Features

Review: Cenzic Hailstorm Enterprise ARC 5.5

Review: Cenzic Hailstorm Enterprise ARC 5.5

Cenzic Hailstorm Enterprise ARC (Application Risk Controller) 5.5 is a centrally managed web-application assessment product. It consists of a web-based dashboard and a separate, stand-alone desktop application component for customising projects, scan settings and policies.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 29 2008 9:55AM Security
Protecting the IPTV/VoD infrastructure

Protecting the IPTV/VoD infrastructure

To ensure the success of their new IPTV/VoD services, providers must build into their networks a comprehensive, network-centric security strategy right from the start.
Scott Heinlein, Juniper Networks, Inc. Apr 28 2008 12:17PM Security
Review: Ounce Labs 5.0

Review: Ounce Labs 5.0

Ounce Labs 5.0 is a static source code analysis solution based primarily on two separate components. The application approaches application vulnerability assessment by statically analysing source code and supports many different languages, including C/C++, Java/JSP,.NET (C#, VB.NET, ASP.NET) Classic ASP (VB and Javascript) and Visual Basic.
Nathan Ouellette Apr 28 2008 12:16PM Security
Protecting human values from Human-Computer Interaction

Protecting human values from Human-Computer Interaction

These days, it is nigh on impossible to stop the infiltration of technology into our lives. Business communications are conducted via phone or e-mail. Information is searched for and obtained online. Even our kitchens are getting smarter, with Internet-enabled fridges opening doors to food for both the body and mind.
Liz Tay Apr 24 2008 4:25PM Software
Rethinking virus protection

Rethinking virus protection

With the growth of malicious programs currently outpacing that of legitimate applications, and traditional countermeasures proving inadequate, consumers and security vendors may need to join forces to ward off threats.
Mark Bregman, CTO, Symantec Corp Apr 24 2008 2:50PM Security
Online identity theft: Who's after my Facebook password?

Online identity theft: Who's after my Facebook password?

The questions of "who" and "why" in identity theft remain largely ignored. That is, "Who is after online identities? And what for?"
Guillaume Lovet, Manager, Threat Response Team, Fortinet Apr 24 2008 2:46PM Security
Review: HP WebInspect 7.7

Review: HP WebInspect 7.7

Developed by SPI Dynamics, which is now part of HP Software, WebInspect 7.7 is a stand-alone web-application testing product. Although it is not an enterprise solution in itself, it can easily be integrated into HP's AMP architecture for centralised administration and reporting capabilities.
Nathan Ouellette Apr 24 2008 2:45PM Security
Review: 8e6 Technologies Professional Edition

Review: 8e6 Technologies Professional Edition

This package from 8e6 Technologies offers high flexibility for the large enterprise. The bundle consists of the R3000, the Enterprise Reporter and the Threat Analysis Reporter.
Peter Stephenson, Apr 24 2008 1:00PM Security
Opinion: The National Broadband Network's untenable tender

Opinion: The National Broadband Network's untenable tender

A collective sigh could be heard from the telco industry when the Government finally released a request for proposal (RFP) for its $4.7 billion national broadband network (NBN) on April 11. But far from being a sigh of relief, this was instead the disappointed murmur from an industry once again let down by a Government kowtowing to the dominant telco players.
Mitchell Bingemann Apr 21 2008 11:59AM Telco/ISP
Review: Trend Micro InterScan Web Security Suite

Review: Trend Micro InterScan Web Security Suite

Bringing together some of Trend Micro's features from its larger appliance-based systems, the InterScan Web Security Suite focuses on protecting against malicious web-based threats, along with traditional URL filtering.
Peter Stephenson, Apr 21 2008 5:00AM Security
Infosecurity Europe: Something for everyone

Infosecurity Europe: Something for everyone

A new Hall of Fame, more than 300 vendors and expert advice on the burning issues of the day are certain to attract more visitors than ever.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 18 2008 2:05PM Security
Another one bites the dust

Another one bites the dust

Mapping the tragedy of the Hannaford breach in a post-mortem sense should be just as important to the grocery chain as the upgrade of the system.
Danielle Zeedick, Norwich University Apr 18 2008 2:02PM Security
Review: St. Bernard iPrism 30h

Review: St. Bernard iPrism 30h

The iPrism appliance is a feature-packed web-content management device that incorporates St Bernard's hybrid technology.
Peter Stephenson, Apr 18 2008 6:00AM Security
Why not telework?

Why not telework?

The growth in telework is not as robust as most people think, as managing remote workers and security are big problems. But "secure telework" is possible.
Dan Lohrmann, Michigan CISO Apr 17 2008 12:18PM Security
Pirates of the Web lurking while you're shopping online

Pirates of the Web lurking while you're shopping online

Employers must face the fact that a lot of online shopping takes place at the office, and it can put an entire business network at risk.
Rajesh Venkat, Segment Marketing Director, McAfee Inc. Apr 17 2008 10:52AM Security
Review: Cymphonix Network Composer

Review: Cymphonix Network Composer

Network Composer from Cymphonix brings together critical web protection aspects into one product. It not only features URL and web filtering, but also many traffic-shaping and application controls.
Peter Stephenson, Apr 17 2008 6:00AM Security
PCI: Retail therapy

PCI: Retail therapy

As the Payment Card Industry's data security regulation begins to bite, Barry Mansfield examines its aims and obligations.
Barry Mansfield Apr 16 2008 2:57PM Security
Review: IBM Proventia Web Filter

Review: IBM Proventia Web Filter

The Proventia Web Filter is a piece of the much larger Proventia multi-function appliance. It is available either as part of the appliance or as a standalone product.
Peter Stephenson, Apr 15 2008 6:00AM Security
Forensics: Under investigation

Forensics: Under investigation

Whether you've been hacked or suspect an employee of wrongdoing, knowing how to preserve evidence is crucial. Derek Parkinson reports.
Derek Parkinson Apr 14 2008 4:34PM Security
Guest Column: Best practices for deploying Vista SP1

Guest Column: Best practices for deploying Vista SP1

Many companies have been waiting for Microsoft to release the first service pack of its latest operating system, Vista, before considering an upgrade to their current desktop operating environment. Vista Service Pack 1 addresses many of the concerns with regards to performance and stability, and application compatibility.
Anthony Stevens Apr 11 2008 1:50PM Software

Log In

  |  Forgot your password?