Features

Third party or third rate?

Third party or third rate?

Gunter Ollmann shows why each organization should assess the security of its third-party hosting providers
Gunter Ollmann May 20 2004 3:47PM Security
Review: Juzt-Guard

Review: Juzt-Guard

There is a saying that Alaska is what America used to be and in a way this product from Anchorage-based software firm Juzt-Reboot Technology is a bit like what software used to be. Opening up the package reveals a parallel port dongle and installation had an old-fashioned look to it.

René Millman May 20 2004 12:00AM Security
Review: Juzt-Guard

Review: Juzt-Guard

There is a saying that Alaska is what America used to be and in a way this product from Anchorage-based software firm Juzt-Reboot Technology is a bit like what software used to be. Opening up the package reveals a parallel port dongle and installation had an old-fashioned look to it.

René Millman May 20 2004 12:00AM Security
Our archaic law leaves an open door for cybercrime

Our archaic law leaves an open door for cybercrime

Think what the world of IT was like in 1990. A few lucky researchers, military personnel, government workers and assorted hangers-on would have been able to enjoy the novelty of fledgling email and internet services. If you were a forward-thinking large corporate, you might well have a mainframe or a minicomputer network storing and processing crucial data and, although dial-up modems could connect systems to each other and enable remote terminal access, viruses and hack-attacks were minor worries. The occasional infected floppy disc might contain some malware that could potentially compromise the contents of your expensive 40mb hard drive, but a relatively up-to-date antivirus programme would probably protect you. Hackers and virus writers were mostly a minority sub-culture of cyber-kids operating from their bedrooms bragging and swapping war stories on underground bulletin boards.
Staff Writers May 19 2004 3:49PM Security
Viable solutions in the fight against phishing

Viable solutions in the fight against phishing

David Brunswick, technical director for Tumbleweed Communications Europe and a member of the Anti-Phishing Working Group, discusses potential solutions in the fight against phishing
David Brunswick May 19 2004 3:46PM Security
Caller-ID – sharp enough to cut out spam?

Caller-ID – sharp enough to cut out spam?

With both the US CAN-Spam Act and the EU Directive on spam proving to be failures in stemming the flow of unsolicited emails, attention has turned once again to technology and standards in the battle against spam.
Jamie Cowper May 19 2004 3:45PM Security
The hidden dangers of spam

The hidden dangers of spam

Spam has gone from virtually nothing four years ago to a major problem today. It is now estimated that spam accounts for about 60 per cent of all email carried over the internet, up from 45 per cent this time last year.
Peter Wenham May 19 2004 3:43PM Security
Review: SecureZip

Review: SecureZip

Just about everyone that uses a computer uses compressed zip files in day-to-day use. However, zipped files are not known for their security,
other than sometimes requiring a password for access files stored within a zip file.

René Millman May 19 2004 12:00AM Security
Review: SecureZip

Review: SecureZip

Just about everyone that uses a computer uses compressed zip files in day-to-day use. However, zipped files are not known for their security,
other than sometimes requiring a password for access files stored within a zip file.

René Millman May 19 2004 12:00AM Security
Can MSSPs help you stay legal?

Can MSSPs help you stay legal?

As organizations adapt to compliance requirements, John Sterlicchi explores the value of having a managed security service provider
John May 13 2004 9:21AM Security
Take the leap to a wireless future

Take the leap to a wireless future

Jon Tullett explains how wireless security standards are being left behind, but why the effort required to understand and use them properly will cut costs, improve productivity and help your organization soar
Jon Tullett May 13 2004 9:21AM Security
Compliance made easy

Compliance made easy

James R. Wade believes a formalized approach to infosecurity can support corporate governance initiatives
James R. May 6 2004 9:28AM Security
Only cooperation will make us less vulnerable

Only cooperation will make us less vulnerable

There’s been a lot of news on the patching front lately – and not all of it’s bad. Yes, Microsoft has released another list of critical vulnerabilities that leading security gurus say companies would do well to patch against immediately. And sure, some security experts and consumers are miffed at Internet Security Systems for reportedly being selfish with their patches
Illena Armstrong May 6 2004 9:23AM Security
Industry changes show at Infosec and Awards

Industry changes show at Infosec and Awards

April held this year’s Infosecurity Europe show with the usual array of security firms touting their wares and hosting discussions. Most exhibitors displayed new products and many were looking markedly happier than last year, when IT spending was in the doldrums and security spending was struggling to hold its head above water. Also interesting was the conference track (despite some spectacularly badly-designed rooms)
Jon Tullett May 6 2004 9:18AM Security
Review: SpySubtract Pro

Review: SpySubtract Pro

Spyware  is a royal pain but the average user is, most of the time, not aware of the snooping activities of these little programs on their computers. 

René Millman Apr 19 2004 12:00AM Security
When the root is the problem

When the root is the problem

As Linux grows in popularity with both users and hackers, Richard Williams contemplates precisely how risky all or nothing security is
Richard Williams Apr 15 2004 11:11AM Security
The yoga of the software world

The yoga of the software world

Open source software solutions can be inexpensive and flexible, but also a time-consuming and even painful way to achieve desired results – like practicing yoga. Julie Jervis learns if open source is fit enough to endure
Julie Jervis Apr 15 2004 11:04AM Security
Smile for those cameras

Smile for those cameras

Organizations can use IP networks to coordinate the actions of CCTV and IT systems, says Roger Hardiman
Roger Hardiman Apr 15 2004 10:59AM Security
Real connectivity relies on establishing trust

Real connectivity relies on establishing trust

Marcia Savage explains how Raymond James Financial is boosting end-point security for remote agents
Marcia Savage Apr 15 2004 10:25AM Security
Patching policies must be part of everyday practice

Patching policies must be part of everyday practice

Sarah Merrion finds that patch management requires a global, organized effort that is hardly child’s play
Sarah Merrion Apr 15 2004 10:12AM Security

Log In

  |  Forgot your password?