Features

Privacy in a paperless world

Privacy in a paperless world

When it comes to safeguarding electronic paper trails, Tess Koleczek is a master.
Joseph C. Feb 8 2006 8:29PM Security
Solutions for the mailstream

Solutions for the mailstream

Ever since written communications began there has been a need to keep some of these communications more secure and private than others. Today, much of this written communication is exchanged through electronic mail, and yet email security still remains something of a blindspot for most organizations.
Andrew Kellett Feb 8 2006 8:20PM Security
RSA Conference: Staying up to the challenge

RSA Conference: Staying up to the challenge

The RSA Conference will celebrate its 15th anniversary this year. How has it evolved to keep up with the times?
Illena Armstrong Feb 8 2006 8:00PM Security
RSA Conference: Exposing the exposures

RSA Conference: Exposing the exposures

This year’s RSA Conference will show off competitors’ vulnerability knowledge.
Frank Washkuch Feb 8 2006 7:52PM Security
RSA Conference: What's coming in the next 15 years?

RSA Conference: What's coming in the next 15 years?

As RSA Conference celebrates its 15th anniversary, we thought it only appropriate to find out from leading information security players what they think the industry can expect to see in the next 15 years.
Staff Writers Feb 8 2006 7:46PM Security
IT security pros get well-deserved credit

IT security pros get well-deserved credit

Harrison Ford rocked as the brainy, swashbuckling Indiana Jones. His swaggering Han Solo will be remembered for years to come. But it seems these unforgettable roles have been hard to duplicate.
Illena Armstrong Feb 7 2006 9:05PM Security
News briefs

News briefs

Backup security tapes from the Orlando, Florida corporate offices of hotel giant Marriott International went missing in late December, leaving the personal information of more than 200,000 clients exposed.
Staff Writers Feb 7 2006 8:50PM Security
Debate

Debate

Anti-threat software better addresses malware threats than best-of-breed suites.
Andrew Lee Feb 7 2006 8:35PM Security
Company news

Company news

Kim MacPherson has taken over as vice president of engineering for PassMark Security, a developer of authentication solutions for ecommerce. MacPherson has been vice president of engineering at Securify and has worked on secure financial service applications at Intuit. www.passmarksecurity.com
Staff Writers Feb 7 2006 8:26PM Security
WMF focuses security pros' attention

WMF focuses security pros' attention

As the new year began, security professionals were left in a hole. With an official patch for a recently discovered Windows meta file (WMF) vulnerability almost two weeks from release, analysts were forced to deal with a vulnerability that many did not technically consider a “vulnerability” at all.
Frank Washkuch Feb 7 2006 8:21PM Security
Me and my job

Me and my job

What do you like most about your job? It’s a position of perpetual changes and new learning opportunities on a daily basis. I get to thoroughly evaluate every new device, technology, security strategy and attack that comes along. Vendors listen to my opinion.
Lane Timmons Feb 7 2006 8:14PM Security
SAML and SPML arrive

SAML and SPML arrive

With the growing prevalence of web-based applications and a growing demand for interoperability among identity-related services, a call has emerged for standards to facilitate this interoperability.
Rami Elron Feb 7 2006 8:03PM Security
Are infosec pros complacent?

Are infosec pros complacent?

I had a very interesting conversation with a colleague recently. He had a disturbing take on the state of information security and, particularly, practitioners (of which he is one). He took the position that security professionals who have been around a while are becoming – no, making themselves – dinosaurs. Having been in this field well over 20 years myself, I, of course, found that a disturbing notion. You know what happened to the dinosaurs. Not a pretty thought.

Peter Stephenson,CeRNS, Feb 7 2006 8:00PM Security
Second-factor authentication

Second-factor authentication

Three or four years ago Howard Schmidt commented that we should have moved away from username and password as an authentication mechanism years before. I recall nodding in agreement with his statement. So I was hardly surprised when the The Federal Financial Institutions Examination Council (FFIEC) issued its guidance calling for the use of second-factor authentication in online banking. In the view of many vendors, this guidance — after an earlier FDIC advisory on internet banking security — “represents a definitive step toward eliminating single-factor authentication by financial institutions.” There are alternative views.

Dave Cullinane Feb 7 2006 7:46PM Security
Got something to say?

Got something to say?

Send your comments, praise or criticisms to SCFeedbackUS@haymarketmedia.com. We reserve the right to edit letters.
Staff Writers Feb 7 2006 7:40PM Security
Self-assessment questionnaires

Self-assessment questionnaires

A CIO for a marketing company was in a state of panic. He recently received a 20-page information security audit questionnaire from one of the company’s largest clients, a national bank. The questionnaire was a detailed self-assessment asking the company to verify the actions it took to protect bank information as per the Gramm-Leach-Bliley Act.
Richard Menta Feb 7 2006 7:21PM Security
Shed-ding Light on Enterprise Security

Shed-ding Light on Enterprise Security

It’s 4am, cold, dark and I’m running as fast as I can, wearing only a dressing gown. What’s going on? And what has this to do with IT security?
Jason Holloway Feb 6 2006 12:31PM Security
Warning MP3s Could Seriously Damage Your Reputation

Warning MP3s Could Seriously Damage Your Reputation

So you’re in love with your MP3, you go jogging with it, you sleep with it and you listen to it on the way to work! This year the workplace has become flooded with them as the cheapest MP3s are now sold for as little as £20 storing around 256MB of data. At the top end of the market, digital jukeboxes with storage of 20GB start at under £150 while a 60GB Apple iPod Video player can be had for just £300. That is the same storage capacity as a lot of corporate notebooks.
Martin Allen Feb 3 2006 12:58PM Security
Review: Auditor Enterprise

Review: Auditor Enterprise

NetClarity’s Auditor is a fine example of a fully featured appliance that offers not just vulnerability assessment, but also ties results to compliance and ongoing information systems audit programs. Beginning from the superb documentation and ending with the high value for the money, this product shines.
Peter Stephenson,CeRNS, Feb 1 2006 12:00AM Security
Review: AZScan

Review: AZScan

AZScan has a way to go to become a world-class vulnerability assessment tool – the product is not intuitive. First, one needs to know quite a bit about the product being audited. Second, there is no online help or tool tips. Third, the menu choices don’t always behave as expected. Set-up seems easy at first, but details often don’t work.
Peter Stephenson,CeRNS, Feb 1 2006 12:00AM Security

Log In

  |  Forgot your password?