Features

Interview: Hugh Penri-Williams

Interview: Hugh Penri-Williams

The chairman of the Information Security Forum has big plans to take his message to businesses everywhere. Ron Condon reports.
Staff Writers Aug 14 2006 2:44PM Security
Threats: Crime watch

Threats: Crime watch

With so much money being moved online these days, cyber criminals are getting greedy - and smarter. Mark Mayne asks the experts for advice.
Staff Writers Aug 14 2006 2:44PM Security
UTM: A united front

UTM: A united front

A single box that can protect your network from all known evils sounds great, but does the reality live up to the hype? Rob Buckley investigates.
Staff Writers Aug 14 2006 2:44PM Security
Patch management: Hold it together

Patch management: Hold it together

The constant need for patch management is a pain, taking up precious time and resources. Is there a better way? Gary Flood investigates.
Staff Writers Aug 14 2006 2:44PM Security
Recruitment - People on the move - Appointment at Enterasys
Networks

Recruitment - People on the move - Appointment at Enterasys Networks

Leon Woo has been promoted to executive vice-president and chief technology officer at Enterasys Networks.
Staff Writers Aug 14 2006 2:44PM Security
Opinion: Don't be an accidental vandal

Opinion: Don't be an accidental vandal

In 2005, the operator of one of the top-level Network Time Protocol (NTP) time servers in Denmark noticed that a large volume of requests hitting his server were invalid.
Nick Barron, Aug 14 2006 2:44PM Security
Opinion: Protect data from your staff

Opinion: Protect data from your staff

The rise in data security breaches and trade secret piracy over the past year is a wake-up call for executives. And the threat posed internally is just as great as that at the perimeter.
Jason Ashley, Aug 14 2006 2:44PM Security
Opinion: From the CSO's desk - Banks should ask safer questions

Opinion: From the CSO's desk - Banks should ask safer questions

Like most people these days, I change credit cards often to take advantage of zero per-cent interest rates.
Brian Shorten, Aug 14 2006 2:44PM Security
Opinion: Consultant's view - Obfuscating scripts - Not so pure on

Opinion: Consultant's view - Obfuscating scripts - Not so pure on

Some scripting languages can now smuggle attacks past your traditional defences, warns Gunter Ollmann.
Staff Writers Aug 14 2006 2:44PM Security
Letter: IPS still needs firewall

Letter: IPS still needs firewall

I found the feature on intrusion prevention systems in last month's issue ("Intruding on the bottom line", p30 ) very interesting.
Staff Writers Aug 14 2006 2:44PM Security
Letter: Stick to the facts

Letter: Stick to the facts

Paul Simmond's piece ("Only we can save the world wide web", SC July, p21) was unnecessarily alarmist and full of claims left unsubstantiated.
Staff Writers Aug 14 2006 2:44PM Security
Letter: Brighten up the cover

Letter: Brighten up the cover

My colleagues and I were wondering why the cover of SC is always pretty much exactly the same?
Staff Writers Aug 14 2006 2:44PM Security
Opinion: Don't be an accidental vandal

Opinion: Don't be an accidental vandal

In 2005, the operator of one of the top-level Network Time Protocol (NTP) time servers in Denmark noticed that a large volume of requests hitting his server were invalid.
Nick Barron, Aug 14 2006 2:44PM Security
Opinion: Protect data from your staff

Opinion: Protect data from your staff

The rise in data security breaches and trade secret piracy over the past year is a wake-up call for executives. And the threat posed internally is just as great as that at the perimeter.
Jason Ashley, Aug 14 2006 2:44PM Security
Opinion: From the CSO's desk - Banks should ask safer questions

Opinion: From the CSO's desk - Banks should ask safer questions

Like most people these days, I change credit cards often to take advantage of zero per-cent interest rates.
Brian Shorten, Aug 14 2006 2:44PM Security
Opinion: Consultant's view - Obfuscating scripts - Not so pure on

Opinion: Consultant's view - Obfuscating scripts - Not so pure on

Some scripting languages can now smuggle attacks past your traditional defences, warns Gunter Ollmann.
Staff Writers Aug 14 2006 2:44PM Security
DataBank: ThreatStats - Phishing attacks become more targeted as
the number of two-tiered viruses grows

DataBank: ThreatStats - Phishing attacks become more targeted as the number of two-tiered viruses grows

Staff Writers Aug 14 2006 2:44PM Security
Update: Vulnerabilities - An exploit a day turns people away from
Internet Explorer

Update: Vulnerabilities - An exploit a day turns people away from Internet Explorer

31 - H D Moore, the man behind the Metasploit toolkit, an open-source tool for developing, testing and using exploit code, published a bug-a-day log for the month of July. All the bugs have been found in Microsoft's Internet Explorer browser. Moore said in his blog that he decided to embark on this mission "to create awareness about the types of bugs that plague modern browsers and to demonstrate the techniques used to discover them".
Staff Writers Aug 14 2006 2:44PM Security
Update: Threat of the month - Drive-by malware

Update: Threat of the month - Drive-by malware

What is it?
Staff Writers Aug 14 2006 2:44PM Security
Update: Criminals increasingly using SQL code

Update: Criminals increasingly using SQL code

Criminals are increasingly using structured query language (SQL) code to obtain the personal information of consumers through databases, internet monitoring vendor SecureWorks has warned.
Staff Writers Aug 14 2006 2:44PM Security

Log In

  |  Forgot your password?