Features

Steps for ensuring storage network security

Steps for ensuring storage network security

Most companies routinely assess their data security with overall security policy health checks, site surveys, and reviews of processes, systems, networks, and applications. Yet each of these activities rests on fundamental assumptions about where the data resides and how the data "behind the server" is secured.
Brandon Hoff Jul 20 2005 11:45AM Security
Moving towards two-factor authentication

Moving towards two-factor authentication

Protecting data in the digital age is essential. Recent years have seen a decline in “recreational hacking” and a new wave of commercial hacking as illustrated in the example of the keystroke logger placed at the Sumitomo bank in an effort to steal £220m earlier this year and the various efforts at Denial of Service (DoS) blackmail.
John Handelaar Jul 18 2005 2:16PM Security
Why IPS won't break your network

Why IPS won't break your network

Back in 2003 Gartner declared Intrusion Detection Systems (IDS) as dead. Whether this is true, it is an increasing reality that intrusion protection or prevention systems are increasingly becoming a part of many company's networks. While IDS may be waning, IPS (Intrusion Protection Systems) are on the up, yet there is still a pervasive feeling that such technology can cause a network to break or malfunction.
Simon Smith Jul 12 2005 11:28AM Security
Securing instant messaging

Securing instant messaging

It was only recently that IM was the preserve of teens and net-savvy companies. But like so many applications that start small, IM has made the leap from cool tool to useful business application. US analyst Gartner suggests that IM "will rival email in terms of both volume and ubiquity." In 2005 alone, it believes half of all companies will be using enterprise-level IM clients.
David Beesley Jul 6 2005 10:38AM Security
Noticed that big grey thing over there?

Noticed that big grey thing over there?

The latest Global Security Survey from Deloitte Touche Tohmatsu underlines what many of us had conveniently forgotten – that most of the threats to our systems come from inside the organisation.
Ron Condon Jul 1 2005 4:31PM Security
Congress must lead the way on privacy

Congress must lead the way on privacy

It took 34 years for radio to reach 50 million users. Television got to the same number of people in 13 years. The internet hit that 50-million-user mark in just four years.
Illena Armstrong Jul 1 2005 4:27PM Security
Debate» Ethical hacking courses fail to provide practical information to security professionals

Debate» Ethical hacking courses fail to provide practical information to security professionals

Prof. Ken Jul 1 2005 4:20PM Security
Me and my job

Me and my job

Staff Writers Jul 1 2005 3:37PM Security
Consumer data storage

Consumer data storage

David Quainton Jul 1 2005 3:29PM Security
Me and my job

Me and my job

Staff Writers Jul 1 2005 3:20PM Security
So far, it’s a very bad year

So far, it’s a very bad year

The relentless stream of data security breaches is putting pressure on Congress to beef up consumer privacy protection.
Marcia Savage Jul 1 2005 3:16PM Security
Trust us, we’re experts…

Trust us, we’re experts…

Nick Barron Jul 1 2005 3:08PM Security
Are backups your back door?

Are backups your back door?

You might assume tapes have some kind of protection built-in, but you’d be wrong
Joanna Shields Jul 1 2005 2:07PM Security
We are dead wrong about risk

We are dead wrong about risk

Peter Stephenson,CeRNS, Jul 1 2005 2:02PM Security
A guide to safer coding

A guide to safer coding

Worried about your website being hacked? Robert Schifreen offers some advice on how to avoid becoming a victim
Robert Schifreen Jul 1 2005 1:05PM Security
Pull on your chief executive’s shoes

Pull on your chief executive’s shoes

Information security professionals are great at taking orders. Business leaders tell us what they want and we'll respond. We'll write rules and policies for use of email, the internet or remote access and we'll act as policemen when these rules are breached. But there's a real need for security professionals to step a little further outside this box.
Bob Spencer Jul 1 2005 12:56PM Security
Even the lifts are listening

Even the lifts are listening

When did you last check the security of your door-control system, wonders Gunter Ollmann
Gunter Ollmann Jul 1 2005 12:50PM Security
Future CSOs need you to teach them

Future CSOs need you to teach them

There is an old security adage: "Security is better if it is baked-in, rather than smeared on."
Gene Fredriksen Jul 1 2005 12:38PM Security
Forewarned: forearmed

Forewarned: forearmed

Good intelligence is the key to defeating cybercrime, Sharon Lemon, new head of the National Hi-Tech Crime Unit, tells René Millman. But that will only happen when there is a true partnership between UK plc and the police
René Millman Jul 1 2005 12:22PM Security
Be careful who you trust

Be careful who you trust

Joined-up business is a huge boon to organizations. But, warns Nationwide’s privacy chief, your partners need to be just as gung ho about security as you are. Marcia Savage reports
Marcia Savage Jul 1 2005 11:53AM Security

Log In

  |  Forgot your password?