Features

The hidden dangers of spam

The hidden dangers of spam

Spam has gone from virtually nothing four years ago to a major problem today. It is now estimated that spam accounts for about 60 per cent of all email carried over the internet, up from 45 per cent this time last year.
Peter Wenham May 19 2004 3:43PM Security
Review: SecureZip

Review: SecureZip

Just about everyone that uses a computer uses compressed zip files in day-to-day use. However, zipped files are not known for their security,
other than sometimes requiring a password for access files stored within a zip file.

René Millman May 19 2004 12:00AM Security
Review: SecureZip

Review: SecureZip

Just about everyone that uses a computer uses compressed zip files in day-to-day use. However, zipped files are not known for their security,
other than sometimes requiring a password for access files stored within a zip file.

René Millman May 19 2004 12:00AM Security
Can MSSPs help you stay legal?

Can MSSPs help you stay legal?

As organizations adapt to compliance requirements, John Sterlicchi explores the value of having a managed security service provider
John May 13 2004 9:21AM Security
Take the leap to a wireless future

Take the leap to a wireless future

Jon Tullett explains how wireless security standards are being left behind, but why the effort required to understand and use them properly will cut costs, improve productivity and help your organization soar
Jon Tullett May 13 2004 9:21AM Security
Compliance made easy

Compliance made easy

James R. Wade believes a formalized approach to infosecurity can support corporate governance initiatives
James R. May 6 2004 9:28AM Security
Only cooperation will make us less vulnerable

Only cooperation will make us less vulnerable

There’s been a lot of news on the patching front lately – and not all of it’s bad. Yes, Microsoft has released another list of critical vulnerabilities that leading security gurus say companies would do well to patch against immediately. And sure, some security experts and consumers are miffed at Internet Security Systems for reportedly being selfish with their patches
Illena Armstrong May 6 2004 9:23AM Security
Industry changes show at Infosec and Awards

Industry changes show at Infosec and Awards

April held this year’s Infosecurity Europe show with the usual array of security firms touting their wares and hosting discussions. Most exhibitors displayed new products and many were looking markedly happier than last year, when IT spending was in the doldrums and security spending was struggling to hold its head above water. Also interesting was the conference track (despite some spectacularly badly-designed rooms)
Jon Tullett May 6 2004 9:18AM Security
Review: SpySubtract Pro

Review: SpySubtract Pro

Spyware  is a royal pain but the average user is, most of the time, not aware of the snooping activities of these little programs on their computers. 

René Millman Apr 19 2004 12:00AM Security
When the root is the problem

When the root is the problem

As Linux grows in popularity with both users and hackers, Richard Williams contemplates precisely how risky all or nothing security is
Richard Williams Apr 15 2004 11:11AM Security
The yoga of the software world

The yoga of the software world

Open source software solutions can be inexpensive and flexible, but also a time-consuming and even painful way to achieve desired results – like practicing yoga. Julie Jervis learns if open source is fit enough to endure
Julie Jervis Apr 15 2004 11:04AM Security
Smile for those cameras

Smile for those cameras

Organizations can use IP networks to coordinate the actions of CCTV and IT systems, says Roger Hardiman
Roger Hardiman Apr 15 2004 10:59AM Security
Real connectivity relies on establishing trust

Real connectivity relies on establishing trust

Marcia Savage explains how Raymond James Financial is boosting end-point security for remote agents
Marcia Savage Apr 15 2004 10:25AM Security
Patching policies must be part of everyday practice

Patching policies must be part of everyday practice

Sarah Merrion finds that patch management requires a global, organized effort that is hardly child’s play
Sarah Merrion Apr 15 2004 10:12AM Security
More big players jostle for position in SCM field

More big players jostle for position in SCM field

The leaders in secure content management (SCM) software are Symantec, Network Associates and Trend Micro. According to IDC’s Market Analysis: Worldwide Secure Content Management Forecast Update and Competitive Vendor Shares, 2002-2007, they have a market share of $1.7 billion (the worldwide revenue for SCM software hit $2.7 billion by 2002).
Illena Armstrong Apr 15 2004 10:04AM Security
Taking synergy to a higher level

Taking synergy to a higher level

Physical and IT security are unlikely bedfellows, but now Barbara Gengler discovers signs of a budding romance
Barbara Gengler Apr 13 2004 4:35PM Security
Why pink and fluffy are the new watchwords

Why pink and fluffy are the new watchwords

When the speaker at the front of the room announced that security was really about “pink, fluffy stuff,” I started looking for the exit. And I am sure I was not the only one.
Ron Condon Apr 13 2004 4:27PM Security
It’s crunch time for cybercrime

It’s crunch time for cybercrime

Fighting extortion, paedophilia and identity theft is all in a day’s work for the National Hi-Tech Crime Unit. Dan Ilett talks to its head, Len Hynds.
Dan Ilett Apr 13 2004 3:14PM Security
Worms expose security secrets

Worms expose security secrets

With the proliferation of worms being bred to attack your security, patch management is becoming increasingly time consuming. Ron Condon asks if there is an easier way
Ron Condon Apr 13 2004 3:14PM Security
Review: SSH Tectia Server and Client

Review: SSH Tectia Server and Client

Many products in this test focus on securing locally stored (or local network) data via encryption techniques.
Julian Ashbourn Apr 7 2004 12:00AM Security

Log In

  |  Forgot your password?