Features

Is Conroy forgetting about OPEL?

Is Conroy forgetting about OPEL?

In his first major IT industry address, Senator Stephen Conroy stood before some 500 attendees, but forgot all about mentioning OPEL.
Mitchell Bingemann Mar 7 2008 9:48AM Telco/ISP
Review: Yoggie Pico Pro

Review: Yoggie Pico Pro

The Yoggie Pico Pro is a USB security device aimed at corporate road warriors. As mobile workers often rely on third-party WiFi networks to connect to corporate systems on the road, this can represent a loophole in enterprise security.
Mark Mayne Mar 7 2008 9:14AM Security
Interview: Scott Weiss, IronPort's CEO

Interview: Scott Weiss, IronPort's CEO

IronPort's charismatic CEO puts his success down to having tasted failure in the past. He talks to Paul Fisher SC Magazine's UK editor about living with Cisco.
Paul Fisher Mar 6 2008 3:19PM Security
Review: AirMagnet Enterprise v8.0

Review: AirMagnet Enterprise v8.0

AirMagnet Enterprise delivers active full-time protection against the entire spectrum of wireless threats such as denial-of-service attacks, MAC spoofing, fragmentation attacks and other types of wireless hacking and reconnaissance tools. Threats can be traced, located and blocked, and the results saved for analysis.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 6 2008 7:52AM Security
Change default credentials

Change default credentials

The easiest way into any system is likely to be the defaults, so make sure you don't leave an open door for criminals.
Ken Munro Mar 4 2008 10:23AM Security
Emloyee education key to successful enterprise security

Emloyee education key to successful enterprise security

All the technology in the world won't help if your employees don't follow security policies, so how can you win them over?
Rob Buckley Feb 29 2008 2:55PM Security
Review: Utimaco Safeware SafeGuard PDA v4.25

Review: Utimaco Safeware SafeGuard PDA v4.25

Utimaco Safeware’s SafeGuard PDA enterprise offers organisations the control to use PDAs within their architecture, while still protecting sensitive data from unauthorized users.
Peter Stephenson, Feb 29 2008 2:18PM Security
Review: Novell ZENworks ESM v3.5

Review: Novell ZENworks ESM v3.5

The ZENworks Handheld Management offering focuses on three key issues crucial for any organisation’s bottom line: compliance, risk and cost reduction.
Peter Stephenson, Feb 28 2008 3:22PM Security
Storm worm botnet: mutating or fading?

Storm worm botnet: mutating or fading?

What is the future of the infamous Storm worm, has it morphed into the Mega-D botnet that is now posing a threat or shrunk out of sight?
Negar Salek Feb 28 2008 11:32AM Security
Risk management: Calculated risk

Risk management: Calculated risk

Don't wait for the worst to happen. Define your company's key assets, the risks they're exposed to and how to protect them.
Mark Mayne Feb 27 2008 2:56PM Security
Review: Centennial Software DeviceWall v4.6

Review: Centennial Software DeviceWall v4.6

DeviceWall has many applications for both portable device security and endpoint security and management. As far as portable security goes, DeviceWall includes both the ability to stop transfer of data based on security policy and to encrypt data that needs to be transmitted.
Peter Stephenson Feb 27 2008 7:10AM Security
Review: Bluefire Mobile Security 4.0.2

Review: Bluefire Mobile Security 4.0.2

Bluefire Mobile Security Enterprise Edition can be centrally deployed and configured from an administration console. Administrative features include the ability to enforce and update security policy, view logs, extract security logs and control devices regardless of location.
Peter Stephenson, Feb 26 2008 4:02PM Security
Review: SpectraGuard Enterprise

Review: SpectraGuard Enterprise

SpectraGuard Enterprise and SAFE v5.5 is intended for organisations with wireless LAN networks and WiFi capabilities. This product contains many features to protect, analyse, audit and maintain the overall health of a company’s wireless network.
Peter Stephenson, Feb 25 2008 10:13AM Security
Review: A10 Networks IDsentrie 1000

Review: A10 Networks IDsentrie 1000

The IDsentrie identity management appliance brings together several forms of secure user management into one device. This appliance focuses on two main areas of identity management, the first being network authentication.
Peter Stephenson,CeRNS, Feb 22 2008 12:00AM Security
Superbotnets: Mega-D vs Storm, an in-depth look

Superbotnets: Mega-D vs Storm, an in-depth look

Mega-D, set off a firestorm of speculation, recently. What family of malware was behind this previously unknown botnet? How had it emerged to challenge Storm with hardly a mention in any research articles or press?
Joe Stewart, Senior Security Researcher, SecureWorks Feb 21 2008 10:52AM Security
Review: AirDefence Enterprise v7.3

Review: AirDefence Enterprise v7.3

AirDefense Enterprise provides protection against wireless threats, policy compliance and performance monitoring, troubleshooting and location tracking in an appliance that is scalable for most size organisations.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Feb 20 2008 3:25PM Security
Building security into your software-development lifecycle

Building security into your software-development lifecycle

You have probably heard by now that the root cause of most security vulnerabilities is in the software we run, and that these vulnerabilities are introduced into the software during the development process. That much has been well understood for several years. What hasn't been well understood is the solution to the problem.
Chris Wysopal Feb 18 2008 4:08PM Security
Review: Trust Digital Smartphone Security v7.3

Review: Trust Digital Smartphone Security v7.3

This product is almost like identity management for mobile devices. With Smartphone Security, an administrator can manage mobile users, provision policies, secure data, provide support and run audits.
Peter Stephenson, Feb 18 2008 4:07PM Security
Guest column: Security Web 2.0 - Open Season for the Attackers?

Guest column: Security Web 2.0 - Open Season for the Attackers?

The Web is now a participatory medium -- users contributing, communing, and building. The downside of this ubiquitous connectivity and user participation is a new slew of security threats many IT professionals have yet to fully grasp.
Wayne Neich Feb 18 2008 12:11PM Security
Data breaches in 2007, will bring action in 2008

Data breaches in 2007, will bring action in 2008

After last year's big breaches, new laws on handling confidential data won't be far off, so get ready now.
Ian Castle Feb 15 2008 12:07PM Security

Log In

  |  Forgot your password?