Features

Can the phishing war be won?

Can the phishing war be won?

"In the struggle for survival, the fittest win out at the expense of their rivals because they succeed in adapting themselves best to their environment." - Charles Darwin
Dr Jonathan Aug 15 2005 12:16PM Security
Can we Trust our Workforce?

Can we Trust our Workforce?

Traditionally, one of the most important assets of any successful company is its workforce. Competitive edge comes from employing hard-working, law-abiding motivated individuals with a strong company loyalty. Even for the odd employee, with a grudge against the company, the combination of laws and contracts in the past acted as sufficient deterrent to any wrong-doing.
Petri Säkkinen Aug 10 2005 10:09AM Security
Day of the digital undead

Day of the digital undead

Like the living dead, armies of “zombie” computers are disrupting corporate networks and sucking the life out of business-critical systems around the world. Zombies strike fear into the hearts of IT personnel responsible for maintenance of corporate networks, and particularly those charged with protecting and ensuring the availability of vital corporate email systems.
David Stanley Aug 8 2005 12:07PM Security
Mobile workforce - security nightmare or opportunity?

Mobile workforce - security nightmare or opportunity?

Over the last decade blackberries, mobile phones, laptops, PDAs and a variety of other devices have become intrinsic to both our working and personal lives. It is impossible to imagine a life without them. Consumers and businesses alike have seen the advantages of real time communication and have embraced the technology that allows them to do more whilst on the move.
Dave Taylor Aug 3 2005 12:02PM Security
How to make your database secure

How to make your database secure

Data security experts are raising the alarm: viruses are getting increasingly more specialized and have lately attacked SQL Server installations that did not install the latest Microsoft security patches.
Martin Teetz Aug 1 2005 11:10AM Security
Legal lessons from across the pond

Legal lessons from across the pond

California might have a reputation for coming up with the world's wackiest ideas, but its legislation for handling data privacy has proved to be a winner.
Ron Condon Jul 29 2005 3:04PM Security
Debate» Traditional firewalls have outlived their usefulness and should be thrown on the scrapheap

Debate» Traditional firewalls have outlived their usefulness and should be thrown on the scrapheap

Jeff Alsford Jul 29 2005 2:46PM Security
 Me and my job

Me and my job

Staff Writers Jul 29 2005 2:33PM Security
Old school rules, new school tools

Old school rules, new school tools

It was a great security conference. The sponsored lunch had gone down a treat, the wine was excellent. The next speaker was being announced: "...will talk on the CIA Principles of Information Security." Yawn, that guy must be old enough to predate punched cards.
Andrew Yeomans Jul 29 2005 2:16PM Security
Pharming for DNS flaws

Pharming for DNS flaws

Pentesting now builds in the latest tricks. But there’s still more to do, says Gunter Ollmann
Gunter Ollmann Jul 29 2005 2:12PM Security
A new role to play for Mr Microsoft

A new role to play for Mr Microsoft

Stuart Okin once spent his life arguing that Microsoft was taking security seriously. Now he has to put this into practice. David Quainton reports
David Quainton Jul 29 2005 2:05PM Security
How to locate intruders

How to locate intruders

Tracking down unwanted wireless access points can be a tricky task. Matthew Gray suggests that RF fingerprinting is the best way to go
Matthew Gray Jul 29 2005 1:52PM Security
No room for excessive trust

No room for excessive trust

Would you let a convicted fraudster look after your financial affairs? Leave your wallet in a room with a known former thief? Give matches to an ex-arsonist? Perhaps feel comfortable knowing that an ex-terrorist hijacker just boarded an aeroplane with you?<
Alan Phillips Jul 27 2005 4:29PM Security
Lights, camera, and… hacker

Lights, camera, and… hacker

There was a good article in a recent issue of Bulletin of the Atomic Scientists about the portrayal of national security issues on film and TV (http://tinyurl.com/dec6v). As you might imagine, modern fiction is often, well, fictional in its portrayal of nuclear weapons, "homeland security" and the like.
Nick Barron Jul 27 2005 4:14PM Security
Move by the DHS is the first right step

Move by the DHS is the first right step

We've all heard the saying, life's not a destination but a journey. The same holds true for security, according to the Federal Trade Commission's Orson Swindle, who talked at a CSO Summit last month in D.C., organized in part by the Information Systems Security Association (ISSA).
Illena Armstrong Jul 27 2005 3:53PM Security
It’s tough on the front line

It’s tough on the front line

Chrisan Herrod, the first CSO at the Securities & Exchange Commission, took a battering from the recent GAO report. Here she gives us her side of the story. By John Sterlicchi, with additional reporting by Marcia Savage
John Sterlicchi Jul 27 2005 3:38PM Security
Spyware, adware and unaware

Spyware, adware and unaware

Spyware is public enemy number one. Web advertising networks are strongly lobbying to make sure that the anti-Spyware bill known as the Spy Act is watered down a bit before passage (Bill H.R. 29).
Paul Myer Jul 27 2005 10:14AM Security
Review: DeadMan’s Handle

Review: DeadMan’s Handle

DeadmanMan's Handle is a data security product that is simple in concept – if an unauthorized user attempts to use the machine, it deletes any sensitive files.

Jon Tullett Jul 27 2005 12:00AM Security
Review: Active Folders Content Manager

Review: Active Folders Content Manager

Active Folders is an email search engine that looks for multiple attributes. It automates the manual task of finding unwanted attachments or abusive emails, or can be used to bring together all communications on a specific subject.

Eric Doyle Jul 27 2005 12:00AM Security
Review: MIMEsweeper for SMTP

Review: MIMEsweeper for SMTP

This is a security and routing application for email systems. It protects them from spam, malware and DoS attacks, but its main feature is the ability to direct messaging traffic based on content, rather than the destination address.

Eric Doyle Jul 27 2005 12:00AM Security

Log In

  |  Forgot your password?