Features

RSA 2008: All Grown Up

RSA 2008: All Grown Up

The RSA Conference continues to strengthen its hold as the industry's most important gathering for IT security pros.
Dan Kaplan Mar 25 2008 11:31AM Security
Focus on new research at RSA 2008

Focus on new research at RSA 2008

There's a lot of new research that will be revealed at this year's gathering of security pros, says RSA chief security strategist Tim Mather.
Tim Mather Mar 25 2008 11:30AM Security
Guest column: What ISPs need to consider when it comes to Web filtering

Guest column: What ISPs need to consider when it comes to Web filtering

As the evolving Web makes managing appropriate surfing and bandwidth use more difficult, it also introduces new security threats that filtering may be uniquely well suited to address. However, the Web content security role makes inaccurate site rating, poor coverage, and delayed rating of new URLs even more costly.
Wayne Neich Mar 25 2008 11:11AM Security
When hackers think small: SME security

When hackers think small: SME security

As big business finally gets a hold on security, SMEs relying on off-the-shelf e-commerce tools are easy prey.
Ken Munro Mar 22 2008 5:00PM Security
Risk is a state of mind

Risk is a state of mind

All the encryption in the world won't keep information safe if the people handling data don't think about security.
Nick Barron Mar 20 2008 2:35PM Security
Review: Vasco's aXs Guard

Review: Vasco's aXs Guard

When most people think of Vasco they think of strong authentication. The aXs Guard Authentication and Internet Security Appliance takes the company’s strong authentication expertise one step further and combines it with a fully functional UTM.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 20 2008 2:34PM Security
Mobile Internet: the wireless convergence

Mobile Internet: the wireless convergence

The national telecommunications industry has experienced some strife in recent days. Weighed down by regulatory issues to do with a once-government-owned incumbent copper network, international comparisons of Australian broadband pricing and availability have proved to be embarrassing at best.
Liz Tay Mar 19 2008 2:17PM Hardware
Changes to information security regulation in US health industry

Changes to information security regulation in US health industry

With California's data breach notification law now being extended to cover health care organisations, businesses in this space must pay closer attention to how the personal health information entrusted to their care is safeguarded.
Illena Armstrong Mar 19 2008 1:45PM Security
Review: Cyberoam CR1000i v9.5

Review: Cyberoam CR1000i v9.5

The Cyberoam 1000i appliance comes fully loaded with many great features for broad gateway security. These include basics such as firewall, gateway anti-virus and IPS/IDS.
Peter Stephenson, Mar 19 2008 10:49AM Security
Software: The right choice

Software: The right choice

There are plenty of tools around to make infosec professionals' life easier. But how do you find the right ones? Barry Mansfield reports.
Barry Mansfield Mar 18 2008 3:49PM Security
Interview: Jorge Dinares, Panda CEO

Interview: Jorge Dinares, Panda CEO

In this SC Magazine online exclusive, Mark Mayne questions Panda Security's CEO, Jorge Dinares.
Mark Mayne Mar 17 2008 4:04PM Security
Review: IBM's Proventia Network MX1004

Review: IBM's Proventia Network MX1004

We must say that in our ever-evolving world of technology, size really does not matter. This appliance is hardly bigger than a home router, but it packs some big features. The IBM Proventia Network Multi-Function Security (MFS) MX1004 includes a firewall and IPS as well as functionality to catch viruses, spam and phishing at the gateway. This little box also includes a VPN and a web content filter.
Peter Stephenson, Mar 14 2008 4:08PM Security
Security vs. privacy

Security vs. privacy

Does anyone today really believe that they can keep their personal information entirely confidential? While some people have personal preferences about how much personal information they are forced to reveal, to function within society requires some exposure of such information.
Tim Mather Mar 14 2008 3:22PM Security
Review: DeepNines i Trust Security Platform

Review: DeepNines i Trust Security Platform

DeepNines’ Security Edge Platform (SEP) takes a new look at UTM. This device does not become the gateway, but instead works with an existing firewall and sits between the internet and the perimeter to stop attacks before they can hit the firewall.
Peter Stephenson, Mar 13 2008 3:17PM Security
Interview: Philippe Courtot, CEO of Qualys

Interview: Philippe Courtot, CEO of Qualys

The Qualys CEO firmly believes the internet has taken over from software -which is why Bill Gates is in trouble. Philippe Courtot, without any obvious irony, describes himself as a "child of the internet". Unusual for a chief executive but, as this interview progresses, it becomes clear that the 61-year-old sees himself as a most unusual CEO. He is referring to his time spent at the European Organisation for Nuclear Research, where he witnessed the birth of the web under the aegis of Tim Berners-Lee.
Paul Fisher Mar 13 2008 1:23PM Security
Hot or Not: Vista SP1 Scheduled For Widespread Release

Hot or Not: Vista SP1 Scheduled For Widespread Release

It's been some time in the making, but Microsoft soon will make its first service pack for Vista widely available. While the final version started shipping to manufacturers earlier this month, Microsoft says it's making some final tweaks to its distribution channels before general availability in a few weeks. So what can we expect?
Amol Sarwate, Mar 12 2008 3:48PM Security
Review: ZyWALL USG300

Review: ZyWALL USG300

The ZyWall USG300 combines core UTM functionality with a couple of extra features. This appliance includes standard features such as firewall, IPS and gateway virus protection, and also has a web content filter as well as the cabability to block and control instant messaging and peer-to-peer applications. The gateway anti-virus engine scans critical protocols such as HTTP, FTP, SMTP, POP3 and IMAP4.
Peter Stephenson, Mar 12 2008 1:47PM Security
Security Web 2.0: Open Season for the Attackers?

Security Web 2.0: Open Season for the Attackers?

The Web is now a participatory medium. The downside to this ubiquitous connectivity and user participation is a new slew of security threats many IT professionals have yet to fully grasp.
Wayne Neich Mar 11 2008 3:58PM Security
Keeping a secret: The digital war

Keeping a secret: The digital war

Northrop Grumman has grown to a $30-billion-a-year company by designing and building some of the world's most sophisticated war-fighting tools, be it stealth bombers, airborne surveillance systems or nuclear-powered aircraft carriers and submarines.
Dan Kaplan Mar 10 2008 3:39PM Security
Guest column: The impact of quantum computers on cryptography

Guest column: The impact of quantum computers on cryptography

To explain the impact of quantum computers, it is best to first take a step back to review how current encryption technologies work.
Robin Balean Mar 10 2008 1:56PM Security

Log In

  |  Forgot your password?