Features

Six steps to securing next gen communications

Six steps to securing next gen communications

The newest generation of employees connects with friends on Facebook and shares YouTube videos on lunch breaks or throughout the working day.
Staff Writers Nov 22 2007 8:44AM Security
Guest column: How data integration can help make e-voting a reality

Guest column: How data integration can help make e-voting a reality

Electronic voting, or e-voting, has been growing in prominence in recent times and for good reason.
Laurie Newman Nov 21 2007 3:58PM Software
Weathering the storm

Weathering the storm

Life keeps getting more difficult for information security researchers - and it's not all down to the bad guys.
Staff Writers Nov 21 2007 3:00PM Security
Interview: Betfair's 29 year-old global head of security, Adrian Asher

Interview: Betfair's 29 year-old global head of security, Adrian Asher

Betfair's global head of security seems to have it all: bosses who listen, resources most of us can only dream of, and youth.
Paul Fisher Nov 20 2007 11:21AM Security
Kill deleted data for good

Kill deleted data for good

We spend a lot of time trying to secure mobile devices, but what about the removable storage cards they contain?
Ken Munro Nov 19 2007 3:16PM Security
Microsoft's Bill Hilf reveals its open source strategy

Microsoft's Bill Hilf reveals its open source strategy

Bill Hilf, the man in charge of Microsoft's strategy for living in harmony with Linux lays out the company's opportunities with open source and the open source business model.
J. Nicholas Nov 19 2007 7:37AM Software
Are VoIP systems prepared for attacks?

Are VoIP systems prepared for attacks?

The W/32 Skipi.A worm that nagged Skype users in early September was fairly routine by malware standards. It arrived pretending to be a message from another user, offered erotic pictures, infected machines via malicious links, stole information and moved on to other PCs.
Frank Washkush Jr Nov 16 2007 3:31PM Security
Review: Oakley Networks SureView, v5.0

Review: Oakley Networks SureView, v5.0

Oakley Networks SureView appliance offers very complete extrusion prevention with a twist. Along with the usual event reports, the appliance can replay the actual event, including pre-encryption data. As an investigative tool, this capability is unsurpassed by any other product feature we’ve seen.
Peter Stephenson, Nov 14 2007 3:38PM Security
Clock speed is only half the story

Clock speed is only half the story

Intel’s Penryn chips are set to usher in changes to desktop, laptop and server designs that reflect new realities in computing, going beyond raw processing speed to address multimedia handling and the specific demands of virtualisation.
Martin Veitch Nov 13 2007 10:10AM Hardware
The end of 'fear factor' marketing nowhere in sight

The end of 'fear factor' marketing nowhere in sight

The screaming headlines have been running for years. Whether they're in press releases about cybercrime exceeding international drug profits or the billions of dollars lost to breach disclosures or videos highlighting the meltdown of power generators due to a myriad of vulnerabilities, the anti-malware industry has long relied on fear to move their products.
Staff Writers Nov 12 2007 3:16PM Security
Review: Tumbleweed MailGate V3.5

Review: Tumbleweed MailGate V3.5

This product is a whole lot more than a data leakage prevention tool. It is an entire email gateway that manages email transiting the enterprise’s perimeter.
Peter Stephenson, Nov 12 2007 1:57PM Security
Review: CA Secure Content Manager

Review: CA Secure Content Manager

The offering from CA is a software-based product that runs on top of Windows Server 2003. This device performs URL filtering, as well as anti-virus and anti-malicious code filter.
Staff Writers Nov 9 2007 12:21PM Security
Why biometric technologies are catching on

Why biometric technologies are catching on

Today's world has an unprecedented need for security. From restricting access to physical resources, such as buildings and facilities, to controlling access to IT resources such as computers and networks.
Staff Writers Nov 7 2007 2:45PM Security
How big media's copyright campaigns threaten Internet free expression

How big media's copyright campaigns threaten Internet free expression

Big media companies' efforts to extend copyright are hurting creators' abilities to find audiences for their work, argues cyber-rights activist Cory Doctorow.
Cory Doctorow Nov 6 2007 7:14AM Telco/ISP
Review: SonicWALL SSL-VPN 4000

Review: SonicWALL SSL-VPN 4000

The SonicWall SSL-VPN 4000 is an appliance-based offering that uses a browser-based client known as NetExtender. The NetExtender client allows all applications to be passed through the SSL-VPN tunnel.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Nov 6 2007 7:09AM Security
Guest column: Mobile advertising – the million dollar question?

Guest column: Mobile advertising – the million dollar question?

One of the first technologies to kick off mobile advertising has been SMS and it is crucial that mobile users view this form of mobile advertising as delivering value.
Boudewijn Pesch Nov 5 2007 4:47PM Strategy
Review: F5 Networks Firepass

Review: F5 Networks Firepass

F5's appliance uses a browser client that installs and runs in a similar way to an IPSEC client, allowing the user access to the entire network or a subset of it once the client is installed.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Nov 5 2007 11:52AM Security
Guest column: Planning for privacy

Guest column: Planning for privacy

Based on his recent tour of Australian capital cities Peter Cullen, Microsoft’s chief privacy strategist, discusses the importance of privacy protection in Australia
Staff Writers Nov 2 2007 1:53PM Security
Review: Tumbleweed Communications Secure Messenger v6.3

Review: Tumbleweed Communications Secure Messenger v6.3

This product incorporates both email encryption and a slimmed down version of a full content security manager.
Peter Stephenson, Nov 2 2007 11:13AM Security
VoIP security for everyone

VoIP security for everyone

Voice over (IP) is a dream concept for companies and organisations all over the world. With voice calls being sent over the internet, money can be saved on long-distance calls and intra-office calls.
Staff Writers Nov 1 2007 2:42PM Security

Log In

  |  Forgot your password?