Features

Review: AirDefense Enterprise

Review: AirDefense Enterprise

As wireless networks grow in popularity, many security professionals are justly worried about the ease in which non-technical users can set up and operate wireless networks. Also securing wireless infrastructures can be tricky, because the set up of wireless networks can be problematical and not as secure as one might think.

Jon Stearn Oct 6 2004 12:00AM Security
Review: Datakey Axis

Review: Datakey Axis

Set any group of business IT users talking and it will not be long before the subject of passwords and application access control crops up. The "I have more passwords than you" debate will then take place, followed by some imaginative suggestions for getting around the system, together with colorful observations about the relative effectiveness of passwords in any event.

Julian Ashbourn Oct 6 2004 12:00AM Security
What can software asset management do for me?

What can software asset management do for me?

‘It is an irony of modern business that directors pay more attention to the control of assets such as company cars than they do to the management of business critical investments such as IT.’ So says George Cox, director of the IOD. An irony that deepens further still when you realize that many organizations spend more each year on software than they do on their vehicle fleets.
Matt Fisher Sep 29 2004 11:18AM Security
The risks of outsourcing

The risks of outsourcing

What if you learned that your closest competitor had an indirect network connection to your company? Would you be worried? If you outsource any aspect of your company's functions, and that outsourcing vendor has your competitor as a customer, an indirect link may exist.
Benny Jones Sep 29 2004 11:18AM Security
Following protocol

Following protocol

The virtual private network (VPN) is now a widely accepted feature of corporate IT security – and SSL is gaining on the established IPSec standard as the most popular VPN security protocol. How do they stack up?
David Lynch Sep 29 2004 11:18AM Security
Significance of Common Criteria Assurance Maintenance (AMA)

Significance of Common Criteria Assurance Maintenance (AMA)

Certificate Assurance Maintenance (AMA) is an extension to the Common Criteria (CC) Certification Scheme, by which vendors who have previously CC certified their product at a specific revision continue to maintain the same level of assurance their original certification offers their customers, as new revisions of the product are introduced.
Soheila Amiri Sep 22 2004 3:12PM Security
Creating an ROI to justify information security budgets

Creating an ROI to justify information security budgets

The way to get the executive team to pay attention is to provide a quality ROI on any new initiative. If the boards of directors can’t understand the needs of various departments then the only way to their pocketbook is to present them with a bottom line return on their investment.
Ron Lepofsky Sep 22 2004 3:12PM Security
Set clear boundaries for USB storage

Set clear boundaries for USB storage

More security advice from an industry analyst doesn't usually rouse much interest. Then why such a stir after the recent Gartner Group report on threats from portable storage media?
Vladimir Chernavsky Sep 22 2004 3:11PM Security
F5 Networks and Radware cookie lawsuit crumbles

F5 Networks and Radware cookie lawsuit crumbles

F5 Networks and Radware have reached agreement to settle a patent dispute concerning alleged breaches of F5 Networks' US Patent No. 6,473,802 entitled, Method and System for Storing Load Balancing Information with a HTTP Cookie.
Robert Jaques Sep 21 2004 1:53PM Security
Go for zero point of compromise

Go for zero point of compromise

Joe Uniejewski warns that concentrating sensitive data in one place is no longer a responsible solution
Joe Uniejewski Sep 15 2004 2:50PM Security
Debunking the Security Tool Myth

Debunking the Security Tool Myth

As organizations continue to move more of their business online, and as they upgrade to newer, better, faster, feature-laden software, their vulnerability to cyberattacks grows, as does the pressure on security professionals entrusted to keep the infrastructure safe.
Tom Kuhr Sep 15 2004 10:52AM Security
When it comes to wireless security, good enough is simply not good

When it comes to wireless security, good enough is simply not good

As security threats increase in quantity and complexity, assuring business continuity means that corporations need to aggressively and proactively protect the entire network infrastructure.
Bethany Mayer Sep 15 2004 10:52AM Security
A five step process for achieving measurable returns on security investments

A five step process for achieving measurable returns on security investments

What do the president of the United States and a Fortune 1000 CIO have in common? For starters, both are responsible for mitigating immense security threats, maintaining budgets and justifying expenditures to governing committees for approval. They are also accountable for the failure or success of security in their respective domains.
Edward Schenk Sep 15 2004 10:52AM Security
The value of know-how

The value of know-how

When it comes to solving a problem Scott Rasmussen thinks a bit of common sense can go a long way
Scott Rasmussen Sep 14 2004 11:25AM Security
Review: Innominate mGuard

Review: Innominate mGuard

The mGuard security appliance from Innominate claims to be the smallest in the world - measuring in at 20 by 56 by 95mm. It is a firewall and IPSec VPN device that attaches on the back of a desktop computer or server and provides for secure transmission of data from the computer to the internet.

René Millman Sep 13 2004 12:00AM Security
Perimeter security is changing fast

Perimeter security is changing fast

Most security solutions today are built around attempting to protect the vulnerability of the PC and, or the server, by attempting to keep “bad” things outside of the network security perimeter. But, with the changing and disappearing perimeter - security now needs to be intrinsic in every system and for every user.
Bob Johnson Sep 7 2004 12:49PM Security
Security concerns over Metro Ethernet

Security concerns over Metro Ethernet

Ethernet technology has continually reinvented itself over the years to satisfy user requirements. It now supports a range of speeds from 10 Mbps to 10 Gbps, and due to the open, competitive nature of the Ethernet market, prices are very competitive. Ethernet has won the local area network (LAN) battle and is today a ubiquitous technology that provides connectivity for over 97 per cent of networking devices worldwide.
Rami Houbby Sep 7 2004 11:15AM Security
How to prevent the unknown attack - proactive filtering

How to prevent the unknown attack - proactive filtering

If you’re in corporate IT, it can be a difficult world keeping on top of security to keep your business systems running.
Dr. Horst Sep 7 2004 10:54AM Security
Microsoft making the headlines once again…

Microsoft making the headlines once again…

One of the most important announcements in August was the long-awaited release of SP2 for Windows XP. Although it is big step for Microsoft, "lukewarm" would be a kind way to describe its reception in the market.
Jon Tullett Sep 3 2004 4:59PM Security
It’s a testing time for all

It’s a testing time for all

Gunter Ollmann explains the dangers of penetration testing and reviews the best ways to reduce the risks
Gunter Ollmann Sep 3 2004 1:11PM Security

Log In

  |  Forgot your password?