Features

Avoiding the security pitfalls of cloud computing

Avoiding the security pitfalls of cloud computing

Cloud computing has all the hallmarks of becoming a prevalent and valuable innovation that IT professionals should use to their advantage.
Steve Moyle Oct 9 2008 3:27PM Security
Case study: The Leading Edge calls Proofpoint to disable Botnet attack

Case study: The Leading Edge calls Proofpoint to disable Botnet attack

Consultancy firm, The Leading Edge called Proofpoint to restore its email when a Botnet attack took the company’s internet link down.
Jenny Eagle Oct 9 2008 3:13PM Security
Interview: Brian NeSmith, CEO of Blue Coat Systems

Interview: Brian NeSmith, CEO of Blue Coat Systems

The Blue Coat Systems CEO gazed into the dotcom abyss and survived. He thinks he has the measure of the downturn. Paul Fisher reports
Paul Fisher Oct 9 2008 10:49AM Security
Review: GuardianEdge Device Control

Review: GuardianEdge Device Control

GuardianEdge Device Control is a component of the more robust GuardianEdge Data Protection Platform.
Justin Peltier Oct 8 2008 3:39PM Security
Q & A: DLP for the rest of us

Q & A: DLP for the rest of us

Richard Turner, CEO of Clearswift speaks about the security industry’s most hyped concepts: Data Loss Prevention (DLP).
Staff Writers Oct 8 2008 2:41PM Security
Review: ASUS M51Va, killer value Centrino 2 notebook

Review: ASUS M51Va, killer value Centrino 2 notebook

Despite some odd feature choices, this is an affordable powerhouse of a laptop. A great value mid-range Centrino 2 laptop, as long as you're not worried about battery life.
Zara Baxter Oct 8 2008 2:37PM Hardware
Review: Lumension SAC and SDC

Review: Lumension SAC and SDC

Lumension offers a pair of products, Sanctuary Application Control and Sanctuary Device Control, that work in tandem to provide protection of devices.
Justin Peltier Oct 7 2008 3:02PM Security
Safe browsing with Google Chrome?

Safe browsing with Google Chrome?

Security experts give mixed reviews about Google’s inaugural web browser, Chrome.
Negar Salek Oct 3 2008 7:00AM Security
Review: Novell ZENworks ESM

Review: Novell ZENworks ESM

First, it is important to note that unlike previous versions of ZENworks, Novell ZENworks Endpoint Security Management (ESM) does not require anything else from Novell to operate.

Justin Peltier Oct 3 2008 7:00AM Security
Review: Linksys WRT610N, dual-n band networking is here

Review: Linksys WRT610N, dual-n band networking is here

The arrival of dual-n band networking with 5GHz promises an end to crowded home wireless networks. Speed, range and technology is great, but the price is steep
Zara Baxter Oct 1 2008 5:06PM Networking
Review: SkyRecon StormShield

Review: SkyRecon StormShield

StormShield Security Suite offers integrated system and data protection in a single product.
Justin Peltier Oct 1 2008 3:44PM Security
Review: Panda Security Security for Enterprise

Review: Panda Security Security for Enterprise

Panda Security for Enterprise is another suite of products designed to protect the endpoint.
Justin Peltier Sep 30 2008 2:28PM Security
Eugene Kaspersky on the cybercrime arms race

Eugene Kaspersky on the cybercrime arms race

While it is unlikely we will ever abolish cybercrime, I do believe that we can make the internet a safer place.
Eugene Kaspersky Sep 30 2008 11:25AM Security
Website developers can protect users from internet-borne threats

Website developers can protect users from internet-borne threats

Protecting users from internet-borne threats falls on trusted websites, says Overstock's Sam Peterson. Dan Kaplan reports.
Dan Kaplan Sep 26 2008 12:22PM Security
Review: Sophos Endpoint Security and Control

Review: Sophos Endpoint Security and Control

The Sophos Endpoint Security and Control is a subset of the Sophos Network Access Control Advanced.
Justin Peltier Sep 26 2008 11:35AM Security
Review: Trend Micro OfficeScan Client/Server Edition

Review: Trend Micro OfficeScan Client/Server Edition

OfficeScan Client/Server Edition is a well-rounded network security product for the network endpoints. It has several security features.
Justin Peltier Sep 25 2008 3:47PM Security
Palin email "hack" underscores need for stronger authentication

Palin email "hack" underscores need for stronger authentication

User names and passwords aren't secure, and momentum continues to build across the industry to solve this problem in a manageable way.
Steven K, CEO, Wave Systems Sep 25 2008 10:30AM Security
Review: AppGate Security Server (AGSS) and Device Firewall (DFW)

Review: AppGate Security Server (AGSS) and Device Firewall (DFW)

AppGate Security Server (AGSS) and Device Firewall (DFW) is an offering of multiple utilities tied into one package.
Justin Peltier Sep 24 2008 4:20PM Security
Review: Bioscrypt V-Station

Review: Bioscrypt V-Station

The V-Station is much like the V-Pass (left), but on steroids.
Peter Stephenson, Sep 22 2008 4:56PM Security
What you need to know to keep Mac OS X secure

What you need to know to keep Mac OS X secure

Just a few years ago, Apple commanded only a small fraction of the computer market.
Amol Sarwate, Sep 22 2008 4:12PM Security

Log In

  |  Forgot your password?