Features

Living without wires

Living without wires

Is WPA really the answer to the problem of insecure corporate wireless networks? Maybe, but as Rob Buckley discovers, it's not that simple
Rob Buckley Jun 12 2006 12:26PM Security
Make your people aware

Make your people aware

Properly planned and executed staff education makes employees more responsible and reaps tangible business benefits. Paul Hansford reports
Staff Writers Jun 12 2006 11:50AM Security
Cover story: Hard to decipher

Cover story: Hard to decipher

The break-neck speed and frequency with which corporate data breaches are happening these days has most enterprise executives racing to avoid becoming the next headline.
Ericka Chickowski Jun 6 2006 8:13PM Security
The switch is on

The switch is on

Tarron Weir and Joseph Raquel might well be "poster boys" for the Secure Sockets Layer (SSL) virtual private network (VPN) movement. In fact, their experience with the latest in secure remote-access technology more or less epitomizes what’s going on in the VPN marketplace right now.
Jim Carr Jun 6 2006 8:05PM Security
Back to school

Back to school

The message is clear for employees at the 19 Exchange Bank branches scattered across Sonoma County in California: Protect valuable customer information or risk damaging the financial institution’s good name.
Dan Kaplan Jun 6 2006 7:58PM Security
Remote control wars

Remote control wars

Monitoring an illicit Internet Relay Chat (IRC) channel recently, Nicholas Albright couldn’t believe what he was seeing. First, he observed a network operator sending commands to install keyloggers on thousands of compromised, remote-controlled computers. Then, all this private data started flying over the channel — HIPAA-protected medical information, financial account numbers, usernames and passwords.
Deb Radcliff Jun 6 2006 7:47PM Security
The race to reduce insider threats

The race to reduce insider threats

As part of the recent Infosecurity Europe 2006 Conference in London, a Hackers’ Panel included the likes of Gary McKinnon — also known as Solo, who could be extradited from the U.K. to the U.S. for allegedly hacking into various military and NASA systems. A less covered session, however, hit upon a problem that has existed for ages but that seems to still get short shrift in enterprises today: insider threats.
Illena Armstrong Jun 5 2006 10:45PM Security
News briefs

News briefs

Breach in Texas The University of Texas suffered its second major data breach in three years when more than 197,000 personal records were exposed at the McCombs School of Business. The breach compromised the Social Security numbers and other biographical information of alumni, faculty, staff and students of the business school. Not much is known about the source of the breach, though UT officials said they are working on an investigation. In the meantime, the university set up a website and toll-free numbers to direct those potentially affected to protect their identities.
Staff Writers Jun 5 2006 10:41PM Security
Debate

Debate

This month's topic: Companies should use unofficial patches to fix vulnerabilities
Chris Andrews Jun 5 2006 10:34PM Security
Company news

Company news

Lumeta, a provider of network intelligence solutions, has promoted David Arbeitel to CTO and senior vice president of product strategy. He previously served as senior vice president of strategic development. Arbeitel’s new role comes as Lumeta is expanding its overall technology focus to help businesses with compliance, IT optimization and security risk management.
Staff Writers Jun 5 2006 10:04PM Security
Firefox: a safer option?

Firefox: a safer option?

A number of recent critical flaws discovered in Mozilla Firefox has raised doubt on whether the open-source web browser still can be considered a much safer alternative to Internet Explorer.
Dan Kaplan Jun 5 2006 9:59PM Security
Me and my job

Me and my job

How did you get into security? I was the sole IT person for a small community bank, and as security became more prevalent in the industry and regulators began focusing on it, I had to become much more knowledgeable in that area.
Jason James Jun 5 2006 9:48PM Security
IM-based malware threat grows

IM-based malware threat grows

Just as the number of end-users enlisting instant messaging (IM) programs to communicate has risen, so too has the number of distinct families of IM-based malware. More attackers are utilizing this propagation method and infections are increasingly sophisticated.
Jose Nazario Jun 5 2006 9:39PM Security
Structure found in process

Structure found in process

As technically oriented security professionals we often don’t pursue structure in our testing. We simply use the same vulnerability scans and penetration tests we’ve been using for years — updated, of course, for the latest network nasties. Today, that simply is not enough.
Peter Stephenson,CeRNS, Jun 5 2006 9:35PM Security
Advance commerce through innovation

Advance commerce through innovation

Smart cards make perpetrating fraud considerably more difficult than "traditional" magstripe cards. In regions where offline processing is the dominant method for processing transactions this especially is true. As a result — and even though we have driven payment card fraud to an all-time low — our industry is now seriously exploring how smart card technology can become the primary driver in the evolution of payment card security.
Staff Writers Jun 5 2006 9:03PM Security
Got something to say?

Got something to say?

Send your comments, praise or criticisms to scfeedbackus@haymarketmedia.com. We reserve the right to edit letters.
Staff Writers Jun 5 2006 9:00PM Security
Meet your attackers on their own own turf

Meet your attackers on their own own turf

There’s plenty of talk today about perimeter security strategies. Protecting the perimeter with multilayered security. Identifying the perimeter. The latest buzz on firewalls. Zero-day attacks. Worm storms. Security toolkits with the latest intrusion detection tools. Secure software applications.
Todd Bransford Jun 5 2006 8:28PM Security
Review: AppSense Application Manager and Environment Manager

Review: AppSense Application Manager and Environment Manager

The AppSense Application Manager (AM) can be set up as a standalone product in a test environment before actual deployment. The standalone preconfiguration enables an administrator to get to know and tweak the program for the best configuration for each particular environment.
Peter Stephenson,CeRNS, Jun 1 2006 12:00AM Security
Review: LANDesk Security Suite

Review: LANDesk Security Suite

This product incorporates all the features of a great endpoint security product in one program. LANDesk must be installed on a central server, which must pass certain security and version tests before install will begin. After installation, policies can be set for access, applications, software versions, service packs, anti-virus, and so on. Agents planted across the network also allow the console administrator to take remote control of machines in violation of policies. Security Suite is part of a larger set of integrated products.
Peter Stephenson,CeRNS, Jun 1 2006 12:00AM Security
Review: Safe Access

Review: Safe Access

This appliance comes loaded with features. Three default security policies monitor for up-to-date service packs, critical updates, anti-virus programs and updates, and the presence of worms, viruses or Trojans.
Peter Stephenson,CeRNS, Jun 1 2006 12:00AM Security

Log In

  |  Forgot your password?