Features

Chip-maker takes message control

Chip-maker takes message control

California-based company Kingston Technology recognized the security problems caused by the increased use of IM by its employees, so it took positive action to allow them to utilise the tool securely. John Sterlicchi reports
John Sterlicchi Sep 1 2004 5:01PM Security
Time for a tighter hold on IM usage

Time for a tighter hold on IM usage

While users are basking in the delights of the latest powerful communication tool, employers are likely to pay the price unless they implement strong policies that will help avoid any major threats, as Ron Condon reports
Ron Condon Sep 1 2004 4:52PM Security
Really useful… very dangerous

Really useful… very dangerous

If it is implemented properly, IM can be a useful tool, but if it is allowed to grow unchecked, enterprises will suffer the consequences. Phil Worms shows how to weigh the advantages with the risks, and why you should do it now
Phil Worms Sep 1 2004 4:30PM Security
Leading lady takes the SP2 spotlight

Leading lady takes the SP2 spotlight

Microsoft’s Rebecca Norlander is a very busy woman. In between training for triathlons, she is in charge of Service Pack 2 and hopes to change company thinking. Dan Ilett reports
Dan Ilett Sep 1 2004 3:15PM Security
IPSec or SSL? Another option

IPSec or SSL? Another option

Since their advent, IPSec Virtual Private Networks (VPNs) have revolutionized the way remote workers and business partners connect to a business by establishing a secure tunnel between a remote worker or business partner and the organization they are connecting to.
Barry Phillips Sep 1 2004 10:16AM Security
Review: Juniper NetScreen IDP 500

Review: Juniper NetScreen IDP 500

Every now and then you find a product that has major warts but which really, under the warts, is a pretty good product. Then you wish the vendor would get its act together, because you would really like to buy and use the product.

Peter Stephenson,CeRNS, Sep 1 2004 12:00AM Security
Review: Service Pack 2 for Windows XP

Review: Service Pack 2 for Windows XP

The release of Service Pack 2 (SP2) for Windows XP marks a significant step forwards for Microsoft Windows. Specific features such as its support for NX processor instructions and the enormous list of OS fixes were not tested, but are reasons to upgrade in themselves.

Jon Tullett Sep 1 2004 12:00AM Security
Review: UpdateEXPERT

Review: UpdateEXPERT

It might be a banal subject for some network managers, but security update management is essential. With hundreds of workstations, scores of servers and almost as many operating systems making up the average corporate environment, making sure they all receive the required patches can be a headache-inducing task.

Alan Bridges Sep 1 2004 12:00AM Security
Balancing security products with management time. Are you stretching yourself too thin?

Balancing security products with management time. Are you stretching yourself too thin?

With new threats emerging by the second, enterprise security has become paramount. IT managers, however, are faced with the daunting task of coordinating numerous elements from VPNs and e-mail scanning systems to content filters and anti-virus software.
John Edwards Aug 31 2004 5:21PM Security
Web anti-virus – deplorable or deployable?

Web anti-virus – deplorable or deployable?

The internet plays a prevailing role in today’s workplace, and its use continues to grow - from personal web-based email, to the growing popularity of public instant messaging (IM). Despite the benefits the web provides for employees, including convenience and accessibility, its use has opened a back door for viruses to bypass existing email anti-virus security measures and infect the network.
Nigel Hawthorn Aug 31 2004 5:19PM Security
Review: LockBox

Review: LockBox

USB hard drives are getting more popular these days but there aren't many on the market that offer the kind of security that is needed keep confidential data out of the wrong hands.

Micro-Solutions have a nifty device that combines a hard drive with a fingerprint sensor. The idea is a user can only access their own files if they have provided the right authentication. In this instance the right fingerprint.

René Millman Aug 31 2004 12:00AM Security
Modular user management and provisioning

Modular user management and provisioning

Identity management solutions are comprised of several critical components: directory services, access management services, authentication services, and user management and provisioning services.
Jeff Schultz Aug 25 2004 10:28AM Security
Defending your IT infrastructure through effective patch management

Defending your IT infrastructure through effective patch management

Imagine that you are the IT Director of a large retail bank with an active and highly visible Internet banking service. Driving into the office, half-listening to the radio news, you hear your bank’s name being announced. Immediately followed by the words "hacker," "massive system failure" and "identity theft."
David D'Agostino Aug 25 2004 10:27AM Security
Planning for less than a disaster

Planning for less than a disaster

Creating a systems and site availability plan to protect critical business processes and systems.
Marc Malizia Aug 25 2004 10:27AM Security
Review: Recovery Manager

Review: Recovery Manager

Creating a restore point for machines running Windows has be a feature since Windows ME. It has been developed with the advent of Windows 2000 and XP. Basically it creates a "snapshot" of the system and then uses that image to roll back to in case anything should go wrong. Fine in theory, but something rarely used in practice.

That aside, having a restore point is something of some worth and this product takes the concept a lot further. Recovery Manager is a networked version of the same thing but with a few more bells and whistles attached.

René Millman Aug 20 2004 12:00AM Security
Barbarians inside the gate

Barbarians inside the gate

More than ever before, businesses are struggling to address the information protection requirements driven by a host of internal and external compliance mandates.
Kristin Gallina Aug 17 2004 3:51PM Security
Email is a victim of its own success

Email is a victim of its own success

What began as a communication tool for the academic community is now rated as the most critical form of business communication.
Steve Ronksley Aug 17 2004 3:36PM Security
Betting against VOIP security

Betting against VOIP security

After more false dawns than a TV soap opera, IP Telephony (IPT) is finally happening in the mass market.
Denny Meijer Aug 17 2004 3:03PM Security
Review: Cyber Adversary Characterization

Review: Cyber Adversary Characterization

A book about the inner workings of the hacker's mind would not be complete without mentioning the world's most famous hacker, Kevin Mitnick. This book does not disappoint in that respect. This book deals with getting inside the mind of a hacker. It a kind of "know your enemy"-type book.

René Millman Aug 11 2004 12:00AM Security
Identity Management – an industry need

Identity Management – an industry need

There is a lot of talk recently about Identity Management (IM) solutions not only within enterprises that have teams to assess the variety of technology solutions available, but also by industry analysts whose job it is to size up the IM market space, including vendors. Increasingly, IM is also becoming a key focus of discussion at industry and analyst conferences on IT security.
Rosa Caputo Aug 10 2004 4:58PM Security

Log In

  |  Forgot your password?