Features

Roundup 2007: The year's top fives

Roundup 2007: The year's top fives

TOP 5 CYBERATTACKS:

1. The Storm Worm
What began as an email-spawned trojan attack using fake news stories to lure victims became the most widespread cyber-assault in recent memory. Still replicating, and exploiting a number of patched vulnerabilities, the botnet-fueled, socially engineered attack may make next year's list as well.
Staff Writers Dec 21 2007 11:43AM Security
The SC interview online: Eva Chen

The SC interview online: Eva Chen

Co-founder and CEO of Trend Micro, Eva Chen discusses a wide range of subjects touched on financials, industry moves and trends, and the opportunities provided by the emerging markets of India and China.
Paul Fisher Dec 21 2007 10:42AM Security
Review: Industry innovators 2007: PGP Encryption

Review: Industry innovators 2007: PGP Encryption

In discussing innovation with people from PGP, we made a very interesting discovery. What we classically think of as PGP encryption actually is only a small part of the view that the company has of the product line and the mission of the company.
Peter Stephenson, Dec 20 2007 3:06PM Security
Guest column: Are you getting what you’re paying for? Making the most out of your investment in development

Guest column: Are you getting what you’re paying for? Making the most out of your investment in development

You’re paying your application developers to write code. But are they doing what you’re paying them to do?
Eldad Maniv Dec 20 2007 11:02AM Software
Eight New Year's security resolutions for 2008

Eight New Year's security resolutions for 2008

2008 will usher in more security issues whose challenges can only be met by an array of security solutions. Now is the time to start thinking about your 2008 New Year's security resolutions.
Kevin Prince CSO, Perimeter eSecurity Dec 19 2007 4:11PM Security
A disservice to security?

A disservice to security?

Software as a service may seem good news for users, but it could also be an open invitation for attackers.
Ian Castle Dec 18 2007 2:30PM Security
Review: Stonesoft StoneGate FW-5000

Review: Stonesoft StoneGate FW-5000

Stonesoft offers a variety of firewall platforms designed to meet the needs of various sized organisations.
Justin Peltier Dec 18 2007 11:12AM Security
The eight myths of data encryption

The eight myths of data encryption

How misconceptions about data encryption are preventing A/NZ companies from effectively protecting data exchanged with employees, partners and suppliers.

Simon Coffey Dec 17 2007 11:44AM Security
Review: PureFile V3.1.3

Review: PureFile V3.1.3

This product is not, in the strictest sense of the term, an extrusion detection product. Rather, it is an audit/ inspection tool that finds information hidden in files.
Peter Stephenson, Dec 13 2007 10:59AM Security
Roundup 2007: Gazing into the crystal ball

Roundup 2007: Gazing into the crystal ball

SC US handed out crystal balls to several analysts, consultants, professors and CSOs and asked them to answer questions about next year.
Dan Kaplan Dec 11 2007 3:04PM Security
Review: Code Green CI Appliance 1500

Review: Code Green CI Appliance 1500

External threats to network security have always grabbed the headlines, but it's a well-known fact that the biggest dangers are likely to come from inside your perimeter.
Peter Stephenson, Dec 10 2007 1:33PM Security
The breakdown in network security design

The breakdown in network security design

The widespread dissemination of information and processing power has created a constantly evolving security dilemma: how to create and provide access to secure networks.
Ken Salchow Dec 7 2007 12:08PM Security
PCI compliance: The driving force towards better network security

PCI compliance: The driving force towards better network security

The Payment Card Industry (PCI) Data Security Standard is unique compared to other security standards, as PCI provides strong guidance as to how merchants can actually comply with its requirements.
Dave Anderson Dec 6 2007 3:04PM Security
Review: Nowell Group SpyForce-Al, v2.0

Review: Nowell Group SpyForce-Al, v2.0

This is, certainly, the most unusual product in this group. SpyForce-AI is touted as “...a counter-espionage security software system that defeats the Insider Security Threat.”
Peter Stephenson, Dec 6 2007 3:02PM Security
Review: ZyXEL ZyWALL USG 300

Review: ZyXEL ZyWALL USG 300

The offering from ZyXEL is an appliance-based offering that runs on a 1U rack mounted device.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 5 2007 4:00PM Security
Review: Bioscrypt VeriSoft v2.0

Review: Bioscrypt VeriSoft v2.0

Strong biometrics and integration of other authentication methods is the focus of VeriSoft.
Peter Stephenson, Dec 4 2007 12:25PM Security
Review: BigFix DLP 1.1

Review: BigFix DLP 1.1

BigFix DLP (data leak prevention) is a full-featured part of the BigFix product suite. It is unique among many of the products in this market in that it does everything at the endpoint (desktop).
Peter Stephenson, Dec 3 2007 4:05PM Security
Virtualisation - savings not without threats

Virtualisation - savings not without threats

Karl Hart doesn't need to read articles or watch the evening news to know that financially motivated hackers nowadays are finding easy pickings at colleges and universities across the country.
Dan Kaplan Dec 3 2007 3:01PM Security
Review: McAfee Data Loss Prevention Appliance

Review: McAfee Data Loss Prevention Appliance

This set of products is used with the McAfee ePolicy Orchestrator, which must be installed before you can install extrusion prevention.
Peter Stephenson, Nov 30 2007 3:10PM Security
I search therefore I am ..

I search therefore I am ..

Yet another politician has suggested that blocking the web can save us from terrorists. If only life was that simple.
Nick Barron Nov 29 2007 3:46PM Security

Log In

  |  Forgot your password?