Features

Awareness combats profit-driven attacks

Awareness combats profit-driven attacks

There's no question about it: the malware industry is booming. Every day, computer users are bombarded with news of severe data breaches, the rapid growth of online fraud and identity theft, and spyware that invades privacy and compromises security.
Jason King Feb 14 2008 4:06PM Security
New government, new year, new promises

New government, new year, new promises

Why government Internet filtering raises more questions than it answers.
Mitchell Bingemann Feb 14 2008 10:48AM Software
Guest column: Proving the value of your iInvestment with ROI

Guest column: Proving the value of your iInvestment with ROI

In life, as in business, you continually make decisions about purchases by considering the value you’ll get from your investment. Whether you are evaluating which stock or mutual fund to add to your retirement portfolio, considering different real estate options, or contemplating what kind of car to buy, you most likely begin by comparing several possible choices. Then you might try to project the value that each option will deliver for your investment.
Mary Nugent and Marina Yesakova Feb 14 2008 10:47AM Strategy
The key to USB security

The key to USB security

USB devices are getting smaller. That also makes them easier to lose, yet most still have no decent encryption.
Nick Barron Feb 13 2008 4:04PM Security
Review: ZENworks Endpoint Security

Review: ZENworks Endpoint Security

ZENworks Endpoint Security Management (ESM) v3.5 provides a centrally managed endpoint security product that controls and manages wireless connectivity. The ESM offers complete control over all wireless connectivity within an organisation.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Feb 12 2008 2:50PM Security
Get ahead of new web applications

Get ahead of new web applications

Consumer peer-to-peer (p2p) internet applications are growing at a blistering pace. Evidence is everywhere: worldwide, users send more than 10 billion instant messages every day (J.D. Powers and Associates); Skype's 136 million users account for 7 percent of international long-distance traffic (Morgan Stanley); video file sharing may account for up to 60 percent of all internet traffic (CacheLogic).
John Yun, Juniper Networks and Jon Oltsik, Enterprise S Feb 12 2008 2:33PM Security
Linux, we have a PR problem

Linux, we have a PR problem

A few weeks ago a former boss and mentor of mine made my jaw drop by asking me, "Why has open source failed?".
Sarah Stokely Feb 11 2008 12:26PM Software
Review: Power Logon

Review: Power Logon

Power LogOn offers a somewhat different take to identity management. In the IT industry, when a user is given a secure password it is usually something other than their dog’s name or favourite football team.
Peter Stephenson,CeRNS, Feb 5 2008 11:13AM Security
Surviving the Age of Consolidation

Surviving the Age of Consolidation

IT security vendors are acquiring companies that make point products. But what you really need are integrated security solutions. Here’s how to choose your suppliers wisely. By all measures, we live in an age of consolidation.
John McNulty, Chairman and CEO of Secure Computing Corp Feb 4 2008 7:47AM Security
Bruce Schneier on fighting security FUD

Bruce Schneier on fighting security FUD

Security expert Bruce Schneier has long been critical of so-called security ‘theatre' - policies and products tailored to provide the perception of security rather than tackling actual security risks.
Feb 1 2008 2:00PM Security
Guest column: The Saas Trap - What you need to consider before moving to SAAS

Guest column: The Saas Trap - What you need to consider before moving to SAAS

Adoption of the software-as-a-service (SaaS) sales model is accelerating at a phenomenal rate in the region, changing the way vendors do business and the way organisations use software.
Paul K. Berger Jan 31 2008 3:11PM Software
Review: AVATIER ID MANAGEMENT SUITE

Review: AVATIER ID MANAGEMENT SUITE

When Avatier calls this an identity management suite, it’s not kidding. This product contains all the tools to manage users through their entire lifecycle. The company has split identity management into six phases.
Peter Stephenson,CeRNS, Jan 31 2008 8:00AM Security
Angels give wings to Australian start-ups

Angels give wings to Australian start-ups

As a nation that is home to a well-developed education system and world-class research institutions, Australia is often lauded as fertile grounds for innovation. But the outlook for young entrepreneurs may not be so rosy.
Liz Tay Jan 30 2008 4:13PM Financial Services
Browser wars

Browser wars

For all the hype about the relative security of the two most popular browsers, is Firefox really any more secure than Internet Explorer? For that matter, is it even possible, as a British company with a “zero-footprint” browser claims, to develop a truly secure browser?
Jim Carr Jan 30 2008 3:53PM Security
Review: ENCENTUATE IAM with iTAG 3.5

Review: ENCENTUATE IAM with iTAG 3.5

Encentuate Identity and Access Management (IAM) suite has many well-developed features that cover the full spectrum of administrator deployment and end-user authentication.
Peter Stephenson,CeRNS, Jan 29 2008 10:00AM Security
How do you protect what you don't know exists?

How do you protect what you don't know exists?

Almost every day there is news of a company's security breach and, increasingly, many of these incidents are originating from an employee or other internal source.
Alex Gorelik Jan 29 2008 9:30AM Security
Messaging security: A layered approach is needed

Messaging security: A layered approach is needed

Above and below. Left and right. In front and behind you. Use multi-dimensional security to fend off attackers, no matter where they come from.
Paul Henry Jan 25 2008 10:46AM Security
Review: ALADDIN eTOKEN

Review: ALADDIN eTOKEN

Aladdin’s eToken offers full enterprise-wide deployment and lifecycle management of all authentication tokens, users and support applications. The product uses an open standards-based architecture with support for security applications relying on configurable connecters.
Peter Stephenson,CeRNS, Jan 25 2008 12:00AM Security
Review: Sun Identity Manager

Review: Sun Identity Manager

The Sun Identity Manager is designed to play at a high level in a large environment. It focuses on creating and managing provisioning workflows quickly and easily, as well as helping with auditing and compliance.
Peter Stephenson,CeRNS, Jan 24 2008 11:26AM Security
Wasn't that encrypted?

Wasn't that encrypted?

Encryption is pointless if not applied to an entire session. It only gives users a false sense of security.
Ken Munro Jan 22 2008 11:26AM Security

Log In

  |  Forgot your password?