Features

2 MINUTES ON… Data breaches and the law

2 MINUTES ON… Data breaches and the law

The recent spate of breaches involving thousands of Americans' sensitive data has prompted calls for legislation to protect consumer information. But some security experts disagree.
Marcia Savage Apr 19 2005 1:16PM Security
Me and my job

Me and my job

Damien Adams, systems administrator, Juvenile Welfare Board, Pinellas County, FL
Staff Writers Apr 19 2005 1:06PM Security
Welcome to your new-look SC Magazine

Welcome to your new-look SC Magazine

We've got a brand-new look in SC Magazine from this month, with a fast-paced new opening section that is designed to give you as complete a picture of what's happening around the world of IT security as you'll find anywhere.
Ron Condon Apr 19 2005 12:58PM Security
Debate: Everyone knows Linux is the safest OS, and there’s no way that Windows can compete

Debate: Everyone knows Linux is the safest OS, and there’s no way that Windows can compete

Any time one compares Linux and Windows security one risks unleashing a cataract of opinion.
Richard Ford Apr 19 2005 12:42PM Security
2 MINUTES ON… Keyloggers: invisible threat

2 MINUTES ON… Keyloggers: invisible threat

The recent attempted robbery of £220 million from the Sumitomo Mitsui Bank in London last month has brought the problem of spyware and keyloggers into sharp relief.
René Millman Apr 19 2005 12:29PM Security
Me and my job

Me and my job

Gary Cooper, Senior technical consultant, Whale Communications
Staff Writers Apr 19 2005 12:22PM Security
Command and communication

Command and communication

Your role is to remove jargon and explain information assurance in everyday words
Mike Harrison, Apr 19 2005 11:44AM Security
Pull out the pin and stand back

Pull out the pin and stand back

It must be that time of year again. The evenings are getting lighter, the birds are singing and yet again a survey has found that many computer users are blissfully unaware of the need to securely erase data.
Nick Barron, Apr 19 2005 11:39AM Security
Can’t see the wood for the trees?

Can’t see the wood for the trees?

As CISOs, we have to play a long game, focusing on longer-term investments in security that might take years to mature, but will make our businesses ultimately more secure. And the longest game I play is with security monitoring.
John Meakin, Apr 19 2005 11:31AM Security
Builders can’t always fix it

Builders can’t always fix it

As the pressure increases to get vital security fixes out in double-quick time, so do mistakes, says Gunter Ollmann
Gunter Ollmann Apr 19 2005 10:53AM Security
Death threats, the Mafia, and Steve

Death threats, the Mafia, and Steve

Out on the Thames is a man who cannot stop rocking the boat. David Quainton gets inside Spamhaus.org
David Quainton Apr 19 2005 10:20AM Security
A rock and a hard place

A rock and a hard place

Balancing an organization's security risk, productivity and security technology investment has been the archetypal IT security challenge. However, with costs now spiralling as a result of a plethora of new regulatory compliance requirements and the need to support federated identities, organizations need to embrace automation and 'self-service' Identity Management technologies to attain the required levels of security, without tying the organization in knots and sucking it dry of profit.
Robert Rawson Apr 18 2005 1:50PM Security
What it comes down to is risk

What it comes down to is risk

Any good information security program should always relate to the business case and its tolerance for risk. The risk tolerance of an organization is the baseline that the program should address, including any additional legal requirements.
Kevin Dickey, Apr 18 2005 12:45PM Security
Infosec is complex. Get over it

Infosec is complex. Get over it

When does theory become practice? Should information security practitioners be concerned about theory?
Peter Stephenson, Apr 18 2005 12:42PM Security
Two cups honey, one dash vinegar

Two cups honey, one dash vinegar

One of my mother's favorite maxims is: "You catch more flies with honey than you do with vinegar."
Mary Ann Apr 18 2005 12:35PM Security
Keep a grip on your assets

Keep a grip on your assets

Intellectual property is a company’s best friend, so Cigna’s CISO takes a holistic approach to guarding it. Marcia Savage reports
Marcia Savage Apr 18 2005 12:24PM Security
Beware the devil on your desktop

Beware the devil on your desktop

That wireless access point you don’t recognize on the finance boss’s desk could be an open door for hackers. René Millman outlines why
René Millman Apr 13 2005 3:21PM Security
Slam the door on the bad guys

Slam the door on the bad guys

DDoS attacks represent one of the most serious threats to business continuity. But it is possible to fight back, as John Sterlicchi discovers
John Sterlicchi Apr 13 2005 3:00PM Security
Castle makes its mark

Castle makes its mark

Assailed by a horde of paperwork and dominated by a mountain of forms, White Castle knew it had to act. John Sterlicchi found out how
John Sterlicchi Apr 13 2005 2:43PM Security
Not a patch on Padgett

Not a patch on Padgett

Todd Padgett’s business was booming, but so was the malware on his network. He called in the professionals, and Marcia Savage called him
Marcia Savage Apr 13 2005 2:33PM Security

Log In

  |  Forgot your password?