Features

Blogs are not always bad news

Blogs are not always bad news

Nick Barron, May 13 2005 5:12PM Security
To act, first you must learn to see

To act, first you must learn to see

David Lacey, May 13 2005 5:06PM Security
Reading a different script

Reading a different script

Hacking client-side scripting is a doddle, but it needn’t be a security hole, says Gunter Ollmann
Gunter Ollmann May 13 2005 4:59PM Security
Antivirus champion

Antivirus champion

When F-Secure’s Mikko Hypponen comes to town, people listen. David Quainton talks to the malware guru about the future of antivirus
David Quainton May 13 2005 4:06PM Security
Answering back

Answering back

How good are government departments at IT security? David Quainton tried to use the Freedom of Information Act to get the facts and figures
David Quainton May 13 2005 3:12PM Security
Industry and the state must reconnect

Industry and the state must reconnect

Security professionals in IT seem to be disheartened by federal officials on several fronts. This is the running theme across a couple of our features this month.
Illena Armstrong May 13 2005 12:37PM Security
Debate: Two-factor authentication access control will not prevent fraud and identity theft

Debate: Two-factor authentication access control will not prevent fraud and identity theft

Bruce Schneier May 13 2005 12:26PM Security
2 MINUTES ON… DNS cache poisoning

2 MINUTES ON… DNS cache poisoning

Marcia Savage May 13 2005 12:22PM Security
Me and my job

Me and my job

Staff Writers May 13 2005 12:16PM Security
Make friends to win influence

Make friends to win influence

The role of the CISO must be folded into the organization’s business lines
Marci McCarthy, May 13 2005 11:58AM Security
Risk is the one constant

Risk is the one constant

Peter Stephenson,CeRNS, May 13 2005 11:56AM Security
Cut cybercriminals off at the pass

Cut cybercriminals off at the pass

Sergio Pinon, May 13 2005 11:51AM Security
Failure must be a part of the plan

Failure must be a part of the plan

The trick is to acknowledge the danger and plan for the inevitable, as former White House advisor Richard Clarke tells Illena Armstrong
Illena Armstrong May 12 2005 5:26PM Security
This is your early warning system

This is your early warning system

Pen testing and vulnerability assessments are essentials. But how often and when these checks are made varies from one company to the next, as Marcia Savage found out
Marcia Savage May 12 2005 4:56PM Security
You can’t stop IM so learn to love it

You can’t stop IM so learn to love it

Instant messaging is the future, says Jim Carr, and there is a world of possibility waiting out there. But there is risk as well as benefit, and it must be faced
Jim Carr May 12 2005 4:36PM Security
Instant futures

Instant futures

Instant messaging has bridged the gap between consumer toy and business tool, says Bill Scott, but development challenges still remain
Bill Scott May 12 2005 4:16PM Security
Will HIPAA bite?

Will HIPAA bite?

Health care organizations are waiting to see how this year’s big legal change is enforced. Marcia Savage takes the industry’s pulse on HIPAA
Marcia Savage May 12 2005 4:06PM Security
Sticking plaster that won’t stick

Sticking plaster that won’t stick

Why has HIPAA failed to achieve the same level of success as SoX, asks Ben Rothke
Ben Rothke May 12 2005 12:11PM Security
Review: LogMeIn

Review: LogMeIn

When 3am Labs asked us to review LogMeIn, we were not sure whether it was really appropriate for SC Magazine. The software is primarily a tool for web-based remote access and administration (there is a "network console" version for enterprise administrators, too). But it has a surprisingly broad set of security features, as well as some clever ways to tie down possible vulnerabilities in remote administration.

Jon Tullett May 12 2005 12:00AM Security
3G dream a security nightmare

3G dream a security nightmare

Smart mobile technology is rapidly gaining in popularity – and hackers and crackers are among its biggest fans! Very few consumers know about the vulnerabilities of 3G technology, and only now is the industry waking up to the potential security nightmare.
Hamid Jahankhani May 11 2005 2:07PM Security

Log In

  |  Forgot your password?