Features

Gary McKinnon: Butterfly on a wheel

Gary McKinnon: Butterfly on a wheel

A decade on, the saga continues.
Derek Parkinson Feb 27 2012 11:50AM Security
Review: HTC Velocity on Telstra 4G

Review: HTC Velocity on Telstra 4G

Australia's first 4G-ready smartphone on Australia's first 4G network.
Nic Healey Feb 22 2012 6:10AM Telco/ISP
CheckPoint 2012 predictions

CheckPoint 2012 predictions

External threats top the list.
Scott McKinnel Feb 7 2012 11:26AM Security
Social security risks

Social security risks

Bigger and bolder action needed to fight fraud over social networks.
Jim Romeo Feb 6 2012 4:09PM Security
Data breach priorities in the US

Data breach priorities in the US

If the breach is bad enough, US organisations must report it to authorities.
Ozzie Fonseca Jan 20 2012 7:54AM Security
Review: Samsung Galaxy Nexus

Review: Samsung Galaxy Nexus

It's the world's fastest smartphone, but is speed enough?
Jonathan Bray Jan 13 2012 6:00AM Hardware
Review: Acer S3 ultrabook

Review: Acer S3 ultrabook

Ultra-thin and light computing for a reasonable price.
John Gillooly Jan 11 2012 11:00AM Hardware
Review: ActivIdentity 4TRESS Authentication Appliance FT2011

Review: ActivIdentity 4TRESS Authentication Appliance FT2011

Multitenant, fraud detection support but it is pricey and a bit hard to use.
Peter Stephenson Jan 10 2012 4:51PM Security
Review: Deepnet Security DualShield v5.2

Review: Deepnet Security DualShield v5.2

Biometric token support that is easy to deploy and use, but support is a bit pricey.
Peter Stephenson Jan 10 2012 4:34PM Security
Defensive approaches for APTs

Defensive approaches for APTs

Study logs, whitelist, use multi-factor authentication and educate users.
Stephen Lawton Jan 10 2012 4:29PM Security
The new wave of teaching infosec

The new wave of teaching infosec

Cyber security can be a sport.
Dan Kaplan Jan 10 2012 3:54PM Security
Review: Cryptocard Blackshield Server v3.1

Review: Cryptocard Blackshield Server v3.1

Set up and deployed easily and alerting was well done.
Peter Stephenson Jan 10 2012 12:30AM Security
The importance of incident response downtime

The importance of incident response downtime

Responders need time to think, read and document.
Kevin Liston Dec 21 2011 7:23AM Security
Yahoo! CISO's xmas wish list

Yahoo! CISO's xmas wish list

Fix your people problems.
Justin Somaini Dec 2 2011 1:46PM Security
Strategies for cyber security

Strategies for cyber security

Trust and transparency remains critical to incentives.
Nigel Phair Dec 1 2011 4:11PM Security
A new theory of digital identity

A new theory of digital identity

Stephen Wilson puts digital identity under the microscope.
Stephen Wilson Nov 30 2011 2:09PM Security
Add DNS management to your xmas wishlist

Add DNS management to your xmas wishlist

Proper DNS management is critical during the busy holiday months.
Sean Leach, VP, VeriSign Network Intelligence Nov 23 2011 7:58AM Security
Review: Asus Eee Pad Slider

Review: Asus Eee Pad Slider

An Android device that's neither tablet nor netbook.
Esat Dedezade Nov 8 2011 6:39AM Hardware
New SOCs

New SOCs

Organisations have built situation rooms to protect data and respond to threats.
Angela Moscsaritolo Nov 8 2011 2:51AM Security
Cloud privacy doesn’t have to be fluffy

Cloud privacy doesn’t have to be fluffy

Issues of trust.
Rick Harvey, CTO, LockBox Nov 7 2011 3:52PM Security

Log In

  |  Forgot your password?