Features

Wolves in sheeps’ clothing

Wolves in sheeps’ clothing

Don’t assume that little threats will not grow up into serious vulnerabilities, warns Gunter Ollmann
Gunter Ollmann Jan 25 2006 12:32PM Security
Wake up, you sleepwalkers

Wake up, you sleepwalkers

“We’ve been throwing money at security for 20 years and are no better off now than we were then,” says Eddie Bleasdale. He tells Ron Condon why he is so angry
Ron Condon Jan 25 2006 12:19PM Security
Beware the post impressionists

Beware the post impressionists

Organisations that ignore their responsibilities to manage email traffic securely face not only possible legal action, but the loss of a highly valuable asset. James Middleton reports
James Middleton Jan 24 2006 5:39PM Security
Treasured possessions

Treasured possessions

Annual audits of your IT assets are no longer enough, finds Janine Milne. After all, if you don’t know what you own, how can you protect it?
Janine Milne Jan 24 2006 5:25PM Security
Application security: Beyond the buzzwords

Application security: Beyond the buzzwords

One of the emerging buzzwords of 2005 is "application security" but many managers still don’t have a clear picture of what the term means. Security vendors are not helping as they all clamor for a piece of this emerging budget line-item with very diverse offerings.
Andrew Stern Jan 23 2006 12:55PM Security
For Whom The Bell Tolls

For Whom The Bell Tolls

A few years ago I took the decision to turn my tax affairs over to an accountant. Not that I earn that much, but I simply can’t figure out all the boxes, and it means having to read the manual which has never been a particularly strong point.
Calum Macleod Jan 18 2006 1:42PM Security
We’re saving a seat for you

We’re saving a seat for you

SC Magazine U.S. Awards dinner is edging closer.
Staff Writers Jan 13 2006 10:06PM Security
IT asset dollars and sense

IT asset dollars and sense

When truth is stranger than fiction — as it often is in enterprise IT departments — managing technology assets securely can require a powerful imagination. Indeed, how IT departments cope with issues such as the obsoleting of hard drives and eliminating so-called “double-campers ” from their resources might well determine whether or not they can claim their IT assets are truly secure.
Jim Carr Jan 13 2006 9:59PM Security
Safeguarding your inbox

Safeguarding your inbox

Jill Cherveny-Keough never lowers her defenses. When she receives unsolicited email from an unknown source, Cherveny-Keough assumes it contains a worm, virus or verbiage that will attempt to collect and hijack her personal information.
Joseph C. Jan 13 2006 9:19PM Security
Social engineering 101

Social engineering 101

Most IT security professionals know how to define social engineering. Security professionals likely know who Kevin Mitnick is, and have perhaps even read his book, The Art of Deception. It is also common practice among IT security professionals to cover the subject as a part of their security awareness training program. But being fully armored against the threat of social engineering is only the beginning. Now it is time to move on to more interesting topics, such as server hardening, IDS or single sign-on solutions.
Sean Kelly Jan 13 2006 9:07PM Security
Small Enterprise: Coupling reliability with efficiency

Small Enterprise: Coupling reliability with efficiency

Smaller enterprises, companies with about 500 or fewer employees, have little of the luxuries that their larger counterparts boast. Although short on staff, resources and funding, they face the same types of information security threats as do mid-sized and large companies.
Ji Hyun Jan 13 2006 8:54PM Security
Medium enterprise: Layering for fast expansion

Medium enterprise: Layering for fast expansion

One day, you are the IT security pro for a tidy, small company with about 700 PCs on your mind. The next day, more than one thousand additional unique users plug into your system – each with the average 18-to-22-year-old’s collection of spyware and viruses stored on a range of PCs.
Frank Washkuch Jan 13 2006 8:47PM Security
Large enterprise: How the big boys cover their assets

Large enterprise: How the big boys cover their assets

Just one lone publicly disclosed identity theft incident can make even the largest enterprise beef up information security and privacy practices fast.
Illena Armstrong Jan 13 2006 8:27PM Security
Cover Story: Custom building defenses

Cover Story: Custom building defenses

Three IT security pros explain that a reliable network is key, no matter the size of the company.
Staff Writers Jan 13 2006 8:09PM Security
ID theft: beyond fear to opportunity

ID theft: beyond fear to opportunity

In the last few months, it has become nearly impossible to read a magazine or watch television without coming across a story about identity theft. Identity theft is causing a significant amount of angst among consumers and businesses alike.
Sara Gates Jan 13 2006 7:54PM Security
Got something to say?

Got something to say?

Send your comments, praise or criticisms to scfeedbackus@haymarketmedia.com. We reserve the right to edit letters.
Staff Writers Jan 13 2006 7:29PM Security
30 seconds on...

30 seconds on...

Outsourcing option

Unilever confirmed last month that it is discussing outsourcing parts of its finance, human resources and IT operations to Accenture and IBM. An outsourcing agreement would apply chiefly to Unilever's European staff.

Staff Writers Jan 13 2006 7:15PM Security
Efficiency and effectiveness

Efficiency and effectiveness

I had the pleasure of attending a session with a "guturist" recently — a gentleman by the name of Michael Tchong. He spends much of his time analyzing trends and patterns in technology, human behavior and other areas and uses that information to forecast future trends and directions. While his technology and business predictions were fascinating, one of the comments he made struck me as particularly appropriate to those of us in information security: "If you can't do it for the same cost or lower — outsource it."
Dave Cullinane Jan 11 2006 10:26PM Security
Security starts with coding

Security starts with coding

A mix of regulatory requirements coupled with front-page news stories regarding security breaches worldwide have unveiled an array of application security issues.
Brad Arkin Jan 11 2006 10:20PM Security
Innovation still exists

Innovation still exists

I just attended the Computer Security Institue’s 32nd Annual Conference and this year there were rumblings on the show floor about the lack of anything new.
Peter Stephenson,CeRNS, Jan 11 2006 10:11PM Security

Log In

  |  Forgot your password?