Features

Review: eSoft ThreatWall 450

Review: eSoft ThreatWall 450

The eSoft ThreatWall is a full scale email content management appliance with several excellent features.
Peter Stephenson, Jun 19 2008 2:29PM Security
Review: MessageGate

Review: MessageGate

MessageGate focuses on three areas. The first area is employee usage and policy compliance.
Peter Stephenson, Jun 18 2008 3:14PM Security
Does cyber-terrorism exist?

Does cyber-terrorism exist?

Global security experts gathered in Malaysia last month to help ramp up the world’s defenses against cyber-terrorism.
Negar Salek Jun 18 2008 2:30PM Security
Inside the Insider

Inside the Insider

Neville Isdell said that the breach “…underscores the responsibility we each have to be vigilant in protecting our trade secrets. Information is the lifeblood of the company.”
Carlo Minassian, Founder & CEO, Earthwave Jun 17 2008 2:05PM Security
Review: IBM Proventia Network Mail Security System

Review: IBM Proventia Network Mail Security System

The IBM Proventia Network Mail Security System is just that, a full-on mail security system. This product features some high grade functionality for the large enterprise.
Peter Stephenson, Jun 17 2008 12:51PM Security
Your broken computer is China's garbage dump

Your broken computer is China's garbage dump

There’s no doubting that Australia loves technology. We’re often hailed as an early adopter of technology and if our voracious appetite for anything and everything new – Blu-Ray, iPhone, plasma televisions, computers – is anything to go by, the assessments are spot on. But what happens when today’s toys turn into tomorrow’s trash?
Mitchell Bingemann Jun 16 2008 4:43PM Hardware
The technologist's guide to the near future

The technologist's guide to the near future

Technological convergence has shaped many aspects of today’s world, from the creation of medical technologies to devastating events like 9/11, according to U.S. physicist and science fiction author Stanley Schmidt.
Liz Tay Jun 16 2008 3:53PM Strategy
Review: Secure Computing IronMail

Review: Secure Computing IronMail

The Secure Computing IronMail appliance is designed for the large enterprise and it is loaded with many great features.
Peter Stephenson, Jun 16 2008 10:36AM Security
Review: Clearswift MIMEsweeper Email Appliance

Review: Clearswift MIMEsweeper Email Appliance

The Clearswift MIMEsweeper Email Appliance has several nice features, including a solid content filter and email protection from spam, malware and undesirable content.
Peter Stephenson, Jun 13 2008 3:37PM Security
Review: Sophos ES1000

Review: Sophos ES1000

The Sophos ES1000 provides a full realm of email content management and security features.
Peter Stephenson, Jun 12 2008 4:03PM Security
Learn from these mistakes

Learn from these mistakes

We can't just blame clever hackers for security breaches, infosec professionals need to get their act together.
Ian Castle Jun 12 2008 3:53PM Security
Industry Focus: Dave DeWalt, McAfee

Industry Focus: Dave DeWalt, McAfee

The RSA conference in April marked one year almost to the day since Dave DeWalt left EMC and took over the reins as CEO of McAfee.
Paul Fisher Jun 11 2008 3:21PM Security
Review: Symantec Mail Security 8300 Series

Review: Symantec Mail Security 8300 Series

The Symantec Mail Security appliance houses several email content management features in one well-integrated device.
Peter Stephenson, Jun 11 2008 2:43PM Security
Review: Bradford Networks NAC Director v3.1.7

Review: Bradford Networks NAC Director v3.1.7

They are endpoint management and compliance, identity management and usage policy enforcement.
Peter Stephenson, Jun 6 2008 3:36PM Security
Powerful password thieves

Powerful password thieves

Video processors are a powerful weapon when it comes to password cracking, and they're easily available
Ken Munro Jun 6 2008 3:23PM Security
Opinion: Open Source advocates discuss Windows addition to OLPC

Opinion: Open Source advocates discuss Windows addition to OLPC

Many open source supporters see the addition of Windows XP to the One Laptop Per Child program as catering to the needs of parents and political leaders who are only accustomed to Windows, rather than the needs of the children the machines are meant for.
Ashley Clark Jun 6 2008 3:21PM Software
To code or not to code?

To code or not to code?

The rise of Open Source software adoption has brought with it increased awareness of non-proprietary programming technologies.
Liz Tay Jun 6 2008 12:00PM Software
Review: Mu Security Mu 4000

Review: Mu Security Mu 4000

There's vulnerability assessment and penetration testing, but what about vulnerability analysis? Before you tell me that I'm just playing with words, stop for a sec and consider: it's one thing to assess what vulnerabilities may be in a system.
Peter Stephenson, Jun 5 2008 3:13PM Security
So you want to be a CISO?

So you want to be a CISO?

So you want to be a CISO? Make sure you know what the top role involves - and what it doesn't, says Paul Simmonds.
Paul Simmonds Jun 5 2008 2:52PM Security
Review: Sunbelt Software Ninja Email Security

Review: Sunbelt Software Ninja Email Security

It takes an all-in-one security approach with features such as anti-spam, anti-phishing, anti-virus, attachment filtering, disclaimers and content filtering.
Peter Stephenson, Jun 4 2008 3:36PM Security

Log In

  |  Forgot your password?