Features

Do you already know your cyber attacker?

Do you already know your cyber attacker?

The victim of a hardware robbery decided to investigate things further when his business began to suffer. Justice was served as the culprits were caught and legal history was made. Neil Hare-Brown explains how
Neil Hare-Brown Sep 2 2004 3:18PM Security
Seven steps to combat cybercriminals in court

Seven steps to combat cybercriminals in court

With the number of cyber attacks escalating, dealing with digital evidence is becoming a pressing issue. Simon Janes gives you a helping hand, guiding you right through from the crime scene to the court room
Simon Janes Sep 2 2004 12:47PM Security
So who hit your network today?

So who hit your network today?

If disaster strikes, the first impulse is to get systems up and running again. But as Illena Armstrong discovers, that could be a bad move
Illena Armstrong Sep 2 2004 12:14PM Security
A problem shared could be a problem solved

A problem shared could be a problem solved

Typically, IT security professionals couldn't care less about public relations. They are too busy trying to keep their companies' computer systems securely up and running. And that particular duty is not simple.
Illena Armstrong Sep 2 2004 11:57AM Security
Chip-maker takes message control

Chip-maker takes message control

California-based company Kingston Technology recognized the security problems caused by the increased use of IM by its employees, so it took positive action to allow them to utilise the tool securely. John Sterlicchi reports
John Sterlicchi Sep 1 2004 5:01PM Security
Time for a tighter hold on IM usage

Time for a tighter hold on IM usage

While users are basking in the delights of the latest powerful communication tool, employers are likely to pay the price unless they implement strong policies that will help avoid any major threats, as Ron Condon reports
Ron Condon Sep 1 2004 4:52PM Security
Really useful… very dangerous

Really useful… very dangerous

If it is implemented properly, IM can be a useful tool, but if it is allowed to grow unchecked, enterprises will suffer the consequences. Phil Worms shows how to weigh the advantages with the risks, and why you should do it now
Phil Worms Sep 1 2004 4:30PM Security
Leading lady takes the SP2 spotlight

Leading lady takes the SP2 spotlight

Microsoft’s Rebecca Norlander is a very busy woman. In between training for triathlons, she is in charge of Service Pack 2 and hopes to change company thinking. Dan Ilett reports
Dan Ilett Sep 1 2004 3:15PM Security
IPSec or SSL? Another option

IPSec or SSL? Another option

Since their advent, IPSec Virtual Private Networks (VPNs) have revolutionized the way remote workers and business partners connect to a business by establishing a secure tunnel between a remote worker or business partner and the organization they are connecting to.
Barry Phillips Sep 1 2004 10:16AM Security
Review: UpdateEXPERT

Review: UpdateEXPERT

It might be a banal subject for some network managers, but security update management is essential. With hundreds of workstations, scores of servers and almost as many operating systems making up the average corporate environment, making sure they all receive the required patches can be a headache-inducing task.

Alan Bridges Sep 1 2004 12:00AM Security
Review: Juniper NetScreen IDP 500

Review: Juniper NetScreen IDP 500

Every now and then you find a product that has major warts but which really, under the warts, is a pretty good product. Then you wish the vendor would get its act together, because you would really like to buy and use the product.

Peter Stephenson,CeRNS, Sep 1 2004 12:00AM Security
Review: Service Pack 2 for Windows XP

Review: Service Pack 2 for Windows XP

The release of Service Pack 2 (SP2) for Windows XP marks a significant step forwards for Microsoft Windows. Specific features such as its support for NX processor instructions and the enormous list of OS fixes were not tested, but are reasons to upgrade in themselves.

Jon Tullett Sep 1 2004 12:00AM Security
Balancing security products with management time. Are you stretching yourself too thin?

Balancing security products with management time. Are you stretching yourself too thin?

With new threats emerging by the second, enterprise security has become paramount. IT managers, however, are faced with the daunting task of coordinating numerous elements from VPNs and e-mail scanning systems to content filters and anti-virus software.
John Edwards Aug 31 2004 5:21PM Security
Web anti-virus – deplorable or deployable?

Web anti-virus – deplorable or deployable?

The internet plays a prevailing role in today’s workplace, and its use continues to grow - from personal web-based email, to the growing popularity of public instant messaging (IM). Despite the benefits the web provides for employees, including convenience and accessibility, its use has opened a back door for viruses to bypass existing email anti-virus security measures and infect the network.
Nigel Hawthorn Aug 31 2004 5:19PM Security
Review: LockBox

Review: LockBox

USB hard drives are getting more popular these days but there aren't many on the market that offer the kind of security that is needed keep confidential data out of the wrong hands.

Micro-Solutions have a nifty device that combines a hard drive with a fingerprint sensor. The idea is a user can only access their own files if they have provided the right authentication. In this instance the right fingerprint.

René Millman Aug 31 2004 12:00AM Security
Modular user management and provisioning

Modular user management and provisioning

Identity management solutions are comprised of several critical components: directory services, access management services, authentication services, and user management and provisioning services.
Jeff Schultz Aug 25 2004 10:28AM Security
Defending your IT infrastructure through effective patch management

Defending your IT infrastructure through effective patch management

Imagine that you are the IT Director of a large retail bank with an active and highly visible Internet banking service. Driving into the office, half-listening to the radio news, you hear your bank’s name being announced. Immediately followed by the words "hacker," "massive system failure" and "identity theft."
David D'Agostino Aug 25 2004 10:27AM Security
Planning for less than a disaster

Planning for less than a disaster

Creating a systems and site availability plan to protect critical business processes and systems.
Marc Malizia Aug 25 2004 10:27AM Security
Review: Recovery Manager

Review: Recovery Manager

Creating a restore point for machines running Windows has be a feature since Windows ME. It has been developed with the advent of Windows 2000 and XP. Basically it creates a "snapshot" of the system and then uses that image to roll back to in case anything should go wrong. Fine in theory, but something rarely used in practice.

That aside, having a restore point is something of some worth and this product takes the concept a lot further. Recovery Manager is a networked version of the same thing but with a few more bells and whistles attached.

René Millman Aug 20 2004 12:00AM Security
Barbarians inside the gate

Barbarians inside the gate

More than ever before, businesses are struggling to address the information protection requirements driven by a host of internal and external compliance mandates.
Kristin Gallina Aug 17 2004 3:51PM Security

Log In

  |  Forgot your password?