Features

Command and communication

Command and communication

Your role is to remove jargon and explain information assurance in everyday words
Mike Harrison, Apr 19 2005 11:44AM Security
Pull out the pin and stand back

Pull out the pin and stand back

It must be that time of year again. The evenings are getting lighter, the birds are singing and yet again a survey has found that many computer users are blissfully unaware of the need to securely erase data.
Nick Barron, Apr 19 2005 11:39AM Security
Can’t see the wood for the trees?

Can’t see the wood for the trees?

As CISOs, we have to play a long game, focusing on longer-term investments in security that might take years to mature, but will make our businesses ultimately more secure. And the longest game I play is with security monitoring.
John Meakin, Apr 19 2005 11:31AM Security
Builders can’t always fix it

Builders can’t always fix it

As the pressure increases to get vital security fixes out in double-quick time, so do mistakes, says Gunter Ollmann
Gunter Ollmann Apr 19 2005 10:53AM Security
Death threats, the Mafia, and Steve

Death threats, the Mafia, and Steve

Out on the Thames is a man who cannot stop rocking the boat. David Quainton gets inside Spamhaus.org
David Quainton Apr 19 2005 10:20AM Security
A rock and a hard place

A rock and a hard place

Balancing an organization's security risk, productivity and security technology investment has been the archetypal IT security challenge. However, with costs now spiralling as a result of a plethora of new regulatory compliance requirements and the need to support federated identities, organizations need to embrace automation and 'self-service' Identity Management technologies to attain the required levels of security, without tying the organization in knots and sucking it dry of profit.
Robert Rawson Apr 18 2005 1:50PM Security
What it comes down to is risk

What it comes down to is risk

Any good information security program should always relate to the business case and its tolerance for risk. The risk tolerance of an organization is the baseline that the program should address, including any additional legal requirements.
Kevin Dickey, Apr 18 2005 12:45PM Security
Infosec is complex. Get over it

Infosec is complex. Get over it

When does theory become practice? Should information security practitioners be concerned about theory?
Peter Stephenson, Apr 18 2005 12:42PM Security
Two cups honey, one dash vinegar

Two cups honey, one dash vinegar

One of my mother's favorite maxims is: "You catch more flies with honey than you do with vinegar."
Mary Ann Apr 18 2005 12:35PM Security
Keep a grip on your assets

Keep a grip on your assets

Intellectual property is a company’s best friend, so Cigna’s CISO takes a holistic approach to guarding it. Marcia Savage reports
Marcia Savage Apr 18 2005 12:24PM Security
Beware the devil on your desktop

Beware the devil on your desktop

That wireless access point you don’t recognize on the finance boss’s desk could be an open door for hackers. René Millman outlines why
René Millman Apr 13 2005 3:21PM Security
Slam the door on the bad guys

Slam the door on the bad guys

DDoS attacks represent one of the most serious threats to business continuity. But it is possible to fight back, as John Sterlicchi discovers
John Sterlicchi Apr 13 2005 3:00PM Security
Castle makes its mark

Castle makes its mark

Assailed by a horde of paperwork and dominated by a mountain of forms, White Castle knew it had to act. John Sterlicchi found out how
John Sterlicchi Apr 13 2005 2:43PM Security
Not a patch on Padgett

Not a patch on Padgett

Todd Padgett’s business was booming, but so was the malware on his network. He called in the professionals, and Marcia Savage called him
Marcia Savage Apr 13 2005 2:33PM Security
Infosec not just IT dept concern

Infosec not just IT dept concern

In today’s ever increasing security conscious market, it is no longer sufficient simply to delegate the information security of an organization to the network administration staff.
John Golden Apr 13 2005 1:06PM Security
Winning the security disinformation war

Winning the security disinformation war

If IT security is a battle, most companies are faced with the problem of managing a motley army of security devices and solutions.
Jean-Francois Dechant Apr 11 2005 2:27PM Security
Review: Webroot Spy Sweeper Enterprise

Review: Webroot Spy Sweeper Enterprise

The emerging spyware threat is spawning a horde of anti-spyware products. Some have been around for a while, such as the excellent AdAware and Spybot – Search and Destroy.

Jon Tullett Apr 11 2005 12:00AM Security
Review: DESlock+

Review: DESlock+

We have looked at DESlock+ before, with its DESkey USB tokens and file encryption software. And while the previous version impressed us enough to win Best Buy in our Data Encryption test last year, it is safe to say that the product has been improved by leaps and bounds since then.

Jon Tullett Apr 8 2005 12:00AM Security
Review: NMS for PC

Review: NMS for PC

NMS for PC v2.8 is a file encryption system with some interesting bells and whistles. The software integrates into the Windows logon process, using logon to ensure that access to encrypted data is limited to authorized users.

Jon Tullett Apr 8 2005 12:00AM Security
Review: PKWARE SecureZIP for Windows

Review: PKWARE SecureZIP for Windows

Using zip archives to compress and transfer files has become such a standard part of everyday computing that the notion of using the same tools for security should come easily to most users.

Jon Tullett Apr 8 2005 12:00AM Security

Log In

  |  Forgot your password?