM Security
Why standards are important for wireless security

Why standards are important for wireless security

Industry standards play a critical role in R&D, product development and marketing initiatives which in turn help organizations meet their business objectives.
Staff Writers Feb 7 2005 11:33AM Security
3G dream a security nightmare

3G dream a security nightmare

Smart mobile technology is rapidly gaining in popularity – and hackers and crackers are among its biggest fans! Very few consumers know about the vulnerabilities of 3G technology, and only now is the industry waking up to the potential security nightmare.
Dr Hamid Feb 2 2005 1:08PM Security
The biggest worms in the world

The biggest worms in the world

There is an old saying that goes “Trouble always comes in threes”. This saying has certainly proved true in the virus world for 2004.
Staff Writers Feb 2 2005 12:56PM Security
Coping with Compliance

Coping with Compliance

The problem with much of what you read is that you no longer know just what to believe. If, like me, you occasionally visit the website which happens to be offering the latest and greatest gadget to improve your life, you understand the problem.
Calum Macleod Feb 2 2005 11:22AM Security
When Smart Phones meet Smart Attacks

When Smart Phones meet Smart Attacks

The scene is set in a dark and gothic basement, somewhere in Russia apparently. Amid the clicking of a keyboard the following chilling statement of intent can be heard; “Let’s see what an application that simultaneously opens up 1000 windows does to a smartphone today, da? Mwahahaha, er, ha!” (Cue bolt of lightning).
Simon Edmed Jan 26 2005 2:41PM Security
The Key to Compliance

The Key to Compliance

In the wake of the Enron and Worldcom accounting scandals, the regulations an enterprise implements to ensure its integrity are open to increasing scrutiny. This has given rise to a growing number of initiatives such as Basel II, the Sarbanes-Oxley Act and the new Companies Act, all designed to ensure that high-standards of corporate governance become part of day-to-day business culture.
Michael Burling Jan 26 2005 2:09PM Security
There’s Something in the Air

There’s Something in the Air

There is little doubt the enterprise Wireless LAN (WLAN) market is booming. Worldwide WLAN hardware revenue is expected to top $3.7bn USD in 2007 (Infonetics), with over 50% of enterprises deploying WLANs by 2006 (Meta Group).
Brian Mansfield Jan 26 2005 2:04PM Security
Review: ThumbDrive Swipe

Review: ThumbDrive Swipe

Protected USB storage is a very good idea for keeping mobile data safe. Several USB storage devices are now available with fingerprint scanners to secure data. Trek's ThumbDrive Swipe is another, but with a couple of interesting twists.

Jon Tullett Jan 21 2005 12:00AM Security
Data theft concern over Google Desktop Search

Data theft concern over Google Desktop Search

Staff Writers Jan 19 2005 12:43PM Security
Time for a Sophisticated Approach to Security

Time for a Sophisticated Approach to Security

As a new year begins, we aspire to achieve more and worker harder. Those with more sinister agendas are no exception, namely - spammers and virus writers -and 2005 will see these people become more shrewd, more malicious, more sophisticated and more hungry for commercial gain.
Matt Peachey Jan 18 2005 3:58PM Security
Combating card fraud

Combating card fraud

Of the security issues facing banks everywhere, prevention of card fraud has always been a high priority, and is set to grow even further in importance.
Paul Meadowcroft Jan 18 2005 3:12PM Security
Court says US spammers must pay more than a billion dollars in fines

Court says US spammers must pay more than a billion dollars in fines

Staff Writers Jan 14 2005 5:07PM Security
Complexity can damage your system defences

Complexity can damage your system defences

Staff Writers Jan 14 2005 5:07PM Security
Fresh MS vulnerability is revealed in Denmark

Fresh MS vulnerability is revealed in Denmark

Staff Writers Jan 14 2005 5:07PM Security
Joining of two major forces

Joining of two major forces

Staff Writers Jan 14 2005 5:05PM Security

Log In

  |  Forgot your password?