Features

Pirates of the Web lurking while you're shopping online

Pirates of the Web lurking while you're shopping online

Employers must face the fact that a lot of online shopping takes place at the office, and it can put an entire business network at risk.
Rajesh Venkat, Segment Marketing Director, McAfee Inc. Apr 17 2008 10:52AM Security
Review: Cymphonix Network Composer

Review: Cymphonix Network Composer

Network Composer from Cymphonix brings together critical web protection aspects into one product. It not only features URL and web filtering, but also many traffic-shaping and application controls.
Peter Stephenson, Apr 17 2008 6:00AM Security
PCI: Retail therapy

PCI: Retail therapy

As the Payment Card Industry's data security regulation begins to bite, Barry Mansfield examines its aims and obligations.
Barry Mansfield Apr 16 2008 2:57PM Security
Review: IBM Proventia Web Filter

Review: IBM Proventia Web Filter

The Proventia Web Filter is a piece of the much larger Proventia multi-function appliance. It is available either as part of the appliance or as a standalone product.
Peter Stephenson, Apr 15 2008 6:00AM Security
Forensics: Under investigation

Forensics: Under investigation

Whether you've been hacked or suspect an employee of wrongdoing, knowing how to preserve evidence is crucial. Derek Parkinson reports.
Derek Parkinson Apr 14 2008 4:34PM Security
Guest Column: Best practices for deploying Vista SP1

Guest Column: Best practices for deploying Vista SP1

Many companies have been waiting for Microsoft to release the first service pack of its latest operating system, Vista, before considering an upgrade to their current desktop operating environment. Vista Service Pack 1 addresses many of the concerns with regards to performance and stability, and application compatibility.
Anthony Stevens Apr 11 2008 1:50PM Software
Interview: CTO at RSA, Bret Hartman,

Interview: CTO at RSA, Bret Hartman,

RSA's chief technology officer thinks security should be left to experts. He tells Paul Fisher why he's no fan of employee awareness training.
Paul Fisher Apr 11 2008 1:53AM Security
Online security: "good enough" may not be good enough anymore

Online security: "good enough" may not be good enough anymore

What happens when "good enough" just isn't good enough anymore?
Jim Bidzos, vice chairman of the board, VeriSign Apr 10 2008 4:10PM Security
Review: SonicWall E-Class NSA E6500

Review: SonicWall E-Class NSA E6500

SonicWall comes back this year with a new appliance which we have not seen before. The E-Class Network Security Appliance (NSA) E6500 is designed with the large enterprise in mind. This product features not only an advanced application firewall and a VPN, it also includes a full threat-protection suite.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Apr 10 2008 6:42AM Security
Review: Aladdin's eSafe

Review: Aladdin's eSafe

Aladdin’s eSafe has gained many new and updated elements since its last release. The feature set includes a full gambit of email and web safeguards, such as the validation of recipients with the integration of LDAP/Active Directory.
Peter Stephenson, Apr 9 2008 10:00AM Security
Security hack reveals Microsoft porn virus

Security hack reveals Microsoft porn virus

Well, nothing in the headline above is remotely connected to the truth, but with those keywords this webpage is going to go ballistic. Can you digg it baby? Yeah! Groovy! But there was a little bit of something in the headline, which connects with today’s sermon, so pay attention up the back! And stop doing that to your sister. Eeew!
Ian Yates Apr 8 2008 3:36PM Security
Setting your own agenda at Sydney BarCamp

Setting your own agenda at Sydney BarCamp

Early on Saturday morning, at the BarCamp Sydney conference, a group of people crowded around the conference scheduling board. Most wore jeans and t-shirts, and all nursed take-away coffee. “Who’s speaking first?” asked one of them. “No one so far – why don’t you give a talk?” asked another. A young man carrying a laptop wrote his name and subject matter on an oversized Post-It note and stuck it on the scheduling board. “There – I’ll give the first talk,” he said.
Kathryn Small Apr 8 2008 12:14PM Software
Review: Sophos Web Appliance WS1000

Review: Sophos Web Appliance WS1000

The Sophos Web Appliance WS1000 effectively and seamlessly blocks spyware, phishing, virus, malware and other web-born threats at the gateway. It also allows granular administrative control over permitted actions. The use of Sophos Behavioural Genotype Technology is, according to the vendor, the key to stopping malicious threats, malware and even encrypted malware prior to allowing malicious code to run within your enterprise.
Peter Stephenson, Apr 8 2008 12:00PM Security
Protecting your data from the Trojan force

Protecting your data from the Trojan force

So many application-level zero-day exploits exist today that the question is not whether your computers are safe but what's already running on them.
Marco Peretti Apr 8 2008 8:26AM Security
Review: Trend Micro's InterScan Web Security

Review: Trend Micro's InterScan Web Security

Trend Micro’s InterScan Web Security Appliance (IWSA) is a real-time, security-rich tool for protecting organisations from web threats. IWSA’s new web reputation feature blocks users’ access to suspicious domains while performing website reputation scoring without the need of uploading updates.
Peter Stephenson, Apr 8 2008 7:06AM Security
Hot or Not: Virtualisation Security

Hot or Not: Virtualisation Security

What are the potential security implications of virtualisation? The answer is: they are considerable.
Amol Sarwate, Apr 8 2008 3:21AM Security
Review: Mcafee Internet Gateway 3000

Review: Mcafee Internet Gateway 3000

A strong feature set makes McAfee’s Security Internet Gateway (SIG) a heavy hitter in any organisation’s architecture. The SIG provides anti-virus scanning against all protocols, while anti-spyware scanning blocks potentially harmful spyware, cookies and adware from getting on to the network. To protect against spam the SIG uses an engine consisting of anti-spam, anti-phishing rule sets, permit-or-deny lists and a spam-learning feature. The SIG enforces policy and compliance issues regarding out-going data transmission as well as some forms of data leakage. This appliance is easily configurable by IT staff and, once configured, requires minimal administrator intervention.
Peter Stephenson,CeRNS, Apr 7 2008 4:00PM Security
First party fraud

First party fraud

As long as there has been credit granting there have been customers committing first party fraud.
Jasbir Anand, Actimize, Inc Apr 7 2008 3:36PM Security
Guest Column: Top 10 tips to consider when leveraging IP networks for collaborative applications

Guest Column: Top 10 tips to consider when leveraging IP networks for collaborative applications

The global proliferation of IP networks has spurred large businesses and government agencies to adopt voice over IP (VoIP) as a means of controlling operational expenses, improving employee connectivity and productivity, and gaining added flexibility and reliability.
Michael Marcellin Apr 7 2008 1:45PM Telco/ISP
Top five compliance challenges in a virtualised world

Top five compliance challenges in a virtualised world

Virtualisation is showing some extremely compelling ROI and transforming the way corporate IT provisions and administers not only the data center, but also the user desktop experience.
Chris Farrow, director of product strategy, Fortisphere Apr 4 2008 3:23PM Security

Log In

  |  Forgot your password?