policy

Australia’s communications industry agrees on broadband policy principles

Australia’s communications industry agrees on broadband policy principles

Australia’s communications industry has agreed on a series of “fundamental principles” that should be the basis for development of policy governing the broadband environment.

a Staff Writer Feb 26 2008 3:37PM Telco/ISP
Poll split shows challenge of maintaining company security policy

Poll split shows challenge of maintaining company security policy

A new poll split highlights the challenge of sustaining company policy that meets the evolving threat landscape.
Fiona Raisbeck Sep 28 2007 10:06AM Security
Poor company policy aids identity theft

Poor company policy aids identity theft

Many businesses are still in the dark ages when it comes to making sure customers are who they say they are, reveals a new report by risk management experts Experian.
Staff Writers Aug 14 2007 5:05PM Security
Workers at risk from ignorance of IT policy

Workers at risk from ignorance of IT policy

Professionals are risking their reputations without understanding the documents they are agreeing to, according to a study released today.
Clement James Jul 31 2007 9:16AM Training & Development
Synetek documents email policy

Synetek documents email policy

Aussie on-demand business applications vendor for the SME market, Synetek Systems has made available a Corporate Email Policy Document for businesses.
Staff Writers Jul 23 2007 2:13PM Security
Google steps up public policy push

Google steps up public policy push

USA - New blog seeks to advance legal and social agenda.
Shaun Nichols Jun 20 2007 1:00PM Software
Review: Solsoft Policy Server

Review: Solsoft Policy Server

Solsoft Policy Server is a program I wish I had had when I was performing daily firewall, router and VPN installs.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 26 2007 12:00AM Security
InfoSec 2007: Company-wide support needed for successful security policy

InfoSec 2007: Company-wide support needed for successful security policy

Developing a comprehensive information security policy will result in a more secure network but it first requires sound planning, company-wide support and time and effort, one IT security leader said today.
Dan Kaplan Mar 20 2007 1:59AM Security
Product section: SC Lab takes a look at email content filtering, policy management products

Product section: SC Lab takes a look at email content filtering, policy management products

The theme in the labs this month was policy, policy and more policy. Lab manager Mike Stephenson looked at email content filtering, which depends on policies for its success, while reviewer Justin Peltier evaluated policy management products. In these two areas, policy determines success, but the two views are quite different.
Peter Stephenson,CeRNS, Mar 14 2007 7:17PM Security
Review: McAfee Hercules Policy Auditor

Review: McAfee Hercules Policy Auditor

The Hercules Policy Auditor and Remediation Manager were formerly known as Citadel Hercules. These products have one very unique feature in that they can process the output from popular vulnerability scanners.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Mar 13 2007 12:00AM Security
Implementing compliance through privacy policy

Implementing compliance through privacy policy

The internet age has revolutionised how organisations communicate, publish and find information. While this technology has created new opportunities for global communication and commerce, it has also created new challenges in risk management.
Kurt Mueffelmann, Jan 17 2007 11:22PM Security
Review: Solsoft Policy Server 7

Review: Solsoft Policy Server 7

Within any sizeable network, the issues around maintaining known configurations from a security perspective can become problematic. Similarly, maintaining a compliant infrastructure, together with its attendant processes, can represent quite a challenge. Add to this the requirements for change control, access control and other factors, and one can readily appreciate that this challenge can become significant in terms of both resource and cost.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 11 2006 12:00AM Security
Review: ID-Certify

Review: ID-Certify

We now find ourselves in a world of regulatory compliance. It didn't use to be that way, but it is a fact of life we cannot ignore. In a sense, it is good for us who administer and manage IT systems as it forces us to adopt responsible practices, especially around access control.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 11 2006 12:00AM Security
Marshal: Corporate America needs webmail policy, enforcement

Marshal: Corporate America needs webmail policy, enforcement

Nearly half of corporate employees say they are not limited by company policy from accessing their personal webmail accounts at work, according to a recent survey.
Frank Washkuch Oct 26 2006 9:15PM Security
Review: Lockdown Enforcer

Review: Lockdown Enforcer

There are many approaches one could take to securing the network, with equally many tools available for each aspect of security. However, if undertaken on a blow-by-blow basis, one can unwittingly construct quite a complex arrangement of tools and service, which, in turn, brings complexity to the administration and support of the task itself.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 1 2006 12:00AM Security
Review: Security Center Lite

Review: Security Center Lite

There are many approaches to vulnerability scanning and intrusion detection, depending upon the scale of your enterprise and the lengths to which you wish to go. Security Center Lite offers a relatively low-cost introduction to such tasks for infrastructures with up to 100 network nodes. For larger organisations, Security Center Pro can support an unlimited number of network nodes.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 1 2006 12:00AM Security
Review: Centrify DirectControl

Review: Centrify DirectControl

Centrify is a fairly young company, founded in 2004, but the problem its products seek to address goes back further than this. It is the perennial issue of providing an integrated and centralised approach to access control across disparate platforms, such as Windows, Unix, Linux and Mac. The issue is heightened by regulatory compliance obligations and associated audit requirements. Organisations with a large, mixed infrastructure can find themselves with a heavy workload in order to meet requirements in this context.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 1 2006 12:00AM Security
Review: Global Command Center

Review: Global Command Center

The Global Command Center (GCC) from Secure Computing is a serious tool that will appeal to those with a large or complex network to administer and who seek a fine level of configuration and control.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 1 2006 12:00AM Security
Review: AirMagnet Enterprise

Review: AirMagnet Enterprise

AirMagnet is unusual in that it specialises in protecting wireless LANs, a very pertinent capability given the proliferation of wireless devices in the enterprise and the security headaches this can bring. The company's approach is also quite novel in that specialist hardware-based sensors are deployed and networked back to a software-based management server.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Oct 1 2006 12:00AM Security
Missing laptop, missing policy

Missing laptop, missing policy

A dedicated federal civil servant took work home. Unfortunately, the federal agency he worked for had not taken easy steps to make that practice safe and secure. Thus, when a neighborhood gang of thieves broke into his house and stole the laptop, identity information about millions of veterans and members of the armed forces was potentially compromised. It was a typical Washington story, typical because no one suggested doing anything to solve the real problem revealed by the incident. It reminded me of the two giant paintings in the piazza in Sienna, Italy. One image is of dysfunctional Bad Government, the other of progressive Good Government.
Richard Clarke Aug 7 2006 8:00PM Security

Log In

  |  Forgot your password?