Ron Condon

Recent articles by Ron Condon

Wireless policies lag laptop usage

Wireless policies lag laptop usage

A survey of US companies shows that wireless networks have created new holes in security policies.
Oct 6 2005 11:51AM
Phishers Target Swedish Bank

Phishers Target Swedish Bank

A phishing attack has broken new ground by attacking a Scandinavian bank operating a one-time password.
Oct 5 2005 10:54AM
More rigour, less geek, more respect

More rigour, less geek, more respect

In my position, I get to read an awful lot of submitted articles, supposedly from infosec professionals with centuries of experience between them. And I also get along to a lot of conferences where many of the same people share their wisdom with the rest of the world.
Sep 5 2005 5:04PM
Our man in cyberspace

Our man in cyberspace

Against a backdrop of spooks, geeks and hackers, former NSA man Ira Winkler paints a dark picture of the modern hacker to Ron Condon
Sep 5 2005 2:45PM
Legal lessons from across the pond

Legal lessons from across the pond

California might have a reputation for coming up with the world's wackiest ideas, but its legislation for handling data privacy has proved to be a winner.
Jul 29 2005 3:04PM
Noticed that big grey thing over there?

Noticed that big grey thing over there?

The latest Global Security Survey from Deloitte Touche Tohmatsu underlines what many of us had conveniently forgotten – that most of the threats to our systems come from inside the organisation.
Jul 1 2005 4:31PM
Never forget – it’s a people business

Never forget – it’s a people business

Jun 21 2005 12:44PM
Obsession is not a dirty word

Obsession is not a dirty word

Information security manager of the year Tony Ritson talks to Ron Condon about how he made his firm the industry standard
Jun 16 2005 4:01PM
EL AL dumps IDS in bid to stop DoS attacks

EL AL dumps IDS in bid to stop DoS attacks

Israel's airline El Al has replaced all its intrusion detection systems with intrusion prevention appliances - a move it says has cut the threat of worm and denial-of-service attacks.
Jun 9 2005 3:51PM
How to clean up after Sumitomo Mitsui

How to clean up after Sumitomo Mitsui

When the truth finally comes out about the attempted theft of £220 million from Sumitomo Mitsui Bank in March, it's likely to have all the hallmarks of an inside job – certainly that the crime relied on having people on the inside to carry it out.
May 13 2005 5:39PM
How do you measure risk? - Tell SC Magazine

How do you measure risk? - Tell SC Magazine

What's your company's approach to risk? How do you measure it? We'd like to hear from you.
Apr 28 2005 1:18PM
Welcome to your new-look SC Magazine

Welcome to your new-look SC Magazine

We've got a brand-new look in SC Magazine from this month, with a fast-paced new opening section that is designed to give you as complete a picture of what's happening around the world of IT security as you'll find anywhere.
Apr 19 2005 12:58PM
The industry’s identity crisis must be solved

The industry’s identity crisis must be solved

There was definitely a penitent feel to the RSA Conference in San Francisco. Speakers such as Bill Gates, John Thompson of Symantec and Art Coviello of Computer Associates all tacitly admitted that the industry has failed to deliver what users need.
Mar 17 2005 3:08PM
Reluctant hero: How the NISCC came in from the cold

Reluctant hero: How the NISCC came in from the cold

Only the NISCC would launch a public website without telling anyone. Ron Condon meets the man who runs Britain’s IT defence unit
Mar 16 2005 4:21PM
Fly the flag for Britain – in an international way

Fly the flag for Britain – in an international way

Without wishing to wave the Union Jack too vigorously, I couldn't help feeling a slight wave of pride at the achievements of the Jericho Forum, which is celebrating its first year of life.
Feb 22 2005 5:28PM
Instant messaging set to double in next 12 months

Instant messaging set to double in next 12 months

Leading companies in Europe anticipate an explosion in the use of instant messaging over the next year, but admit that the technology can be a security nightmare.
Feb 22 2005 3:07PM
Vendors line up to see Jericho vision

Vendors line up to see Jericho vision

The user forum prepares to unveil its ambitions for the future.
Feb 22 2005 1:05PM
Qualys secures global deal with IBM

Qualys secures global deal with IBM

Vulnerability management company Qualys has been adopted by IBM Global Services as its standard service for tracking and fixing vulnerabilities in its customers' networks.
Feb 17 2005 12:44AM
IM vendors warn of Skype growth

IM vendors warn of Skype growth

The rapid growth in use of the free Skype voice-over-IP service could open up companies to severe security breaches, vendors warned at the RSA Conference.
Feb 16 2005 1:07AM
Zequel bring compliance software to Europe

Zequel bring compliance software to Europe

Florida-based Zequel Technologies has released its compliance and policy management software in the UK, and is seeking partners to help market it to chosen vertical markets.
Feb 10 2005 10:39AM

Log In

Username / Email:
Password:
  |  Forgot your password?