Features

How to clean up after Sumitomo Mitsui

How to clean up after Sumitomo Mitsui

When the truth finally comes out about the attempted theft of £220 million from Sumitomo Mitsui Bank in March, it's likely to have all the hallmarks of an inside job – certainly that the crime relied on having people on the inside to carry it out.
Ron Condon May 13 2005 5:39PM Security
Debate: Educating users is a waste of time – firms would be wiser to spend more on technology

Debate: Educating users is a waste of time – firms would be wiser to spend more on technology

Robert Schifreen May 13 2005 5:35PM Security
2 MINUTES ON… Indexing good behaviour

2 MINUTES ON… Indexing good behaviour

René Millman May 13 2005 5:29PM Security
Me and my job

Me and my job

Staff Writers May 13 2005 5:23PM Security
An institute is the next step

An institute is the next step

The industry needs a body to set and monitor standards and ensure the fitness of its practitioners
Prof. Fred May 13 2005 5:18PM Security
Blogs are not always bad news

Blogs are not always bad news

Nick Barron, May 13 2005 5:12PM Security
To act, first you must learn to see

To act, first you must learn to see

David Lacey, May 13 2005 5:06PM Security
Reading a different script

Reading a different script

Hacking client-side scripting is a doddle, but it needn’t be a security hole, says Gunter Ollmann
Gunter Ollmann May 13 2005 4:59PM Security
Antivirus champion

Antivirus champion

When F-Secure’s Mikko Hypponen comes to town, people listen. David Quainton talks to the malware guru about the future of antivirus
David Quainton May 13 2005 4:06PM Security
Answering back

Answering back

How good are government departments at IT security? David Quainton tried to use the Freedom of Information Act to get the facts and figures
David Quainton May 13 2005 3:12PM Security
Industry and the state must reconnect

Industry and the state must reconnect

Security professionals in IT seem to be disheartened by federal officials on several fronts. This is the running theme across a couple of our features this month.
Illena Armstrong May 13 2005 12:37PM Security
Debate: Two-factor authentication access control will not prevent fraud and identity theft

Debate: Two-factor authentication access control will not prevent fraud and identity theft

Bruce Schneier May 13 2005 12:26PM Security
2 MINUTES ON… DNS cache poisoning

2 MINUTES ON… DNS cache poisoning

Marcia Savage May 13 2005 12:22PM Security
Me and my job

Me and my job

Staff Writers May 13 2005 12:16PM Security
Make friends to win influence

Make friends to win influence

The role of the CISO must be folded into the organization’s business lines
Marci McCarthy, May 13 2005 11:58AM Security
Risk is the one constant

Risk is the one constant

Peter Stephenson,CeRNS, May 13 2005 11:56AM Security
Cut cybercriminals off at the pass

Cut cybercriminals off at the pass

Sergio Pinon, May 13 2005 11:51AM Security
Failure must be a part of the plan

Failure must be a part of the plan

The trick is to acknowledge the danger and plan for the inevitable, as former White House advisor Richard Clarke tells Illena Armstrong
Illena Armstrong May 12 2005 5:26PM Security
This is your early warning system

This is your early warning system

Pen testing and vulnerability assessments are essentials. But how often and when these checks are made varies from one company to the next, as Marcia Savage found out
Marcia Savage May 12 2005 4:56PM Security
You can’t stop IM so learn to love it

You can’t stop IM so learn to love it

Instant messaging is the future, says Jim Carr, and there is a world of possibility waiting out there. But there is risk as well as benefit, and it must be faced
Jim Carr May 12 2005 4:36PM Security

Log In

  |  Forgot your password?