Features

Review: Secure Computing Corporation Sidewinder 7.0

Review: Secure Computing Corporation Sidewinder 7.0

The device from Secure Computing is an appliance-based offering that runs on a 1U rack mounted device. The Sidewinder provides two Ethernet interfaces, which can be separately addressed and configured.
Justin Peltier Nov 29 2007 3:39PM Security
Petascale computers: the next supercomputing wave

Petascale computers: the next supercomputing wave

The author of the world's first published collection on petascale techniques, David A. Bader, discusses petascale, exascale and the future of computing.
Liz Tay Nov 29 2007 11:18AM Hardware
Can Naked DSL force Telstra to loosen its belt?

Can Naked DSL force Telstra to loosen its belt?

With ISPs now able to strip away line rental and offer Naked DSL, should Telstra be worried?
Mitchell Bingemann Nov 29 2007 7:29AM Telco/ISP
Social networks: To ban or not to ban?

Social networks: To ban or not to ban?

IT security teams across the globe must be getting used to requests to ban employee access to certain websites.
Staff Writers Nov 28 2007 3:52PM Security
Review: Code Green Networks Content Inspection Appliance

Review: Code Green Networks Content Inspection Appliance

Code Green Networks CI-1500 Content Inspection Appliance, v4 is a good middle of the road extrusion detection appliance.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Nov 27 2007 4:01PM Security
Hotel room security: Service not included

Hotel room security: Service not included

From keycards to mini bars, modern technology has equipped hotel rooms with multiple vulnerabilities. One of our consultants had his personal laptop stolen from a locked hotel room recently. There was no evidence of a forced entry, suggesting an inside job.
Ken Munro Nov 27 2007 3:35PM Security
Review: SonicWALL PRO 4100

Review: SonicWALL PRO 4100

The solution from SonicWALL is an appliance-based offering which runs on a 1U rack mounted device. The PRO 4100 provides 10 Ethernet gigabit interfaces, which can be separately addressed and configured.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Nov 26 2007 2:02PM Security
Interview: Adrian Chamberlain and Jos White

Interview: Adrian Chamberlain and Jos White

MessageLab's CEO and co-founder are determined to get a bigger slice of the American pie. Paul Fisher meets two men on a mission.
Paul Fisher Nov 26 2007 12:30PM Security
Torvalds on where Linux is headed in 2008

Torvalds on where Linux is headed in 2008

The creator of Linux is excited about solid-state drives, expects progress in graphics and wireless networking, and says the operating system is strong in virtualisation despite his personal lack of interest in the area.
Charles Babcock Nov 26 2007 11:54AM Software
Review: Tablus Content Alarm NW, v5.0

Review: Tablus Content Alarm NW, v5.0

Tablus Content Alarm is a network-based tool that inspects data as it passes, and then performs appropriate actions in accordance with policies.
Peter Stephenson, Nov 23 2007 3:10PM Security
iPhone: Too high a price to pay?

iPhone: Too high a price to pay?

The arrival of the iPhone could signal the beginning of the end for consumer choice. Now that the marketing blitz and customer hype about the Apple iPhone are reverting back to more realistic levels there comes some not entirely unexpected news...
Tim Mather Nov 22 2007 10:36AM Security
Review: Intelligent Wave CWAT, v3.1a

Review: Intelligent Wave CWAT, v3.1a

CWAT (cybercrime, warning, alert, termination, pronounced see-wat) is an extremely comprehensive insider threat management system. It is equally complicated to install and understand.
Peter Stephenson, Nov 22 2007 10:29AM Security
Six steps to securing next gen communications

Six steps to securing next gen communications

The newest generation of employees connects with friends on Facebook and shares YouTube videos on lunch breaks or throughout the working day.
Staff Writers Nov 22 2007 8:44AM Security
Guest column: How data integration can help make e-voting a reality

Guest column: How data integration can help make e-voting a reality

Electronic voting, or e-voting, has been growing in prominence in recent times and for good reason.
Laurie Newman Nov 21 2007 3:58PM Software
Weathering the storm

Weathering the storm

Life keeps getting more difficult for information security researchers - and it's not all down to the bad guys.
Staff Writers Nov 21 2007 3:00PM Security
Interview: Betfair's 29 year-old global head of security, Adrian Asher

Interview: Betfair's 29 year-old global head of security, Adrian Asher

Betfair's global head of security seems to have it all: bosses who listen, resources most of us can only dream of, and youth.
Paul Fisher Nov 20 2007 11:21AM Security
Kill deleted data for good

Kill deleted data for good

We spend a lot of time trying to secure mobile devices, but what about the removable storage cards they contain?
Ken Munro Nov 19 2007 3:16PM Security
Microsoft's Bill Hilf reveals its open source strategy

Microsoft's Bill Hilf reveals its open source strategy

Bill Hilf, the man in charge of Microsoft's strategy for living in harmony with Linux lays out the company's opportunities with open source and the open source business model.
J. Nicholas Nov 19 2007 7:37AM Software
Are VoIP systems prepared for attacks?

Are VoIP systems prepared for attacks?

The W/32 Skipi.A worm that nagged Skype users in early September was fairly routine by malware standards. It arrived pretending to be a message from another user, offered erotic pictures, infected machines via malicious links, stole information and moved on to other PCs.
Frank Washkush Jr Nov 16 2007 3:31PM Security
Review: Oakley Networks SureView, v5.0

Review: Oakley Networks SureView, v5.0

Oakley Networks SureView appliance offers very complete extrusion prevention with a twist. Along with the usual event reports, the appliance can replay the actual event, including pre-encryption data. As an investigative tool, this capability is unsurpassed by any other product feature we’ve seen.
Peter Stephenson, Nov 14 2007 3:38PM Security

Log In

  |  Forgot your password?