Features

The path of privacy

The path of privacy

How US schools maintain the privacy of 55 million students.
Angela Moscsaritolo Oct 7 2011 9:54AM Security
Defense against cross-border cyber attacks

Defense against cross-border cyber attacks

Information sharing and cross-border investigations are essential, writes Elad Sharf.
Elad Sharf, Websense senior security researcher Oct 5 2011 3:07PM Security
Review: Trustwave DLP

Review: Trustwave DLP

Comes preconfigured and ready to drop into the network.
Peter Stephenson Oct 4 2011 1:00PM Security
Review: Dell's XPS 15z laptop

Review: Dell's XPS 15z laptop

A surprisingly strong all-rounder with plenty of power, style and battery life.
David Bayon Sep 23 2011 1:22PM Hardware
Get a job: Forensics

Get a job: Forensics

The industry's best reveal how to become a digital forensics professional.
Darren Pauli Sep 20 2011 4:40PM Security
Major breach: Ground control

Major breach: Ground control

Lockheed Martin CISO explains how a quick reaction staved off the March hack.
Dan Kaplan Sep 8 2011 3:21PM Security
DigiNotar hack puts cyberwar on the map

DigiNotar hack puts cyberwar on the map

Hard lessons to be learnt.
Roel Schouwenberg, researcher, Kaspersky Labs Sep 7 2011 4:35PM Security
Chasing hackers and hacktivists

Chasing hackers and hacktivists

Cybercrime investigators face new technologies and strategies, reports Deb Radcliff.
Deb Radcliff Sep 5 2011 10:07AM Security
Stop the finger-pointing

Stop the finger-pointing

Time to get on with the job.
Bill Conner, CEO, Entrust Sep 1 2011 1:47PM Security
AG says privacy safe under cyber crime laws

AG says privacy safe under cyber crime laws

Never mind the critics, privacy is safe in the hands of the cyber crime convention, writes Attorney-General Robert McClelland.
Robert McClelland, Federal Attorney General Aug 30 2011 2:31PM Security
Review: Astaro Security Gateway

Review: Astaro Security Gateway

Solid functionality with easy-to-manage policy controls, but it needs an easier way to change the default IP address.
Peter Stephenson Aug 29 2011 2:16PM Security
Review: Apple Mac Mini

Review: Apple Mac Mini

Faster, cheaper and more tempting than before.
Darien Graham-Smith Aug 25 2011 4:01PM Hardware
Get mobile on device infosec policy

Get mobile on device infosec policy

Trial your mobile policies with users to guage acceptance.
Paul Cooper, IBM A/NZ security solutions Aug 25 2011 10:37AM Security
How scary is RankMyHack.com?

How scary is RankMyHack.com?

A visit to RankMyHack.com proves interesting, disappointing and terrifying all at once.
Tom Brewster Aug 24 2011 2:29PM Security
Killing Conficker, 1000 days on

Killing Conficker, 1000 days on

If Windows users are unwilling to manage security, then enforcing more secure choices may be the only solution.
Aryeh Goretsky, researcher, ESET Aug 22 2011 10:05AM Security
Review: HTC Sensation dual-core smartphone

Review: HTC Sensation dual-core smartphone

Highly anticipated but not quite a world beater.
Nic Healey Aug 19 2011 6:33AM Hardware
Review: PGP Universal Gateway Email

Review: PGP Universal Gateway Email

Typical PGP/Symantec reliability and support, but it needs to be a bit easier to use and deploy. It also can be pricey.
Peter Stephenson Aug 18 2011 3:06PM Security
Review: Asus Eee Pad Transformer TF101

Review: Asus Eee Pad Transformer TF101

Part tablet, part netbook.
David Bayon Aug 17 2011 3:25PM Hardware
Review: Samsung Series 9

Review: Samsung Series 9

Can it take on the MacBook Air?
Sasha Muller Aug 15 2011 3:23PM Hardware
Review: Cryptzone Secured email

Review: Cryptzone Secured email

A solid, easy-to-deploy product but it lacks strong support.
Peter Stephenson Aug 11 2011 1:14PM Security

Log In

  |  Forgot your password?