Features

Review: The Art of Intrusion

Review: The Art of Intrusion

Author Kevin Mitnick & William Simon

Jon Tullett Jun 30 2005 12:00AM Security
Four steps to business continuity

Four steps to business continuity

Complex business continuity plans just don’t work, warns Jonathan Gossels. So keep it simple
Jonathan Gossels, Jun 29 2005 5:01PM Security
Big phish to fry

Big phish to fry

Phishing is as lucrative as it is prolific. According to the latest official figures from UK payments body, APACS, phishing scams and Trojan keystroke loggers were behind UK online bank fraud totalling £12m in 2004; while BlackSpider Technologies estimates that nearly seven million phishing emails have been sent across the UK in the last month alone.
John Cheney, Jun 29 2005 10:31AM Security
Review: The Black Book on Corporate Security

Review: The Black Book on Corporate Security

Publisher Larstan

Jon Tullett Jun 29 2005 12:00AM Security
Keeping a vigil on viruses

Keeping a vigil on viruses

Last year a flaw in the way Microsoft applications process JPEG image files caused widespread alarm. The exploits could create a jpeg file formatted to trigger an overflow in a common Windows component and open a command shell on a vulnerable Windows system.
Michael Foreman Jun 27 2005 10:11AM Security
Best practices for implementing data security

Best practices for implementing data security

In recent years, enterprise security spending has focused primarily on firewalls, intrusion prevention, spam filtering and antivirus products, all designed to protect organizations’ IT boundaries.
Steve Crawford Jun 22 2005 2:19PM Security
It’s not just home users who are to blame

It’s not just home users who are to blame

Illena Armstrong Jun 21 2005 12:49PM Security
Never forget – it’s a people business

Never forget – it’s a people business

Ron Condon Jun 21 2005 12:44PM Security
Debate» IPS promises much in terms of extra security for networks, but the promise is a false one

Debate» IPS promises much in terms of extra security for networks, but the promise is a false one

Ron Smith Jun 21 2005 12:39PM Security
Debate» For remote access, IPsec’s time is up. In fact, it’s end should have come some time ago

Debate» For remote access, IPsec’s time is up. In fact, it’s end should have come some time ago

Gary Tomlinson Jun 21 2005 12:30PM Security
Firefox, browser-in-waiting

Firefox, browser-in-waiting

The Mozilla Foundation worked quickly to fix recent vulnerabilities in Firefox, but will the latest flaws dampen enthusiasm for the open source browser?
Marcia Savage Jun 21 2005 12:22PM Security
Me and my job

Me and my job

Staff Writers Jun 21 2005 12:18PM Security
Me and my job

Me and my job

Staff Writers Jun 21 2005 12:07PM Security
Only a total approach will do

Only a total approach will do

John Lyons Jun 21 2005 11:50AM Security
At a pinch, rules will be broken

At a pinch, rules will be broken

Nick Barron Jun 21 2005 11:38AM Security
Cyberspace, the wild frontier

Cyberspace, the wild frontier

Joe Stewart Jun 21 2005 11:32AM Security
Is risk an overused buzzword?

Is risk an overused buzzword?

Peter Stephenson,CeRNS, Jun 21 2005 11:10AM Security
Measure twice, cut once

Measure twice, cut once

Stress testing before buying is another reason firms need pentesting, says Gunter Ollmann
Gunter Ollmann Jun 21 2005 11:08AM Security
Make mobility a part of your strategy

Make mobility a part of your strategy

Staff Writers Jun 21 2005 10:48AM Security
USB flash in the Lan

USB flash in the Lan

You wouldn’t consider buying a laptop at your nearest consumer electronics store and bringing it into the office to work on, right? What about a RAID disk or a CD drive? – didn’t think so. Yet one device that nearly everyone buys privately and keeps in their pockets these days to store both their personal data and confidential corporate data is seldom controlled or secured by the corporation: USB flash drives.
Nimrod Reichenberg Jun 20 2005 10:24AM Security

Log In

  |  Forgot your password?