Features

Look behind the firewall

Look behind the firewall

It takes more than a strong perimeter to keep your files safe from loss or theft, writes Stuart Okin
Stuart Okin Feb 10 2006 4:58PM Security
Get the best out of compliance

Get the best out of compliance

Most of the industry regards compliance as annoying, at best, but Jan Babiak tells René Millman why this risks missing a great opportunity
René Millman Feb 10 2006 4:25PM Security
Documented proof

Documented proof

Organisations send millions of documents electronically each day, but only around half manage them securely. Jan Howells reports
Jan Howells Feb 10 2006 4:25PM Security
So what's in store for you this year?

So what's in store for you this year?

Spam, trojans, keyloggers and every variety of virus are on the increase, making life harder for information security professionals. René Millman assesses the scale of this onslaught
René Millman Feb 10 2006 4:25PM Security
One chance to succeed

One chance to succeed

Melissa Loveday asks what’s been done to ensure IT systems for the Winter Olympics have been hardened against attack
Melissa Loveday Feb 10 2006 4:25PM Security
Standing strong: Partnering for a robust IT backbone

Standing strong: Partnering for a robust IT backbone

Former Secretary of the Department of Homeland Security (DHS) Tom Ridge says that no matter if discussions are about cyberterrorist attacks launched at federal agencies or cash-driven assaults targeted at large enterprises, cooperation and collaboration of federal and corporate efforts is crucial to protecting the nation’s IT backbone.
Illena Armstrong Feb 8 2006 9:26PM Security
Cyberattackers take aim

Cyberattackers take aim

Predictions, like fog, are hard to get your arms around, but here is one that will prove more than just a mere exercise in prophesizing: The next wave of security threats will be targeted attacks aimed at specific organizations or individuals within enterprises.
Jim Carr Feb 8 2006 9:00PM Security
Ten ways to counterattack

Ten ways to counterattack

Enterprise database infrastructures, which often contain the crown jewels of an organization, are subject to a wide range of attacks. The most critical of these are listed below, followed by recommendations for mitigating the risk of each.
Amichai Schulman Feb 8 2006 8:51PM Security
Privacy in a paperless world

Privacy in a paperless world

When it comes to safeguarding electronic paper trails, Tess Koleczek is a master.
Joseph C. Feb 8 2006 8:29PM Security
Solutions for the mailstream

Solutions for the mailstream

Ever since written communications began there has been a need to keep some of these communications more secure and private than others. Today, much of this written communication is exchanged through electronic mail, and yet email security still remains something of a blindspot for most organizations.
Andrew Kellett Feb 8 2006 8:20PM Security
RSA Conference: Staying up to the challenge

RSA Conference: Staying up to the challenge

The RSA Conference will celebrate its 15th anniversary this year. How has it evolved to keep up with the times?
Illena Armstrong Feb 8 2006 8:00PM Security
RSA Conference: Exposing the exposures

RSA Conference: Exposing the exposures

This year’s RSA Conference will show off competitors’ vulnerability knowledge.
Frank Washkuch Feb 8 2006 7:52PM Security
RSA Conference: What's coming in the next 15 years?

RSA Conference: What's coming in the next 15 years?

As RSA Conference celebrates its 15th anniversary, we thought it only appropriate to find out from leading information security players what they think the industry can expect to see in the next 15 years.
Staff Writers Feb 8 2006 7:46PM Security
IT security pros get well-deserved credit

IT security pros get well-deserved credit

Harrison Ford rocked as the brainy, swashbuckling Indiana Jones. His swaggering Han Solo will be remembered for years to come. But it seems these unforgettable roles have been hard to duplicate.
Illena Armstrong Feb 7 2006 9:05PM Security
News briefs

News briefs

Backup security tapes from the Orlando, Florida corporate offices of hotel giant Marriott International went missing in late December, leaving the personal information of more than 200,000 clients exposed.
Staff Writers Feb 7 2006 8:50PM Security
Debate

Debate

Anti-threat software better addresses malware threats than best-of-breed suites.
Andrew Lee Feb 7 2006 8:35PM Security
Company news

Company news

Kim MacPherson has taken over as vice president of engineering for PassMark Security, a developer of authentication solutions for ecommerce. MacPherson has been vice president of engineering at Securify and has worked on secure financial service applications at Intuit. www.passmarksecurity.com
Staff Writers Feb 7 2006 8:26PM Security
WMF focuses security pros' attention

WMF focuses security pros' attention

As the new year began, security professionals were left in a hole. With an official patch for a recently discovered Windows meta file (WMF) vulnerability almost two weeks from release, analysts were forced to deal with a vulnerability that many did not technically consider a “vulnerability” at all.
Frank Washkuch Feb 7 2006 8:21PM Security
Me and my job

Me and my job

What do you like most about your job? It’s a position of perpetual changes and new learning opportunities on a daily basis. I get to thoroughly evaluate every new device, technology, security strategy and attack that comes along. Vendors listen to my opinion.
Lane Timmons Feb 7 2006 8:14PM Security
SAML and SPML arrive

SAML and SPML arrive

With the growing prevalence of web-based applications and a growing demand for interoperability among identity-related services, a call has emerged for standards to facilitate this interoperability.
Rami Elron Feb 7 2006 8:03PM Security

Log In

  |  Forgot your password?