Features

Complying with identity management

Complying with identity management

In recent years a series of laws, regulations and standards have been introduced in Europe and North America, which directly or indirectly make new demands on companies’ IT security and IT risk management. Whereas in the past IT managers and security personnel largely autonomously determined a company’s IT security policy, IT administrators are now faced with the necessity of analyzing the relevant industry-specific regulations and implementing these in a range of concrete measures.
Dr. Martin May 31 2005 11:06AM Security
The Patch Payback Problem

The Patch Payback Problem

On the second Tuesday of every month, Microsoft releases its latest compilation of security patches, prompting security professionals to quickly evaluate the impact of each on their entire infrastructure, put together a test and implementation plan, and efficiently close up those pesky vulnerabilities before the bad guys can get through. Just like clockwork, right? Don’t we wish!
Rick Blum May 25 2005 10:45AM Security
MyDoom: whodunit?

MyDoom: whodunit?

A new worm spread rapidly through the Internet at the end of last month, using clever tactics to dupe users and a sneaky payload which may have diverted attention from its real goal.
Jon Tullett May 23 2005 3:45PM Security
The codebreaker menace

The codebreaker menace

It’s an axiom of software development that every program will contain between five and 50 bugs per 1,000 lines of code. And five is reckoned to be only the most optimistic result; the reality is much closer to 50.
Maksym Schipka May 23 2005 10:46AM Security
Infosec: no longer just the IT department’s concern

Infosec: no longer just the IT department’s concern

In today’s ever increasing security conscious market, it is no longer sufficient simply to delegate the information security of an organization to the network administration staff.
John Golden May 18 2005 10:50AM Security
Protecting the borderless enterprise

Protecting the borderless enterprise

The well-publicized cases of information leakage in recent news articles have brought to light the risks of the borderless enterprise.
Staff Writers May 16 2005 11:30AM Security
How to clean up after Sumitomo Mitsui

How to clean up after Sumitomo Mitsui

When the truth finally comes out about the attempted theft of £220 million from Sumitomo Mitsui Bank in March, it's likely to have all the hallmarks of an inside job – certainly that the crime relied on having people on the inside to carry it out.
Ron Condon May 13 2005 5:39PM Security
Debate: Educating users is a waste of time – firms would be wiser to spend more on technology

Debate: Educating users is a waste of time – firms would be wiser to spend more on technology

Robert Schifreen May 13 2005 5:35PM Security
2 MINUTES ON… Indexing good behaviour

2 MINUTES ON… Indexing good behaviour

René Millman May 13 2005 5:29PM Security
Me and my job

Me and my job

Staff Writers May 13 2005 5:23PM Security
An institute is the next step

An institute is the next step

The industry needs a body to set and monitor standards and ensure the fitness of its practitioners
Prof. Fred May 13 2005 5:18PM Security
Blogs are not always bad news

Blogs are not always bad news

Nick Barron, May 13 2005 5:12PM Security
To act, first you must learn to see

To act, first you must learn to see

David Lacey, May 13 2005 5:06PM Security
Reading a different script

Reading a different script

Hacking client-side scripting is a doddle, but it needn’t be a security hole, says Gunter Ollmann
Gunter Ollmann May 13 2005 4:59PM Security
Antivirus champion

Antivirus champion

When F-Secure’s Mikko Hypponen comes to town, people listen. David Quainton talks to the malware guru about the future of antivirus
David Quainton May 13 2005 4:06PM Security
Answering back

Answering back

How good are government departments at IT security? David Quainton tried to use the Freedom of Information Act to get the facts and figures
David Quainton May 13 2005 3:12PM Security
Industry and the state must reconnect

Industry and the state must reconnect

Security professionals in IT seem to be disheartened by federal officials on several fronts. This is the running theme across a couple of our features this month.
Illena Armstrong May 13 2005 12:37PM Security
Debate: Two-factor authentication access control will not prevent fraud and identity theft

Debate: Two-factor authentication access control will not prevent fraud and identity theft

Bruce Schneier May 13 2005 12:26PM Security
2 MINUTES ON… DNS cache poisoning

2 MINUTES ON… DNS cache poisoning

Marcia Savage May 13 2005 12:22PM Security
Me and my job

Me and my job

Staff Writers May 13 2005 12:16PM Security

Log In

  |  Forgot your password?