Features

Review: NetScreen IDP1000

Review: NetScreen IDP1000

NetScreen (now part of Juniper Networks) sent us the IDP 1000 to review.
Peter Stephenson,CeRNS, Jun 28 2004 12:00AM Security
Review: BlackSpider MailControl

Review: BlackSpider MailControl

MailControl is a managed service offered by BlackSpider and it was quick and easy to set up.
Jon Tullett Jun 28 2004 12:00AM Security
Review: Brightmail Anti-Spam

Review: Brightmail Anti-Spam

BrightMail Anti-Spam is installed via a Java GUI or text install.
Jon Tullett Jun 28 2004 12:00AM Security
Review: TippingPoint Unity One-200

Review: TippingPoint Unity One-200

Of all of the products we tested, TippingPoint Unity One-200 was the fastest and easiest to install.
Peter Stephenson,CeRNS, Jun 28 2004 12:00AM Security
Review: EMF Enterprise Edition

Review: EMF Enterprise Edition

EMF Enterprise is a managed service operated by resellers.
Peter Stephenson,CeRNS, Jun 28 2004 12:00AM Security
Review: intY MailDefender

Review: intY MailDefender

This is a UK-based managed service claiming a quarter of a million global users of its managed email and internet services.
Jon Tullett Jun 28 2004 12:00AM Security
Review: Ipswitch IMail

Review: Ipswitch IMail

IMail is a mail server suite offering all the standard mail protocols, web mail, messaging, mailing lists and filtering.
Jon Tullett Jun 28 2004 12:00AM Security
Review: modusGate3

Review: modusGate3

The installer was easy to use and this product needs Microsoft's .N
Jon Tullett Jun 28 2004 12:00AM Security
Review: SpamAssassin 2.63

Review: SpamAssassin 2.63

SpamAssassin is an open-source junk mail filtering product used by more than 20 commercial products.
Jon Tullett Jun 28 2004 12:00AM Security
A USB key to a secure VPN

A USB key to a secure VPN

Marcia Savage reports on how a Washoe County administrator chose to provide secure remote access for staff.
Marcia Savage Jun 25 2004 11:57AM Security
Battle of wills

Battle of wills

SC Magazine asked John Cheney, Matt Sergeant and Alyn Hockey for the methods and dastardly tricks that spammers use to evade spam defenses. Here are some tactics the good guys discovered during the fight
John Cheney, Jun 25 2004 11:53AM Security
Unsuspecting accomplices

Unsuspecting accomplices

VirtualMDA is an email enterprise that seems to offer a hassle-free way for users to earn a dollar, but there is a catch – your PC becomes a conduit for junk email. Mark Sunner reveals the darker side of a spammer’s tool
Mark Sunner Jun 25 2004 11:49AM Security
Finding the calm inside the storm

Finding the calm inside the storm

Some observers believe threats to corporate networks could be just a memory in the not-too-distant future, reports John Sterlicchi. The key is companies wanting to stay secure and making use of the appropriate tools
John Sterlicchi Jun 25 2004 11:41AM Security
Eradicating the spam epidemic

Eradicating the spam epidemic

Spam is a monumentally irritating and expensive problem for corporate and home users. Absolutely no one is immune. While there is slim hope for a silver bullet, Andy Coote explains what is being done to combat spam
Andy Coote Jun 23 2004 3:38PM Security
Health trust finds a way to block attacks quickly

Health trust finds a way to block attacks quickly

A year ago, Homefirst Community Trust was struggling to keep up with the flood of patches for new software vulnerabilities. IT manager Pat Black tells Ron Condon how he managed to get security under control
Ron Condon Jun 23 2004 3:14PM Security
Spam and patents are issues to resolve now

Spam and patents are issues to resolve now

This month we are tackling the issue of junk mail and spam. While unsolicited advertising is annoying, it has become the CSO’s problem as HR departments face off with users who receive offensive messages, business services grind to a halt, and outright scams grow in number.
Jon Tullett Jun 23 2004 3:08PM Security
On a mission to eliminate spam

On a mission to eliminate spam

MP Derek Wyatt is chairman of the All Party Internet Group. He is currently working on an overhaul of the Computer Misuse Act 1990 and is trying to stamp out spam. Brave ambitions, but how likely is it? We sent Dan Ilett to find out.
Dan Ilett Jun 23 2004 2:45PM Security
Training, certification or experience? A security dilemma.

Training, certification or experience? A security dilemma.

People who complain about certifications really get me wound up - especially when they hold no certifications of their own but do hold positions where they can wield power against people who have them. I suppose it could be argued that some people can buy their certifications, but on the whole a lot of hard work is required to pass exams and it is on this very topic that my tale begins.
Lannon Rowan Jun 22 2004 10:03AM Security
Why are people ignoring the danger posed by blended threats?

Why are people ignoring the danger posed by blended threats?

Cisco’s recent announcement that it will incorporate Trend Micro virus and worm technologies with its intrusion-detection system software used on its routers and switches, is excellent news for anyone concerned with IT security. With the rise of more sophisticated attacks – blended threats - a more proactive approach to security is not just necessary, but vital. This is an approach we've been taking for two years now, so it’s always pleasing to see Cisco validating our market by adopting it in such a way.
Bruce Hendrix Jun 21 2004 4:40PM Security
Ex-hacker: the unspoken, dirty little secret - part 1

Ex-hacker: the unspoken, dirty little secret - part 1

I rarely make a bet, but if you asked me if I'd bet my bottom dollar on a firm employing a hacker to assess their security risk, I'd only accept on the basis that they would not. Hiring a hacker to assess the security risk of an organisation is something that fewer than 64 per cent of ISO's are willing to consider. That's hardly surprising when the risks are analysed alongside the statistics; viruses and hackers cost businesses worldwide somewhere in the region of $1.5 trillion. That said, organisations that are unwilling to hire a hacker face one increasing problem; hiring a hacker is not always a conscious decision.
Jane Frankland Jun 21 2004 4:03PM Security

Log In

  |  Forgot your password?