Corporate Partners

Stories by Ashton Mills

Enterprise password managers

Password management is big business, and with good reason: the weakest link in your network's security is the human component -- the one that can succumb to social engineering, phishing, or inadvertently running the wrong program at the right time (for the keylogging malware, at least). And then there are passwords, the proverbial keys to the kingdom.

Ashton Mills | 04 Dec | Read more

Self-encrypting drives

As data becomes ever more mobile there's an increased risk that it can fall into the wrong hands. And, while there are many technologies to try and prevent this from happening, or tracking a device down if it's lost or stolen, the ultimate solution to data security is preventing it leaving the storage device in the first place.

Ashton Mills | 14 Nov | Read more

Secure web services

If there's one thing the Snowden leaks have shown us, it's that security and privacy are largely an illusion. Yet, it's still possible to make it harder not just for criminals and hackers but also questionable government agencies with the right tools. Unfortunately, one of the key programs we all use to interface with the net is also the one of the primary vectors of attack -- the humble web browser.

Ashton Mills | 21 Jul | Read more

Review: Security firewall distributions

Firewalls underpin the security of any network, controlling the flow of data in and out. Where once they were simple in premise and execution, today they are just one component of a collection of services to monitor, track, limit and sometimes alter data to ensure the security of a network.

Ashton Mills | 20 Feb | Read more

Endpoint Security Products: Part 1

In a sphere that changes as rapidly as security, it's no surprise that 'endpoint' as a definition is fluid. It is so new a sphere in the IT arsenal that not even the players who field endpoint products can agree on where the borders begin and end -- though naturally it encompasses their own core competency.

Ashton Mills | 21 Oct | Read more

WatchGuard XTM 2520

If, as we are often led to believe, colour really is an indication of speed then the WatchGuard XTM 2520 would have to be the fastest hardware firewall solution on the planet. Or at least, in the rack.

Ashton Mills | 28 Aug | Read more

Review: Linux Security Distributions

Where once Linux was relegated to long-bearded gurus sitting atop servers bathed in a the dull glow of fluorescent lighting, today it's much more hip and found in one form or another in most enterprises, even on the desktop, not to mention that it underpins the net as we know it today.

Ashton Mills | 21 Jun | Read more

Review: Mobile Device Management

With the rise of mobile computing -- first via laptops, then smartphones and now tablets -- the IT landscape changed within the enterprise. No more was IT just about the local network, WANs and security for desktops and servers: it now had to incorporate mobile devices, spanning all manner of manufacturers, operating systems, and platforms and to do so without compromising security. The sheer volume of devices and the different software they run is a natural antithesis to network security. Yet, these devices are integral to the way business works today, and so the IT department must adapt.

Ashton Mills | 20 May | Read more

Review: File Recovery Tools

We've previously covered a range of tools to securely delete data, but what if you want to recover data? Perhaps you want to make sure a secure deletion works as intended, or restore data written over on a portable USB, or perhaps you've been tasked with recovering critical business data on the boss’s hard drive before tomorrow's important meeting.

Ashton Mills | 28 Nov | Read more

Review: Secure Flash Drives

USB flash drives are the modern floppy, albeit considerably larger and faster. They make our lives easy for taking data on the road, sharing with colleagues over sneakernet, and given their rapidly increasing size even acting as backup devices. They're also darn handy for installing software from ISO images.

Ashton Mills | 13 Sep | Read more

Learning from Evolve.Cloud

Dave Asprey, VP Cloud Security at Trend Micro, talked at length about the changing landscape of mobile devices and the integration of consumer-based products into the workplace. Inevitably, he said, new consumer technology spreads to the office, where it can become a challenge for IT, particularly in relation to security.

Ashton Mills | 04 May | Read more

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place