part

Review: Disk Protect

Review: Disk Protect

Disk Protect from Becrypt is a competent hard disk encryption that looks very good on paper.
Oct 3 2005 12:00AM
Review: DiskCrypt

Review: DiskCrypt

DiskCrypt from Digisafe is unique among these products. Rather than being a software product that you use to encrypt your hard disk, DiskCrypt is a hard disk that comes pre-encrypted.
Oct 3 2005 12:00AM
Review: Encryption Plus Hard Disk

Review: Encryption Plus Hard Disk

This had the most promise of all the products tested. It is easy to install, has lots of nice administrative options and is robust and well-certified.
Oct 3 2005 12:00AM
Review: OfficeLock

Review: OfficeLock

This is not a disk encryptor like most of the products on test, because it encrypts individual document files transparently. Indeed, it was designed and intended completely for enterprise use, and requires an external copy of Microsoft SQLServer in order to install.
Oct 3 2005 12:00AM
Mobile encryption, part II (2005)

Mobile encryption, part II (2005)

If it’s tough to protect your network within the corporate environment, it’s even harder when your staff want to use their laptops outside. Peter Stephenson looks at products that claim to keep them secure
Oct 3 2005 12:00AM
We must all play our part

We must all play our part

Aug 26 2005 2:25PM
Make mobility a part of your strategy

Make mobility a part of your strategy

Jun 21 2005 10:48AM
Failure must be a part of the plan

Failure must be a part of the plan

The trick is to acknowledge the danger and plan for the inevitable, as former White House advisor Richard Clarke tells Illena Armstrong
May 12 2005 5:26PM
Anti-spam, part II (2004)

Anti-spam, part II (2004)

It is possible that the amount of spam is decreasing but anti-spam technology is far from being obsolete. Jon Tullett provides you with essential reviews
Jul 1 2004 12:00AM
HP Aust pledges to replace faulty notebook part

HP Aust pledges to replace faulty notebook part

HP has announced a voluntary replacement program for customers who may have been affected by a design flaw in certain notebook memory modules.
Jun 28 2004 12:00AM
Ex-hacker: the unspoken, dirty little secret - part 1

Ex-hacker: the unspoken, dirty little secret - part 1

I rarely make a bet, but if you asked me if I'd bet my bottom dollar on a firm employing a hacker to assess their security risk, I'd only accept on the basis that they would not. Hiring a hacker to assess the security risk of an organisation is something that fewer than 64 per cent of ISO's are willing to consider. That's hardly surprising when the risks are analysed alongside the statistics; viruses and hackers cost businesses worldwide somewhere in the region of $1.5 trillion. That said, organisations that are unwilling to hire a hacker face one increasing problem; hiring a hacker is not always a conscious decision.
Jun 21 2004 4:03PM
Anti-spam, part I (2004)

Anti-spam, part I (2004)

If your company is not using an anti-spam product yet, what are you waiting for? Jon Tullett and René Millman review some of the new products on offer
Jun 1 2004 12:00AM
Managing Information Security in Modern Commercial Environments, Part 2 – A Pro-Active Approach

Managing Information Security in Modern Commercial Environments, Part 2 – A Pro-Active Approach

In the first article of this series, we identified and provided examples of the types of issues that need to be resolved if organisations are to correctly manage risk in the area of information security. If we combine the impact of these trends and issues with the fact that most enterprises are being forced to cut costs in order to remain competitive the true magnitude of the problem becomes apparent. Simply put, information security managers have to secure more complex environments, faster and using less resources.
May 24 2004 5:37PM
Patching policies must be part of everyday practice

Patching policies must be part of everyday practice

Sarah Merrion finds that patch management requires a global, organized effort that is hardly child’s play
Apr 15 2004 10:12AM
Task force: Infosec must be part of corporate governance

Task force: Infosec must be part of corporate governance

A task force of the National Cyber Security Partnership (NCSP) Monday released its recommendations for organizations to incorporate cybersecurity into their corporate governance systems.
Apr 12 2004 9:12PM
Vodafone wins part appeal against $14m Mobile Innovations ruling

Vodafone wins part appeal against $14m Mobile Innovations ruling

Vodafone has won a substantial portion of its appeal against the Supreme Court’s award of $14 million plus costs and damages to reseller Mobile Innovations.
Feb 23 2004 12:00AM
Keeping Secrets (Part 1)

Keeping Secrets (Part 1)

Last October, many of us were shocked to read in newspapers that Procter & Gamble, a leading Fortune 500 firm, settled a dispute with European based Unilever over accusations of blatant corporate espionage - better known as economic warfare.
Jan 19 2004 10:54AM
Keeping Secrets (Part 2)

Keeping Secrets (Part 2)

In the first part of this article (http://www.infosecnews.com/opinion/2002/01/30_03.htm), we identified the potential threats that aim to put your company in financial ruin and discussed who are the likely terrorists in economic warfare.
Jan 19 2004 10:10AM
Security Tools within the Common Criteria Framework: Part 2

Security Tools within the Common Criteria Framework: Part 2

This is the second part of a two-part article. The first part discussed security tools used to protect data integrity and the related business processes within an organization: (www.scmagazine.com/scmagazine/sc-online/2002/article/48/article.html).
Jan 15 2004 9:56AM
The Best Free (and Cheap) Security Software Part 1: Hashes and Encryption

The Best Free (and Cheap) Security Software Part 1: Hashes and Encryption

This is the first article in a series that will look at some of the best free (and cheap) security software.
Jan 14 2004 4:38PM

Log In

Email:
Password:
  |  Forgot your password?