Features

Survey: 80 percent of financial security chiefs rely on FTP transfers despite data breaches

Survey: 80 percent of financial security chiefs rely on FTP transfers despite data breaches

A recent survey of 100 IT managers and CIOs from the financial services, health care, retail, manufacturing and government business sectors shows that despite a torrent of bad press on data-security breaches involving FTP (file-transfer protocol), its use is prevalent and growing.
William McKinney Jan 9 2008 3:11PM Security
Review: Courion Enterprise Provisioning

Review: Courion Enterprise Provisioning

Courion’s Enterprise Provisioning Suite can be summed up as a fully adaptable, tailor-made identity-management solution. Users can select specific components of the suite and have a platform that meets their specific needs. The process starts with what Courion calls Jump Start. This is exactly what it sounds like, getting the process up and running out of the box.
Peter Stephenson,CeRNS, Jan 9 2008 3:03PM Security
A new year’s security resolution

A new year’s security resolution

As we put the festivities behind us and fix our sights firmly on the year ahead, those criminal gangs involved in the nefarious activities of spam creation, phishing and virus attacks continue to engage new tactics that will take advantage of our relaxed, less cautious frame of mind.
Mark Sunner Jan 8 2008 3:16PM Security
Review: ZyXEL ZyWALL USG 300

Review: ZyXEL ZyWALL USG 300

A good all-around product with a large feature set. The unit can be a bit of a challenge for organizations that do not need all of the included features.
Justin Peltier Jan 7 2008 3:25PM Security
Guest column: Expensive data pitfalls in service-oriented architectures today

Guest column: Expensive data pitfalls in service-oriented architectures today

In theory, SOAs have the potential to deliver greater efficiency and economies of scale in the enterprise, through a more flexible approach. In practice, however, SOAs have swallowed millions of dollars of investment in IT infrastructure while failing to satisfy business demands for reduced costs, greater agility, and competitive advantage in increasingly fast-paced global marketplaces.
Laurie Newman Dec 27 2007 11:10AM Hardware
Australian telcos champion Voice over Broadband for SMBs

Australian telcos champion Voice over Broadband for SMBs

Voice over Internet Protocol (VoIP) is not a new term. Touted as a low cost alternative to traditional telephony, VoIP has a major role in a new wave of converged network solutions that are pervading the telecommunications market.
Liz Tay Dec 24 2007 11:53AM Telco/ISP
Web threats make their mark on 07/08

Web threats make their mark on 07/08

The new year is supposed to signal a fresh start for us all, but web threats will continue to reign in 2008, wreaking havoc just as they did this year
Negar Salek Dec 24 2007 9:26AM Security
Review: SC Magazine picks the cream of the crop

Review: SC Magazine picks the cream of the crop

SC Magazine's technology experts have made their choices for the best products of 2007 from among the dozens of entries that were subjected to thorough group tests and reviews during the year.
Staff Writers Dec 21 2007 12:12PM Security
Roundup 2007: The year's top fives

Roundup 2007: The year's top fives

TOP 5 CYBERATTACKS:

1. The Storm Worm
What began as an email-spawned trojan attack using fake news stories to lure victims became the most widespread cyber-assault in recent memory. Still replicating, and exploiting a number of patched vulnerabilities, the botnet-fueled, socially engineered attack may make next year's list as well.
Staff Writers Dec 21 2007 11:43AM Security
The SC interview online: Eva Chen

The SC interview online: Eva Chen

Co-founder and CEO of Trend Micro, Eva Chen discusses a wide range of subjects touched on financials, industry moves and trends, and the opportunities provided by the emerging markets of India and China.
Paul Fisher Dec 21 2007 10:42AM Security
Review: Industry innovators 2007: PGP Encryption

Review: Industry innovators 2007: PGP Encryption

In discussing innovation with people from PGP, we made a very interesting discovery. What we classically think of as PGP encryption actually is only a small part of the view that the company has of the product line and the mission of the company.
Peter Stephenson, Dec 20 2007 3:06PM Security
Guest column: Are you getting what you’re paying for? Making the most out of your investment in development

Guest column: Are you getting what you’re paying for? Making the most out of your investment in development

You’re paying your application developers to write code. But are they doing what you’re paying them to do?
Eldad Maniv Dec 20 2007 11:02AM Software
Eight New Year's security resolutions for 2008

Eight New Year's security resolutions for 2008

2008 will usher in more security issues whose challenges can only be met by an array of security solutions. Now is the time to start thinking about your 2008 New Year's security resolutions.
Kevin Prince CSO, Perimeter eSecurity Dec 19 2007 4:11PM Security
A disservice to security?

A disservice to security?

Software as a service may seem good news for users, but it could also be an open invitation for attackers.
Ian Castle Dec 18 2007 2:30PM Security
Review: Stonesoft StoneGate FW-5000

Review: Stonesoft StoneGate FW-5000

Stonesoft offers a variety of firewall platforms designed to meet the needs of various sized organisations.
Justin Peltier Dec 18 2007 11:12AM Security
The eight myths of data encryption

The eight myths of data encryption

How misconceptions about data encryption are preventing A/NZ companies from effectively protecting data exchanged with employees, partners and suppliers.

Simon Coffey Dec 17 2007 11:44AM Security
Review: PureFile V3.1.3

Review: PureFile V3.1.3

This product is not, in the strictest sense of the term, an extrusion detection product. Rather, it is an audit/ inspection tool that finds information hidden in files.
Peter Stephenson, Dec 13 2007 10:59AM Security
Roundup 2007: Gazing into the crystal ball

Roundup 2007: Gazing into the crystal ball

SC US handed out crystal balls to several analysts, consultants, professors and CSOs and asked them to answer questions about next year.
Dan Kaplan Dec 11 2007 3:04PM Security
Review: Code Green CI Appliance 1500

Review: Code Green CI Appliance 1500

External threats to network security have always grabbed the headlines, but it's a well-known fact that the biggest dangers are likely to come from inside your perimeter.
Peter Stephenson, Dec 10 2007 1:33PM Security
The breakdown in network security design

The breakdown in network security design

The widespread dissemination of information and processing power has created a constantly evolving security dilemma: how to create and provide access to secure networks.
Ken Salchow Dec 7 2007 12:08PM Security

Log In

  |  Forgot your password?