Features

Endpoint security reaches across the network perimeter

Endpoint security reaches across the network perimeter

The economy may be on the upswing, but increasing global competition combined with a multitude of compliance issues such as regulatory audits continue to pose a costly problem for organizations.
Alan Bentley Jan 27 2006 1:20PM Security
It can be better to be needed than wanted

It can be better to be needed than wanted

Ron Condon Jan 25 2006 4:19PM Security
Debate: Anti-virus products just don’t work and vendors are not helping their customers

Debate: Anti-virus products just don’t work and vendors are not helping their customers

Andy Campbell Jan 25 2006 3:56PM Security
A changing profession

A changing profession

Information security people are rising rapidly through the ranks as the profession matures and their role gains greater recognition outside the confines of the IT department.
Ron Condon Jan 25 2006 2:45PM Security
Dan Newman, Instructor and hacking expert on the Ethical Hacking course (CEH) at The Training Camp

Dan Newman, Instructor and hacking expert on the Ethical Hacking course (CEH) at The Training Camp

Staff Writers Jan 25 2006 2:36PM Security
Are your systems just too old?

Are your systems just too old?

Legacy systems are resilient and cost-effective… but were never designed for today’s security needs
Staff Writers Jan 25 2006 2:13PM Security
We all need open standards

We all need open standards

The latest SANS "Top 20" vulnerability list was released recently. While it needs to be taken with a pinch of salt, it did come up with an interesting observation. It seems the focus is shifting, from holes in OSs to those in applications.
Nick Barron Jan 25 2006 1:59PM Security
Wolves in sheeps’ clothing

Wolves in sheeps’ clothing

Don’t assume that little threats will not grow up into serious vulnerabilities, warns Gunter Ollmann
Gunter Ollmann Jan 25 2006 12:32PM Security
Wake up, you sleepwalkers

Wake up, you sleepwalkers

“We’ve been throwing money at security for 20 years and are no better off now than we were then,” says Eddie Bleasdale. He tells Ron Condon why he is so angry
Ron Condon Jan 25 2006 12:19PM Security
Beware the post impressionists

Beware the post impressionists

Organisations that ignore their responsibilities to manage email traffic securely face not only possible legal action, but the loss of a highly valuable asset. James Middleton reports
James Middleton Jan 24 2006 5:39PM Security
Treasured possessions

Treasured possessions

Annual audits of your IT assets are no longer enough, finds Janine Milne. After all, if you don’t know what you own, how can you protect it?
Janine Milne Jan 24 2006 5:25PM Security
Application security: Beyond the buzzwords

Application security: Beyond the buzzwords

One of the emerging buzzwords of 2005 is "application security" but many managers still don’t have a clear picture of what the term means. Security vendors are not helping as they all clamor for a piece of this emerging budget line-item with very diverse offerings.
Andrew Stern Jan 23 2006 12:55PM Security
For Whom The Bell Tolls

For Whom The Bell Tolls

A few years ago I took the decision to turn my tax affairs over to an accountant. Not that I earn that much, but I simply can’t figure out all the boxes, and it means having to read the manual which has never been a particularly strong point.
Calum Macleod Jan 18 2006 1:42PM Security
We’re saving a seat for you

We’re saving a seat for you

SC Magazine U.S. Awards dinner is edging closer.
Staff Writers Jan 13 2006 10:06PM Security
IT asset dollars and sense

IT asset dollars and sense

When truth is stranger than fiction — as it often is in enterprise IT departments — managing technology assets securely can require a powerful imagination. Indeed, how IT departments cope with issues such as the obsoleting of hard drives and eliminating so-called “double-campers ” from their resources might well determine whether or not they can claim their IT assets are truly secure.
Jim Carr Jan 13 2006 9:59PM Security
Safeguarding your inbox

Safeguarding your inbox

Jill Cherveny-Keough never lowers her defenses. When she receives unsolicited email from an unknown source, Cherveny-Keough assumes it contains a worm, virus or verbiage that will attempt to collect and hijack her personal information.
Joseph C. Jan 13 2006 9:19PM Security
Social engineering 101

Social engineering 101

Most IT security professionals know how to define social engineering. Security professionals likely know who Kevin Mitnick is, and have perhaps even read his book, The Art of Deception. It is also common practice among IT security professionals to cover the subject as a part of their security awareness training program. But being fully armored against the threat of social engineering is only the beginning. Now it is time to move on to more interesting topics, such as server hardening, IDS or single sign-on solutions.
Sean Kelly Jan 13 2006 9:07PM Security
Small Enterprise: Coupling reliability with efficiency

Small Enterprise: Coupling reliability with efficiency

Smaller enterprises, companies with about 500 or fewer employees, have little of the luxuries that their larger counterparts boast. Although short on staff, resources and funding, they face the same types of information security threats as do mid-sized and large companies.
Ji Hyun Jan 13 2006 8:54PM Security
Medium enterprise: Layering for fast expansion

Medium enterprise: Layering for fast expansion

One day, you are the IT security pro for a tidy, small company with about 700 PCs on your mind. The next day, more than one thousand additional unique users plug into your system – each with the average 18-to-22-year-old’s collection of spyware and viruses stored on a range of PCs.
Frank Washkuch Jan 13 2006 8:47PM Security
Large enterprise: How the big boys cover their assets

Large enterprise: How the big boys cover their assets

Just one lone publicly disclosed identity theft incident can make even the largest enterprise beef up information security and privacy practices fast.
Illena Armstrong Jan 13 2006 8:27PM Security

Log In

  |  Forgot your password?