Features

Meet the board members

Meet the board members

SC Magazine has a new Editorial Advisory Board. Illena Armstrong polled the members for their views on the trends facing IT security, taking in topics ranging from vendor consolidation to the impact of the Patriot Act
Illena Armstrong Jan 7 2005 4:55PM Security
A new role for libraries?

A new role for libraries?

Should libraries be at the forefront of information security? Lee Ratzan is sure they have an important role
Lee Ratzan Jan 7 2005 4:23PM Security
10 XML best practices

10 XML best practices

Web services hold great commercial potential, but can be a security nightmare. DataPower Technology’s Eugene Kuznetsov lists the ten XML Web Services best practices
Eugene Kuznetsov Jan 7 2005 3:57PM Security
Microsoft and Cisco play nice

Microsoft and Cisco play nice

Unity has broken out in the realm of endpoint security. But for many organizations, grand plans and vision are all well and good, but what about the practicalities? René Millman goes in search of some answers
René Millman Jan 7 2005 3:21PM Security
Providing system support for doctors

Providing system support for doctors

A Pennsylvania hospital has extended its systems boundaries by providing staff with remote secure access
John Sterlicchi Jan 7 2005 2:53PM Security
New boundaries and new rules

New boundaries and new rules

Securing your perimeter is not what it used to be. John Sterlicchi finds out about the range of new ways to control your borders
John Sterlicchi Jan 7 2005 1:03PM Security
Is your website an easy target?

Is your website an easy target?

Working to strict deadlines and under financial constraints, website developers are often forced to place security near the bottom of the list of requirements. Marcia Savage looks at the inevitable consequences
Marcia Savage Jan 7 2005 12:38PM Security
Closing the door to web hackers

Closing the door to web hackers

More organizations are turning to remote access to boost productivity, but this makes them more vulnerable to malicious attacks. Check Point’s Niall Moynihan looks at how to go about protecting your web services
Niall Moynihan Jan 7 2005 11:47AM Security
The dangers of zero-day

The dangers of zero-day

We hear a lot about new vulnerabilities, but as Gunter Ollmann explains, there are still plenty waiting for a patch
Gunter Ollmann Jan 7 2005 11:22AM Security
Storage islands in a sea of risks

Storage islands in a sea of risks

More efficient networks have opened up your data to a host of new dangers. Scott Gordon outlines how best to protect it.
Scott Gordon Jan 6 2005 2:46PM Security
What you measure is what you get

What you measure is what you get

Creating Information Security Performance Measures: Five Recommendations for CIOs and CISOs
Edward Schwartz Jan 5 2005 2:07PM Security
Avoiding IT security mishaps in 2005

Avoiding IT security mishaps in 2005

Some new year resolutions for better information security practices.
Calum Macleod Jan 4 2005 4:15PM Security
Protect your Crown Jewels

Protect your Crown Jewels

Companies need to change their attitudes to outsourcing, says Neil Lloyd.
Neil Lloyd Jan 4 2005 2:36PM Security
Review: Client Migration 3.01

Review: Client Migration 3.01

Migrating users to new versions of applications or operating systems can be a complex, time-consuming and tedious process for systems administrators. And, from a security perspective, it is crucial that the migration of end-users and application settings is done properly in order to prevent vulnerabilities from creeping in.

Alan Bridges Dec 31 2004 12:00AM Security
Businesses  should manage and monitor employee email usage.

Businesses should manage and monitor employee email usage.

In a few short years, email has become a major part of the national psyche and a business-critical tool of communication.
Jamie Cowper Dec 21 2004 12:09PM Security
The challenge of securing VoIP

The challenge of securing VoIP

Voice over IP (VoIP) is rapidly becoming a pervasive technology as businesses embrace cost savings on calls whilst enjoying advanced communications applications sitting within the network.
John Porter Dec 21 2004 12:01PM Security
Days in the life of a pen-tester

Days in the life of a pen-tester

Foreign hackers, weak passwords, backdoors and buffer overflows – just another day at the office for Network Defence’s penetration testers. Here’s a look at sample pages from the head tester’s diary– and what companies can learn from the results.
David Beesley Dec 21 2004 11:34AM Security
Review: Corpex Armourplate

Review: Corpex Armourplate

Armourplate is a managed service with offices in the U.K. and Germany. Although the website claims to be "for U.K. business", the company says it is open to customers anywhere in the world. With the contact details and office hours limited to U.K. specifics, we feel the company (or its parent, Corpex) could be doing a lot more to draw attention to this.

Jon Tullett Dec 21 2004 12:00AM Security
Review: EPA

Review: EPA

EPA (Email Protection Agency) is a reseller for the Email Systems mail filtering services. As managed services settle down, we expect to see a lot more of the larger services being offered as rebadged services through other channels and service providers.

Jon Tullett Dec 21 2004 12:00AM Security
Review: Frontbridge

Review: Frontbridge

This service has been clearly aimed at large (or complicated) organizations that might be managing multiple domains. It can do clever tricks such as rewriting email addresses and handling subdomains that may not have been specifically configured. Administrators can be created with limited sets of responsibilities.

Jon Tullett Dec 21 2004 12:00AM Security

Log In

  |  Forgot your password?