Features

Review: Typhon 3

Review: Typhon 3

Many consultancies offer services to conduct vulnerability tests against networks, but NGS is renowned for doing so.
Julian Ashbourn Jun 1 2004 12:00AM Security
Review: WebInspect

Review: WebInspect

T he depth in which websites and web services are assessed by WebInspect and its clarity of vulnerability descriptions and suggested fixes is impressive.
Julian Ashbourn Jun 1 2004 12:00AM Security
Review: DynaComm i:mail

Review: DynaComm i:mail

DynaComm i:mail is software made to monitor, filter and log email activity passing through the corporate SMTP server.
Staff Writers Jun 1 2004 12:00AM Security
Review: Gordano Messaging Server

Review: Gordano Messaging Server

The Gordano Messaging Server is not an anti-spam product but a suite that includes a mail-filtering component.
Staff Writers Jun 1 2004 12:00AM Security
Review: Barracuda Spam Firewall 600

Review: Barracuda Spam Firewall 600

Barracuda's Spam Firewall is a 1U appliance running Linux and offering SMTP services with a good selection of mail filters to keep the junk mail out.<
Staff Writers Jun 1 2004 12:00AM Security
Review: Cloudmark Authority

Review: Cloudmark Authority

Cloudmark Authority runs on Linux, hooking the Milter interface of Sendmail to parse each message prior to delivery.
Staff Writers Jun 1 2004 12:00AM Security
Review: iHateSpam for Exchange

Review: iHateSpam for Exchange

Once installed and running, iHateSpam for Exchange performed quite well, but the installation got off to a rocky start.<
Staff Writers Jun 1 2004 12:00AM Security
Review: IronMail

Review: IronMail

CipherTrust's IronMail appliance offers an impressive collection of features for mail security.
Staff Writers Jun 1 2004 12:00AM Security
Review: LC5

Review: LC5

This product being the latest version of L0phtcrack is euphemistically called a password auditing and recovery tool. It is known to others as a fantastic password hash cracker for Windows. And while the new name makes it sound more like a seminal Detroit rock band of the late 60's, the latest version hopes to kick out the competition with a array of new features.

René Millman May 28 2004 12:00AM Security
Review: LC5

Review: LC5

This product being the latest version of L0phtcrack is euphemistically called a password auditing and recovery tool. It is known to others as a fantastic password hash cracker for Windows. And while the new name makes it sound more like a seminal Detroit rock band of the late 60's, the latest version hopes to kick out the competition with a array of new features.

René Millman May 28 2004 12:00AM Security
User Administration with Active Directory

User Administration with Active Directory

Keeping an organization safe from potential security breaches and costly downtime involves knowing who has access to what parts of the infrastructure and how changes were made to group policies or to user account information. Many IT organizations have already made the long journey from legacy systems to Active Directory (AD) or are well on their way. Having spent time preparing for the pitfalls and pains of migrations, corporations have often forgotten why they set forth on the journey in the first place. The promise of Active Directory has always been to lower the costs of user administration, but sometimes it is unclear how best to achieve these ends. For many organizations, the two most overlooked areas are group policies and the secure delegation of tasks.
Indy Chakrabarti May 24 2004 5:48PM Security
The Issue of Compliance  - It’s Here and It’s Expanding!

The Issue of Compliance - It’s Here and It’s Expanding!

By now, most high-tech conferences have devoted at least one 30-minute session to the topic of Sarbanes-Oxley (aka “Sarbox”).
Melisa LaBancz-Bleasdale May 24 2004 5:43PM Security
Managing Information Security in Modern Commercial Environments, Part 2 – A Pro-Active Approach

Managing Information Security in Modern Commercial Environments, Part 2 – A Pro-Active Approach

In the first article of this series, we identified and provided examples of the types of issues that need to be resolved if organisations are to correctly manage risk in the area of information security. If we combine the impact of these trends and issues with the fact that most enterprises are being forced to cut costs in order to remain competitive the true magnitude of the problem becomes apparent. Simply put, information security managers have to secure more complex environments, faster and using less resources.
Steve Purser May 24 2004 5:37PM Security
This threat could kill e-commerce

This threat could kill e-commerce

Marcia Savage sees a storm rolling in as phishing statistics jump alarmingly and the e-commerce industry finds itself facing a collapse in public confidence
Marcia Savage May 20 2004 3:47PM Security
Third party or third rate?

Third party or third rate?

Gunter Ollmann shows why each organization should assess the security of its third-party hosting providers
Gunter Ollmann May 20 2004 3:47PM Security
Review: Juzt-Guard

Review: Juzt-Guard

There is a saying that Alaska is what America used to be and in a way this product from Anchorage-based software firm Juzt-Reboot Technology is a bit like what software used to be. Opening up the package reveals a parallel port dongle and installation had an old-fashioned look to it.

René Millman May 20 2004 12:00AM Security
Review: Juzt-Guard

Review: Juzt-Guard

There is a saying that Alaska is what America used to be and in a way this product from Anchorage-based software firm Juzt-Reboot Technology is a bit like what software used to be. Opening up the package reveals a parallel port dongle and installation had an old-fashioned look to it.

René Millman May 20 2004 12:00AM Security
Our archaic law leaves an open door for cybercrime

Our archaic law leaves an open door for cybercrime

Think what the world of IT was like in 1990. A few lucky researchers, military personnel, government workers and assorted hangers-on would have been able to enjoy the novelty of fledgling email and internet services. If you were a forward-thinking large corporate, you might well have a mainframe or a minicomputer network storing and processing crucial data and, although dial-up modems could connect systems to each other and enable remote terminal access, viruses and hack-attacks were minor worries. The occasional infected floppy disc might contain some malware that could potentially compromise the contents of your expensive 40mb hard drive, but a relatively up-to-date antivirus programme would probably protect you. Hackers and virus writers were mostly a minority sub-culture of cyber-kids operating from their bedrooms bragging and swapping war stories on underground bulletin boards.
Staff Writers May 19 2004 3:49PM Security
Viable solutions in the fight against phishing

Viable solutions in the fight against phishing

David Brunswick, technical director for Tumbleweed Communications Europe and a member of the Anti-Phishing Working Group, discusses potential solutions in the fight against phishing
David Brunswick May 19 2004 3:46PM Security
Caller-ID – sharp enough to cut out spam?

Caller-ID – sharp enough to cut out spam?

With both the US CAN-Spam Act and the EU Directive on spam proving to be failures in stemming the flow of unsolicited emails, attention has turned once again to technology and standards in the battle against spam.
Jamie Cowper May 19 2004 3:45PM Security

Log In

  |  Forgot your password?