Features

Review: Ceelox ID Server Edition

Review: Ceelox ID Server Edition

Ceelox ID offers the ability to eliminate the need for passwords across the enterprise through the use of fingerprint scanners attached to workstations.
Peter Stephenson, Sep 10 2008 2:57PM Security
Question time with reverse engineer, Mike Perry

Question time with reverse engineer, Mike Perry

The Web is a pretty nasty place, according to reverse engineer and privacy advocate Mike Perry -- and he should know.
Liz Tay Sep 10 2008 2:42PM Security
Age brings new romance with byte

Age brings new romance with byte

'Emily' uses the internet for up to four hours every day for emailing, finding information and for visiting online dating websites.
Melissa Marino Sep 9 2008 5:36PM Software
Good web application security requires multiple approaches

Good web application security requires multiple approaches

With new PCI DSS mandates going into effect, web application security will get even hotter.
Sumedth Thakar Sep 9 2008 3:33PM Security
Review: DigitalPersona Pro

Review: DigitalPersona Pro

DigitalPersona Pro was designed for bringing biometric fingerprint scanning into the large-scale enterprise.
Peter Stephenson, Sep 9 2008 3:29PM Security
Review: HTC P3470

Review: HTC P3470

If you’re not bothered about 3G and want a fully-featured WM6 device it makes a bargain choice, though you can save even more cash with Palm’s Centro.
Nick Ross Sep 8 2008 5:34PM Telco/ISP
Review: BigFix

Review: BigFix

The BigFix offerings are all driven from the Unified Management Platform or BigFix Enterprise Server (BES).
Justin Peltier Sep 8 2008 3:35PM Security
Review: Preview: Sony Ericsson Xperia X1

Review: Preview: Sony Ericsson Xperia X1

It seems like the Xperia X1 has been around for ages but has the Sony Ericsson Smartphone still got the wow factor?
Stuff.tv blank Sep 5 2008 11:47AM Hardware
Tactics: Show me the money

Tactics: Show me the money

Looking for the board to invest in your security project? Learn to speak their language before you pitch, suggest Jessica Twentyman
Jessica Twentyman Sep 5 2008 10:29AM Security
Fighting fire with fire

Fighting fire with fire

The Web is a pretty nasty place, according to reverse engineer and privacy advocate Mike Perry -- and he should know.
Liz Tay Sep 4 2008 12:52PM Security
Review: First Look: Nokia E71 faces off against iPhone 3G

Review: First Look: Nokia E71 faces off against iPhone 3G

One of the best combinations of design and function in a smartphone we've seen for some time.
William Maher Sep 3 2008 1:26AM Telco/ISP
Review: NetIQ Secure Configuration Manager 5.7

Review: NetIQ Secure Configuration Manager 5.7

NetIQ's Secure Configuration Manager (SCM) is a combination of client server and web-based components to help organisations manage configurations of workstations and servers.
Nathan Ouellette Sep 2 2008 4:12PM Security
Review: Secure Auditor 2.0

Review: Secure Auditor 2.0

Secure Bytes Secure Auditor is actually a suite comprised of several different pieces designed to audit vulnerabilities across a broad range of systems.
Peter Stephenson, Sep 1 2008 3:02PM Security
Review: First Look: Samsung i780 vs Blackberry Bold

Review: First Look: Samsung i780 vs Blackberry Bold

Not everyone is sold on Windows Mobile Professional, but if you're a fan, then Samsung's latest QWERTY phone is worth a look. We size up the Samsung i780 with Blackberry's Bold to see how they fair.
Mike Wilcox Sep 1 2008 12:12PM Telco/ISP
Cloud details are too fluffy

Cloud details are too fluffy

Cloud computing and security - what are the issues? Information at the moment is sketchy to say the least.
Tim Mather Sep 1 2008 11:50AM Security
Review: Tenable Network Security

Review: Tenable Network Security

For this review, I decided to combine these products into a single group of their own. Please keep in mind that these products can be purchased separately and can function on their own.
Peter Stephenson, Aug 28 2008 3:10PM Security
Web 2.0: Attack of the JavaScript malware

Web 2.0: Attack of the JavaScript malware

Imagine you are sitting in front of your computer and all of a sudden you hear weird sounds coming from your hard drive.
Itzik Kotler, security operation centre, Radware Aug 27 2008 11:39AM Security
Review: netVigilance SecureScout EagleBox SP 2.0

Review: netVigilance SecureScout EagleBox SP 2.0

The netVigilance SecureScout EagleBox SP 2.0 is a highly comprehensive vulnerability management product.
Peter Stephenson, Aug 27 2008 11:27AM Security
Review: StillSecure VAM 5.5

Review: StillSecure VAM 5.5

The StillSecure VAM appliance is serious vulnerability management in a single device.
Peter Stephenson, Aug 25 2008 3:23PM Security
Weaponisation trumps skill

Weaponisation trumps skill

The rate and complexity at which exploits are being "weaponised" is rapidly increasing.
Courtlend Little, service and solutions architect, Solutiona Aug 25 2008 3:08PM Security

Log In

  |  Forgot your password?