Features

Review: Interceptor 1000

Review: Interceptor 1000

The Reflex Interceptor 1000 is an IPS with a twist. This appliance not only has a highly capable IPS with protection for such vectors as intrusions, malicious content, DoS, and anomalies, but it also can be equipped with gateway virus protection and many other features.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Sep 17 2007 12:00AM Security
<i>Italian Job:</i> The launch of a new attack

Italian Job: The launch of a new attack

The 'Italian Job' attack was the first large scale use of a Web-based attack, and it was duplicated only a few days later.
Staff Writers Sep 13 2007 5:06PM Security
Review: Fortify Source Code Analysis

Review: Fortify Source Code Analysis

The Fortify offering is a software-based solution which is also a CASE (computer aided software engineering) utility. Any source code can be reviewed with the Source Code Analysis (SCA) suite.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Sep 13 2007 4:44PM Security
Review: AppDetectivePro

Review: AppDetectivePro

AppDetectivePro primarily looks for security holes inside of a number of popular database servers. The user interface makes it easy to determine which steps of the scan should be performed next.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Sep 13 2007 4:43PM Security
JavaScript hijacking - a new vulnerability

JavaScript hijacking - a new vulnerability

A new vulnerability, termed JavaScript hijacking, was recently identified that specifically affects the rich, interactive interfaces typically associated with Ajax and Web 2.0 applications.
Jacob West, Sep 13 2007 7:19AM Security
How the IT department can prep for the courtroom

How the IT department can prep for the courtroom

There has been a steady increase in corporate litigation over the past decade, and those legal proceedings are having an unforeseen impact on IT managers. This trend has been accelerated by the recent changes in the Federal Rules of Civil Procedure (FRCP).
Greg Lawn, Sep 12 2007 3:39PM Security
Hot or not: The Forum of Incident Response and Security Teams (FIRST) unveils updated common vulnerability scoring system

Hot or not: The Forum of Incident Response and Security Teams (FIRST) unveils updated common vulnerability scoring system

The new scoring system promises to make it easier for security managers and the IT industry to better measure the real-world risks associated with software flaws.
Amol Sarwate, Sep 11 2007 3:03PM Security
Weighing the options for securing back-up data

Weighing the options for securing back-up data

With the looming threats of publicly exposed personal data breaches, mishandled confidential partner information and lost intellectual property assets, an increasing number of enterprises are investigating options for securing data stored on both tape- and disk-based media.
Greg Farris, Sep 10 2007 3:03PM Security
How many errors are OK?

How many errors are OK?

Intel's latest processor has triggered a debate about the reliability of hardware. Where do you stand?
Nick Barron, Sep 4 2007 1:07PM Security
Network administrator: Between a rock and a hard place

Network administrator: Between a rock and a hard place

As a Network or Systems Administrator, you must feel lately that you're between a rock and a hard place.
Staff Writers Sep 3 2007 7:33AM Security
Let’s recognise the value of lifetime skills

Let’s recognise the value of lifetime skills

It doesn't make sense to have technology experts driving taxis.
Sheryle Moon Sep 1 2007 4:40PM Training & Development
Corporations must protect data wherever it goes

Corporations must protect data wherever it goes

When it comes to data security, enterprises have historically taken a "stop them at the gates" approach, similar to the purchase of a home security system.
Cliff Pollan, Aug 31 2007 10:43AM Security
A lesson from the PCI

A lesson from the PCI

A benchmark that provides a checklist to tell you if your security meets requirements is just what we need.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Aug 30 2007 1:57PM Security
Global trends point to rise in messaging abuse

Global trends point to rise in messaging abuse

"It's the economy, stupid." It worked for spammers now, and it will work for spammers in the future.
Dave Champine, Aug 29 2007 11:06AM Security
Market your security competencies

Market your security competencies

Historically, IT security has been a business cost centre.
Jay Barbour, Aug 28 2007 9:21AM Security
Review: AppDetective

Review: AppDetective

AppDetective primarily looks for security holes inside of a number of popular database servers. The user interface makes it easy to determine which steps of the scan should be performed next.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Aug 27 2007 1:57PM Security
Anatomy of a data breach from the inside out

Anatomy of a data breach from the inside out

It's a sunny day somewhere thousands of miles away from your data centre. A savvy hacker sits in front of his monitor.
Prat Moghe, Aug 22 2007 7:53AM Security
Copiers are also a compliance issue

Copiers are also a compliance issue

To properly discuss security issues related to multi-function peripheral (MFPs) - devices that copy, print, scan and fax - it's helpful to first have some background on the underlying technology in the machines that have raised so much concern as a possible data security risk.
Chris Bilello, Aug 21 2007 9:18AM Security
Review: Source Code Analysis Suite

Review: Source Code Analysis Suite

The Fortify offering is a software-based solution which is also a CASE (computer aided software engineering) utility.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Aug 20 2007 8:00AM Security
Managing outbound email security threats

Managing outbound email security threats

When the subject of email security is mentioned, the first thought that comes to mind is "spam" or more appropriately "anti-spam."
Carsten Dietrich, Aug 17 2007 11:17AM Security

Log In

  |  Forgot your password?