Features

It’s time to restrict user rights

It’s time to restrict user rights

Most of the best ideas in IT security – indeed, security in general – have been around for a long time. One that is all too often forgotten is the concept of “least privilege”, or using the bare minimum level of access to get the job done.

Nick Barron Jun 14 2006 5:22PM Security
Smartcard technology just the start

Smartcard technology just the start

Staff Writers Jun 12 2006 5:09PM Security
The wolf in Granny’s bed

The wolf in Granny’s bed

The latest concern is custom malware that targets internal desktops, writes Gunter Ollmann
Gunter Ollmann Jun 12 2006 4:31PM Security
Simon Janes

Simon Janes

The former head of the UK’s Computer Crime Unit tells Ron Condon why it’s time someone helped smaller companies protect themselves
Ron Condon Jun 12 2006 3:47PM Security
Living without wires

Living without wires

Is WPA really the answer to the problem of insecure corporate wireless networks? Maybe, but as Rob Buckley discovers, it's not that simple
Rob Buckley Jun 12 2006 12:26PM Security
Make your people aware

Make your people aware

Properly planned and executed staff education makes employees more responsible and reaps tangible business benefits. Paul Hansford reports
Staff Writers Jun 12 2006 11:50AM Security
Cover story: Hard to decipher

Cover story: Hard to decipher

The break-neck speed and frequency with which corporate data breaches are happening these days has most enterprise executives racing to avoid becoming the next headline.
Ericka Chickowski Jun 6 2006 8:13PM Security
The switch is on

The switch is on

Tarron Weir and Joseph Raquel might well be "poster boys" for the Secure Sockets Layer (SSL) virtual private network (VPN) movement. In fact, their experience with the latest in secure remote-access technology more or less epitomizes what’s going on in the VPN marketplace right now.
Jim Carr Jun 6 2006 8:05PM Security
Back to school

Back to school

The message is clear for employees at the 19 Exchange Bank branches scattered across Sonoma County in California: Protect valuable customer information or risk damaging the financial institution’s good name.
Dan Kaplan Jun 6 2006 7:58PM Security
Remote control wars

Remote control wars

Monitoring an illicit Internet Relay Chat (IRC) channel recently, Nicholas Albright couldn’t believe what he was seeing. First, he observed a network operator sending commands to install keyloggers on thousands of compromised, remote-controlled computers. Then, all this private data started flying over the channel — HIPAA-protected medical information, financial account numbers, usernames and passwords.
Deb Radcliff Jun 6 2006 7:47PM Security
The race to reduce insider threats

The race to reduce insider threats

As part of the recent Infosecurity Europe 2006 Conference in London, a Hackers’ Panel included the likes of Gary McKinnon — also known as Solo, who could be extradited from the U.K. to the U.S. for allegedly hacking into various military and NASA systems. A less covered session, however, hit upon a problem that has existed for ages but that seems to still get short shrift in enterprises today: insider threats.
Illena Armstrong Jun 5 2006 10:45PM Security
News briefs

News briefs

Breach in Texas The University of Texas suffered its second major data breach in three years when more than 197,000 personal records were exposed at the McCombs School of Business. The breach compromised the Social Security numbers and other biographical information of alumni, faculty, staff and students of the business school. Not much is known about the source of the breach, though UT officials said they are working on an investigation. In the meantime, the university set up a website and toll-free numbers to direct those potentially affected to protect their identities.
Staff Writers Jun 5 2006 10:41PM Security
Debate

Debate

This month's topic: Companies should use unofficial patches to fix vulnerabilities
Chris Andrews Jun 5 2006 10:34PM Security
Company news

Company news

Lumeta, a provider of network intelligence solutions, has promoted David Arbeitel to CTO and senior vice president of product strategy. He previously served as senior vice president of strategic development. Arbeitel’s new role comes as Lumeta is expanding its overall technology focus to help businesses with compliance, IT optimization and security risk management.
Staff Writers Jun 5 2006 10:04PM Security
Firefox: a safer option?

Firefox: a safer option?

A number of recent critical flaws discovered in Mozilla Firefox has raised doubt on whether the open-source web browser still can be considered a much safer alternative to Internet Explorer.
Dan Kaplan Jun 5 2006 9:59PM Security
Me and my job

Me and my job

How did you get into security? I was the sole IT person for a small community bank, and as security became more prevalent in the industry and regulators began focusing on it, I had to become much more knowledgeable in that area.
Jason James Jun 5 2006 9:48PM Security
IM-based malware threat grows

IM-based malware threat grows

Just as the number of end-users enlisting instant messaging (IM) programs to communicate has risen, so too has the number of distinct families of IM-based malware. More attackers are utilizing this propagation method and infections are increasingly sophisticated.
Jose Nazario Jun 5 2006 9:39PM Security
Structure found in process

Structure found in process

As technically oriented security professionals we often don’t pursue structure in our testing. We simply use the same vulnerability scans and penetration tests we’ve been using for years — updated, of course, for the latest network nasties. Today, that simply is not enough.
Peter Stephenson,CeRNS, Jun 5 2006 9:35PM Security
Advance commerce through innovation

Advance commerce through innovation

Smart cards make perpetrating fraud considerably more difficult than "traditional" magstripe cards. In regions where offline processing is the dominant method for processing transactions this especially is true. As a result — and even though we have driven payment card fraud to an all-time low — our industry is now seriously exploring how smart card technology can become the primary driver in the evolution of payment card security.
Staff Writers Jun 5 2006 9:03PM Security
Got something to say?

Got something to say?

Send your comments, praise or criticisms to scfeedbackus@haymarketmedia.com. We reserve the right to edit letters.
Staff Writers Jun 5 2006 9:00PM Security

Log In

  |  Forgot your password?