Features

Security vs. privacy

Security vs. privacy

Does anyone today really believe that they can keep their personal information entirely confidential? While some people have personal preferences about how much personal information they are forced to reveal, to function within society requires some exposure of such information.
Tim Mather Mar 14 2008 3:22PM Security
Review: DeepNines i Trust Security Platform

Review: DeepNines i Trust Security Platform

DeepNines’ Security Edge Platform (SEP) takes a new look at UTM. This device does not become the gateway, but instead works with an existing firewall and sits between the internet and the perimeter to stop attacks before they can hit the firewall.
Peter Stephenson, Mar 13 2008 3:17PM Security
Interview: Philippe Courtot, CEO of Qualys

Interview: Philippe Courtot, CEO of Qualys

The Qualys CEO firmly believes the internet has taken over from software -which is why Bill Gates is in trouble. Philippe Courtot, without any obvious irony, describes himself as a "child of the internet". Unusual for a chief executive but, as this interview progresses, it becomes clear that the 61-year-old sees himself as a most unusual CEO. He is referring to his time spent at the European Organisation for Nuclear Research, where he witnessed the birth of the web under the aegis of Tim Berners-Lee.
Paul Fisher Mar 13 2008 1:23PM Security
Hot or Not: Vista SP1 Scheduled For Widespread Release

Hot or Not: Vista SP1 Scheduled For Widespread Release

It's been some time in the making, but Microsoft soon will make its first service pack for Vista widely available. While the final version started shipping to manufacturers earlier this month, Microsoft says it's making some final tweaks to its distribution channels before general availability in a few weeks. So what can we expect?
Amol Sarwate, Mar 12 2008 3:48PM Security
Review: ZyWALL USG300

Review: ZyWALL USG300

The ZyWall USG300 combines core UTM functionality with a couple of extra features. This appliance includes standard features such as firewall, IPS and gateway virus protection, and also has a web content filter as well as the cabability to block and control instant messaging and peer-to-peer applications. The gateway anti-virus engine scans critical protocols such as HTTP, FTP, SMTP, POP3 and IMAP4.
Peter Stephenson, Mar 12 2008 1:47PM Security
Security Web 2.0: Open Season for the Attackers?

Security Web 2.0: Open Season for the Attackers?

The Web is now a participatory medium. The downside to this ubiquitous connectivity and user participation is a new slew of security threats many IT professionals have yet to fully grasp.
Wayne Neich Mar 11 2008 3:58PM Security
Keeping a secret: The digital war

Keeping a secret: The digital war

Northrop Grumman has grown to a $30-billion-a-year company by designing and building some of the world's most sophisticated war-fighting tools, be it stealth bombers, airborne surveillance systems or nuclear-powered aircraft carriers and submarines.
Dan Kaplan Mar 10 2008 3:39PM Security
Guest column: The impact of quantum computers on cryptography

Guest column: The impact of quantum computers on cryptography

To explain the impact of quantum computers, it is best to first take a step back to review how current encryption technologies work.
Robin Balean Mar 10 2008 1:56PM Security
Is Conroy forgetting about OPEL?

Is Conroy forgetting about OPEL?

In his first major IT industry address, Senator Stephen Conroy stood before some 500 attendees, but forgot all about mentioning OPEL.
Mitchell Bingemann Mar 7 2008 9:48AM Telco/ISP
Review: Yoggie Pico Pro

Review: Yoggie Pico Pro

The Yoggie Pico Pro is a USB security device aimed at corporate road warriors. As mobile workers often rely on third-party WiFi networks to connect to corporate systems on the road, this can represent a loophole in enterprise security.
Mark Mayne Mar 7 2008 9:14AM Security
Interview: Scott Weiss, IronPort's CEO

Interview: Scott Weiss, IronPort's CEO

IronPort's charismatic CEO puts his success down to having tasted failure in the past. He talks to Paul Fisher SC Magazine's UK editor about living with Cisco.
Paul Fisher Mar 6 2008 3:19PM Security
Review: AirMagnet Enterprise v8.0

Review: AirMagnet Enterprise v8.0

AirMagnet Enterprise delivers active full-time protection against the entire spectrum of wireless threats such as denial-of-service attacks, MAC spoofing, fragmentation attacks and other types of wireless hacking and reconnaissance tools. Threats can be traced, located and blocked, and the results saved for analysis.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 6 2008 7:52AM Security
Change default credentials

Change default credentials

The easiest way into any system is likely to be the defaults, so make sure you don't leave an open door for criminals.
Ken Munro Mar 4 2008 10:23AM Security
Emloyee education key to successful enterprise security

Emloyee education key to successful enterprise security

All the technology in the world won't help if your employees don't follow security policies, so how can you win them over?
Rob Buckley Feb 29 2008 2:55PM Security
Review: Utimaco Safeware SafeGuard PDA v4.25

Review: Utimaco Safeware SafeGuard PDA v4.25

Utimaco Safeware’s SafeGuard PDA enterprise offers organisations the control to use PDAs within their architecture, while still protecting sensitive data from unauthorized users.
Peter Stephenson, Feb 29 2008 2:18PM Security
Review: Novell ZENworks ESM v3.5

Review: Novell ZENworks ESM v3.5

The ZENworks Handheld Management offering focuses on three key issues crucial for any organisation’s bottom line: compliance, risk and cost reduction.
Peter Stephenson, Feb 28 2008 3:22PM Security
Storm worm botnet: mutating or fading?

Storm worm botnet: mutating or fading?

What is the future of the infamous Storm worm, has it morphed into the Mega-D botnet that is now posing a threat or shrunk out of sight?
Negar Salek Feb 28 2008 11:32AM Security
Risk management: Calculated risk

Risk management: Calculated risk

Don't wait for the worst to happen. Define your company's key assets, the risks they're exposed to and how to protect them.
Mark Mayne Feb 27 2008 2:56PM Security
Review: Centennial Software DeviceWall v4.6

Review: Centennial Software DeviceWall v4.6

DeviceWall has many applications for both portable device security and endpoint security and management. As far as portable security goes, DeviceWall includes both the ability to stop transfer of data based on security policy and to encrypt data that needs to be transmitted.
Peter Stephenson Feb 27 2008 7:10AM Security
Review: Bluefire Mobile Security 4.0.2

Review: Bluefire Mobile Security 4.0.2

Bluefire Mobile Security Enterprise Edition can be centrally deployed and configured from an administration console. Administrative features include the ability to enforce and update security policy, view logs, extract security logs and control devices regardless of location.
Peter Stephenson, Feb 26 2008 4:02PM Security

Log In

  |  Forgot your password?