Features

An eye on security for 2009

An eye on security for 2009

There were several fundamental challenges in the security field last year, and this year will be no different, according to Websense's Phil Vasic.
Phil Vasic Feb 27 2009 12:14PM Security
Virtual security is no less real

Virtual security is no less real

There are dramatic cost benefits to virtualisation, but they’re easily negated by poor security practices that result in breaches and downtime, as NetIQ's Rick Logan explains.
Rick Logan Feb 23 2009 4:58PM Security
Database security: protecting the crown jewels

Database security: protecting the crown jewels

As companies like Deutsche Telekom have learned, attackers are going after databases, reports Deb Radcliff.
Deb Radcliff Feb 12 2009 4:45PM Security
Lost smartphones pose significant corporate risk

Lost smartphones pose significant corporate risk

Mislaid laptops have been much in the news, but the lost smartphone poses a significant and growing corporate risk, says Jessica Twentyman.
Jessica Twentyman Feb 12 2009 4:34PM Security
Review: RSA SecurID 3.0

Review: RSA SecurID 3.0

If you have the staff and the time, this is a very nice solution.
Michael Lipinski Feb 12 2009 3:52PM Security
Why cybercriminals love a good Valentine’s Day

Why cybercriminals love a good Valentine’s Day

For cybercriminals, Valentine's Day is just another opportunity to draw in unsuspecting internet users, as Phil Vasic, A/NZ country manager for Websense, explains.
Phil Vasic Feb 10 2009 2:55PM Security
Review: Kaspersky Labs Total Space Security v6.0

Review: Kaspersky Labs Total Space Security v6.0

Other products may boast more malware components, but this one is good at what it does.
Michael Lipinski Feb 5 2009 3:05PM Security
Review: F-Secure Client Security 8

Review: F-Secure Client Security 8

This tool offers a large amount of protection, ease of use and management, all for a fair price.
Michael Lipinski Feb 5 2009 1:24PM Security
Social networking websites make recruiting spies difficult

Social networking websites make recruiting spies difficult

A social networking world makes it harder for the UK intelligence services to recruit a spy without a profile, as Ken Munro explains.
Ken Munro Feb 4 2009 2:53PM Security
Review: Linksys N Ultra Rangeplus Simultaneous Dual-N Band Wireless Router WRT610N

Review: Linksys N Ultra Rangeplus Simultaneous Dual-N Band Wireless Router WRT610N

Although it’s not a screamer at short range, the good long-range performance (at 5GHz at least) makes the Linksys WRT610N an attractive choice
Stephen Withers Feb 3 2009 11:20PM Networking
Review: Dell Precision Workstation M6400

Review: Dell Precision Workstation M6400

If you don’t care about weight, this is what a laptop should be
Zara Baxter Feb 2 2009 11:26PM Hardware
Waiting out the storm

Waiting out the storm

Peter Croft, managing director of Clearswift Asia-Pacific, says businesses should look at getting the most out of their existing IT security, as the global financial crisis forces inevitable cutbacks.
Peter Croft Jan 29 2009 11:39AM Security
Cyberwarfare: How secure are your communications?

Cyberwarfare: How secure are your communications?

Mike Simms, vice president of EADS Defence & Security Systems, looks at how carefully we handle information and data in the digital age.
Mike Simms Jan 28 2009 4:08PM Security
Enterprise key management deciphered

Enterprise key management deciphered

As encryption becomes more widely adopted, organisations are also experiencing an increasing concern about the management of a growing set of encryption keys. Effective management of these keys is essential to ensure both the availability and security of encrypted information.
Steve Pate Jan 23 2009 1:34PM Security
Review: ESET Smart Security v3.0

Review: ESET Smart Security v3.0

It provides a good range of malware protection at the endpoint, and the administration console did a nice job reporting, alerting, distributing and managing the endpoint software.
Michael Lipinski Jan 21 2009 2:54PM Security
Malware epidemic demands a united front

Malware epidemic demands a united front

Cybercriminals have readily exploited the Web2.0 revolution, meaning that a new approach is needed to fight them, says Blue Coat Australia's Wayne Neich.
Wayne Neich Jan 20 2009 11:44AM Security
In the vault

In the vault

When it comes to protecting financial info, IT security professionals can never rest on their laurels, reports Jean Thilmany.
Jean Thilmany Jan 16 2009 2:32PM Security
Review: BitDefender Corporate Security

Review: BitDefender Corporate Security

BitDefender Corporate Security is a security and management solution which delivered proactive protection from viruses, spyware, rootkits, spam, phishing and other forms of malware.
Michael Lipinski Jan 16 2009 2:11PM Security
How new access control technologies can address insider threats

How new access control technologies can address insider threats

Open networks and fast-moving data allow errors and malfeasance by network insiders to create significant financial, public-relations and regulatory risks, says Juniper's Rich Campagna.
Rich Campagna Jan 13 2009 5:09PM Security
Review: AVG Technologies Internet Security Network

Review: AVG Technologies Internet Security Network

This product integrated most of the malware solutions while providing an efficient, streamlined user-friendly offering.
Michael Lipinski Jan 13 2009 4:56PM Security

Log In

  |  Forgot your password?