Spotlight on Cyber Security Spotlight on Cyber Security

Most infosec leaders agree that traditional security methods, on their own, are no longer enough to combat advanced new threats. But what new techniques and strategies are they using? What lessons have they learnt from breaches?

iTnews will provide some answers to these questions in our Spotlight on Cyber Security, coinciding with the Australian Information Security Association’s national conference on 10-12 October.

IT security pros lack self worth

IT security pros lack self worth

Information security professionals do not realise how important they are and the effect email downtime can have on business, a survey has revealed.
David Quainton May 19 2005 9:39AM Security
Lax wireless security at federal agencies

Lax wireless security at federal agencies

Federal agencies have not secured their wireless networks, despite well-known risks associated with WLANs, according to a report by the Government Accountability Office.
Marcia Savage May 18 2005 5:19PM Security
Infosec: no longer just the IT department’s concern

Infosec: no longer just the IT department’s concern

In today’s ever increasing security conscious market, it is no longer sufficient simply to delegate the information security of an organization to the network administration staff.
John Golden May 18 2005 10:50AM Security
SonicWall signs Ingram Micro

SonicWall signs Ingram Micro

Broad-based distributor Ingram Micro has signed up security vendor SonicWall in a a national distribution and marketing agreement.
Staff Writers May 16 2005 11:15AM Security
IT pros grapple with security apps

IT pros grapple with security apps

In a worldwide survey of 1361 technology managers, more than half of respondents reported to have at least four applications to address security problems.
Staff Writers May 13 2005 11:09AM Security
Mozilla releases Firefox security update

Mozilla releases Firefox security update

The Mozilla Foundation has released a security update for Firefox that fixes critical vulnerabilities reported earlier this week in the open-source browser.
Marcia Savage May 12 2005 10:11PM Security
3G dream a security nightmare

3G dream a security nightmare

Smart mobile technology is rapidly gaining in popularity – and hackers and crackers are among its biggest fans! Very few consumers know about the vulnerabilities of 3G technology, and only now is the industry waking up to the potential security nightmare.
Hamid Jahankhani May 11 2005 2:07PM Security
Review: Astaro Security Linux

Review: Astaro Security Linux

Astaro's Security Linux 5.1 takes the open source Linux software and hardens it, but also adds commercial software for a complete security package. It comes with six components: firewall, VPN, anti-virus (provided by Kaspersky), content filtering, anti-spam and intrusion prevention.

Christopher Moody May 11 2005 12:00AM Security
Review: Symantec Gateway Security 5460

Review: Symantec Gateway Security 5460

Symantec's Gateway Security 5460 is the largest, and one of the most powerful, appliances that we have had on test. It has eight Gigabit Ethernet ports, which can be configured to segregate a network or for high availability. The firewall can also be configured to load balance between a cluster, improving performance provided you have the correct license.

Christopher Moody May 11 2005 12:00AM Security
Novell acquires Linux security firm

Novell acquires Linux security firm

Aiming to broaden its enterprise security offerings, Novell has acquired Immunix, a supplier of host-based application security for Linux.
Marcia Savage May 10 2005 5:11PM Security
Review: Red-Alert PRO and Red Detect

Review: Red-Alert PRO and Red Detect

Red-M's Red-Alert Pro is a wireless intrusion detection probe that senses 802.11 a, b, g, and even Bluetooth activity simultaneously. It logs security threats and feeds the details to a Red Detect server if run in managed mode, or stores it if run standalone. Red-Alert Pro keeps track of connections between known and unknown devices, making an alert whenever a new unknown device is present and informing you of which device(s) the unknown entity is communicating with. If run in standalone mode, the security logs can be accessed via a convenient and intuitive web interface. If run in managed mode, the Red Detect server handles the logs.

Peter Stephenson,CeRNS, May 10 2005 12:00AM Security
Review: RFprotect

Review: RFprotect

This is a flexible, robust, very scalable and multi-purpose wireless security solution. It provides rogue detection, troubleshooting, vulnerability assessment, intrusion detection, performance management and usage accounting. It has a standard Windows GUI with an open source Firebird database that includes a secure, password-protected interface, and can be easily configured both for a small business or a large enterprise.

Peter Stephenson,CeRNS, May 10 2005 12:00AM Security
Review: Wireless Site Management

Review: Wireless Site Management

Computer Associates' Wireless Site Management 4.0 is a fully featured WLAN security and management suite. The software is mainly aimed at larger organizations, but it could be implemented for any company running a wireless network.

Peter Stephenson,CeRNS, May 10 2005 12:00AM Security
IT managers spending more time on security

IT managers spending more time on security

A survey released Monday by security vendor Secure Computing showed that IT managers are spending more hours on security and are more worried about spyware than spam.
Marcia Savage May 9 2005 7:07PM Security
RSA Security rejigs channel program

RSA Security rejigs channel program

Nasdaq-listed vendor RSA Security has refurbished and relaunched its channel partner program with what it claims are improved financial rewards and tools for its resellers.
Fleur Doidge May 9 2005 3:20PM Security
Review: AirDefense Enterprise

Review: AirDefense Enterprise

AirDefense Enterprise is one of those wireless-security products that integrates into the enterprise as an integral part of the overall network management scheme.

Peter Stephenson,CeRNS, May 9 2005 12:00AM Security
Review: BlueSecure

Review: BlueSecure

BlueSecure from Bluesocket is a leader in its field. Why? Because while most wireless security products are not able to detect anyone walking up with a wireless capable computer and connecting to their network, BlueSecure detects computers, access points, or any other type of wireless connection device.

Peter Stephenson,CeRNS, May 9 2005 12:00AM Security
Review: OmniPeek

Review: OmniPeek

This complete software offering can be installed on almost any system in the organization to capture data from the system's internal wireless card. But check the compatibility chart before ordering, as only a specific set of wireless cards are supported.

Peter Stephenson,CeRNS, May 9 2005 12:00AM Security
Wireless security (2005)

Wireless security (2005)

Rogue access points can blow your organization's security apart, but there are products out there that will not only find them out, but also offer integrated wireless management, says Peter Stephenson
Staff Writers May 9 2005 12:00AM Security
Industry group releases endpoint security architecture

Industry group releases endpoint security architecture

The Trusted Computing Group, an industry standards body, this week detailed its architecture for ensuring endpoint security and released two interfaces for developers to make products based on the open standard.
Marcia Savage May 5 2005 7:45PM Security

Log In

  |  Forgot your password?