Features

Interview: CTO at RSA, Bret Hartman,

Interview: CTO at RSA, Bret Hartman,

RSA's chief technology officer thinks security should be left to experts. He tells Paul Fisher why he's no fan of employee awareness training.
Paul Fisher Apr 11 2008 1:53AM Security
Online security: "good enough" may not be good enough anymore

Online security: "good enough" may not be good enough anymore

What happens when "good enough" just isn't good enough anymore?
Jim Bidzos, vice chairman of the board, VeriSign Apr 10 2008 4:10PM Security
Review: SonicWall E-Class NSA E6500

Review: SonicWall E-Class NSA E6500

SonicWall comes back this year with a new appliance which we have not seen before. The E-Class Network Security Appliance (NSA) E6500 is designed with the large enterprise in mind. This product features not only an advanced application firewall and a VPN, it also includes a full threat-protection suite.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 10 2008 6:42AM Security
Review: Aladdin's eSafe

Review: Aladdin's eSafe

Aladdin’s eSafe has gained many new and updated elements since its last release. The feature set includes a full gambit of email and web safeguards, such as the validation of recipients with the integration of LDAP/Active Directory.
Peter Stephenson, Apr 9 2008 10:00AM Security
Security hack reveals Microsoft porn virus

Security hack reveals Microsoft porn virus

Well, nothing in the headline above is remotely connected to the truth, but with those keywords this webpage is going to go ballistic. Can you digg it baby? Yeah! Groovy! But there was a little bit of something in the headline, which connects with today’s sermon, so pay attention up the back! And stop doing that to your sister. Eeew!
Ian Yates Apr 8 2008 3:36PM Security
Setting your own agenda at Sydney BarCamp

Setting your own agenda at Sydney BarCamp

Early on Saturday morning, at the BarCamp Sydney conference, a group of people crowded around the conference scheduling board. Most wore jeans and t-shirts, and all nursed take-away coffee. “Who’s speaking first?” asked one of them. “No one so far – why don’t you give a talk?” asked another. A young man carrying a laptop wrote his name and subject matter on an oversized Post-It note and stuck it on the scheduling board. “There – I’ll give the first talk,” he said.
Kathryn Small Apr 8 2008 12:14PM Software
Review: Sophos Web Appliance WS1000

Review: Sophos Web Appliance WS1000

The Sophos Web Appliance WS1000 effectively and seamlessly blocks spyware, phishing, virus, malware and other web-born threats at the gateway. It also allows granular administrative control over permitted actions. The use of Sophos Behavioural Genotype Technology is, according to the vendor, the key to stopping malicious threats, malware and even encrypted malware prior to allowing malicious code to run within your enterprise.
Peter Stephenson, Apr 8 2008 12:00PM Security
Protecting your data from the Trojan force

Protecting your data from the Trojan force

So many application-level zero-day exploits exist today that the question is not whether your computers are safe but what's already running on them.
Marco Peretti Apr 8 2008 8:26AM Security
Review: Trend Micro's InterScan Web Security

Review: Trend Micro's InterScan Web Security

Trend Micro’s InterScan Web Security Appliance (IWSA) is a real-time, security-rich tool for protecting organisations from web threats. IWSA’s new web reputation feature blocks users’ access to suspicious domains while performing website reputation scoring without the need of uploading updates.
Peter Stephenson, Apr 8 2008 7:06AM Security
Hot or Not: Virtualisation Security

Hot or Not: Virtualisation Security

What are the potential security implications of virtualisation? The answer is: they are considerable.
Amol Sarwate, Apr 8 2008 3:21AM Security
Review: Mcafee Internet Gateway 3000

Review: Mcafee Internet Gateway 3000

A strong feature set makes McAfee’s Security Internet Gateway (SIG) a heavy hitter in any organisation’s architecture. The SIG provides anti-virus scanning against all protocols, while anti-spyware scanning blocks potentially harmful spyware, cookies and adware from getting on to the network. To protect against spam the SIG uses an engine consisting of anti-spam, anti-phishing rule sets, permit-or-deny lists and a spam-learning feature. The SIG enforces policy and compliance issues regarding out-going data transmission as well as some forms of data leakage. This appliance is easily configurable by IT staff and, once configured, requires minimal administrator intervention.
Peter Stephenson,CeRNS, Apr 7 2008 4:00PM Security
First party fraud

First party fraud

As long as there has been credit granting there have been customers committing first party fraud.
Jasbir Anand, Actimize, Inc Apr 7 2008 3:36PM Security
Guest Column: Top 10 tips to consider when leveraging IP networks for collaborative applications

Guest Column: Top 10 tips to consider when leveraging IP networks for collaborative applications

The global proliferation of IP networks has spurred large businesses and government agencies to adopt voice over IP (VoIP) as a means of controlling operational expenses, improving employee connectivity and productivity, and gaining added flexibility and reliability.
Michael Marcellin Apr 7 2008 1:45PM Telco/ISP
Top five compliance challenges in a virtualised world

Top five compliance challenges in a virtualised world

Virtualisation is showing some extremely compelling ROI and transforming the way corporate IT provisions and administers not only the data center, but also the user desktop experience.
Chris Farrow, director of product strategy, Fortisphere Apr 4 2008 3:23PM Security
Review: Panda's GateDefender Integra 300

Review: Panda's GateDefender Integra 300

Panda’s GateDefender Integra comes as a complete-package UTM with many good features. These include a firewall, VPN, IPS, malware protection at the gateway using heuristics, spam and phishing protection at the gateway, plus a web content filter.
Peter Stephenson, Apr 4 2008 4:03AM Security
Review: Fortinet's FortiGate-200A

Review: Fortinet's FortiGate-200A

Fortinet’s FortiGate is another product that has not changed much since we last saw it. This device focuses on three layers of protection: first is a firewall and VPN; the second layer is IPS/IDS; and the final layer is securing content from viruses and spyware, web filtering and IM and P2P blocking.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 3 2008 11:46AM Security
Smartphone security beyond office walls

Smartphone security beyond office walls

With data becoming more mobile than ever, it is critical that companies have a pervasive security strategy across the corporate network.
Matt Bancroft, CMO, Mformation Technologies Inc. Apr 3 2008 11:42AM Security
Virtual business

Virtual business

Beyond the realm of virtual escorts, real estate agents, and other entrepreneurial start-ups, the Second Life business world has been traditionally dominated by the largest of the real-world companies.
Liz Tay Apr 2 2008 3:40PM Software
Review: Clearswift MIMEsweeper

Review: Clearswift MIMEsweeper

Clearswift's MIMEsweeper appliance takes web content management to the next level. This device is loaded with features way beyond the usual web filter.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 1 2008 12:00AM Security
The greatest vulnerability to come

The greatest vulnerability to come

Guard the greatest vulnerability point - gaps in data security - to avoid threats, says Raphael Leiteritz
Raphael Leiteritz Mar 31 2008 3:03PM Security

Log In

  |  Forgot your password?