Features

Identity crisis? Factoring the solutions

Identity crisis? Factoring the solutions

Richard E. Mackey Jr and Jonathan G. Gossels explain why they are not convinced by the FDIC’s recent report on two-factor authentication
Richard E. Mar 15 2005 3:39PM Security
Solid investment: Lehman meets ID goals

Solid investment: Lehman meets ID goals

When Lehman Brothers decided to deploy an identity management system, it opted for a complete solution. Illena Armstrong reports
Illena Armstrong Mar 15 2005 3:03PM Security
The traffic cop: Stopping bugs in transit

The traffic cop: Stopping bugs in transit

The Ivy League is just as exposed to malware as anyone, finds Marcia Savage. So how did Dartmouth College tackle the big issue?
Marcia Savage Mar 15 2005 2:29PM Security
Review: RSA SecurID for Microsoft Windows

Review: RSA SecurID for Microsoft Windows

Replacing the weak security of passwords with two-factor authentication is a no-brainer for security today, but there are still situations where passwords remain.

Jon Tullett Mar 15 2005 12:00AM Security
Review: Cyber-Ark Network Vault

Review: Cyber-Ark Network Vault

The Cyber-Ark Network Vault is a consistent enterprise solution that has been designed to provide a secure, central repository for the storage and management of sensitive shared documents, as well as administrative or privileged passwords using defense-in-depth.

Keith Pasley Mar 15 2005 12:00AM Security
Freedom for remote workers

Freedom for remote workers

Clientless virtual private networks (VPNs) have made go-anywhere remote working viable for a far greater number of companies, because they rein in the costs without compromising security.
David Beesley Mar 14 2005 11:34AM Security
The growing menace of rootkits

The growing menace of rootkits

Rootkits are a fast-emerging security threat which can hide malware from conventional security tools. So how do they do this, and what can you do about them?
Patrik Runald Mar 9 2005 10:52AM Security
How to stay open and secure

How to stay open and secure

It’s a maxim that applies as much to network security as it does to protecting physical assets because there are many ways for a determined individual to penetrate a perimeter defense. Some threats like the Sobig virus instantly threatened networks through email attachments while T-Mobile’s customer data was hacked over a period of many months as reported in SC Magazine here.
Graham Welch Mar 7 2005 11:31AM Security
Zero day attacks

Zero day attacks

Zero Day attacks sound like an invention of science fiction, but the threat of damage from a previously unidentified – and therefore unprotected-against – risk to IT systems is becoming increasingly concerning for organizations.
Ian Schenkel Mar 2 2005 3:26PM Security
Perimeter security – The best option for SMEs?

Perimeter security – The best option for SMEs?

Internet threats have historically been classified as real threats from hackers and virus writers, and then the second order issue of time wasting caused by non-business internet browsing and by having to deal with spam.
Bob Jones Feb 28 2005 12:59PM Security
Can we trust our workforce?

Can we trust our workforce?

Traditionally, one of the most important assets of any successful company is its workforce. Competitive edge comes from employing hard-working, law-abiding motivated individuals with a strong company loyalty. Even for the odd employee, with a grudge against the company, the combination of laws and contracts in the past acted as sufficient deterrent to any wrong-doing.
Petri Säkkinen Feb 23 2005 4:55PM Security
Why good business is also good security

Why good business is also good security

February is a big month for SC Magazine this year. We'll be having our SC Magazine Awards ceremony and dinner for the first time in the U.S. on February 16 during the RSA Conference at San Francisco's Moscone Center. It is, by far, the biggest and swankiest event by which excellence in all things IT security is acknowledged.
Illena Armstrong Feb 22 2005 5:36PM Security
Fly the flag for Britain – in an international way

Fly the flag for Britain – in an international way

Without wishing to wave the Union Jack too vigorously, I couldn't help feeling a slight wave of pride at the achievements of the Jericho Forum, which is celebrating its first year of life.
Ron Condon Feb 22 2005 5:28PM Security
Getronics launches security centre following accord with Counterpane

Getronics launches security centre following accord with Counterpane

IT services company Getronics has launched its Network and Security Centre, from which it will offer managed security services, following a deal with US network security services company Counterpane.
Staff Writers Feb 22 2005 5:04PM Security
CMA needs teeth so that it can bite email fraudsters

CMA needs teeth so that it can bite email fraudsters

As we well know, the provenance of an email message can't be trusted. Sadly, the general internet-hooked public had only been made aware of this recently, as a result of two developments.
Robert Schifreen Feb 22 2005 5:00PM Security
We are standing on the shoulders of unsung giants

We are standing on the shoulders of unsung giants

The computer industry, like many others, has a number of 'celebrities' who are often thought of as its backbone. In reality, there is usually a much larger group of less well-known, or more often unheard of, people who contribute as much, if not more, to the industry's success than the popular press would have us believe.
Nick Barron Feb 22 2005 4:40PM Security
Embryonic infosec institute seeks funds in mission to raise standards

Embryonic infosec institute seeks funds in mission to raise standards

A professional institute for information security is beginning to take shape with the backing of high-profile users and academics.
Staff Writers Feb 22 2005 4:36PM Security
Instant messaging set to double in next 12 months

Instant messaging set to double in next 12 months

Leading companies in Europe anticipate an explosion in the use of instant messaging over the next year, but admit that the technology can be a security nightmare.
Ron Condon Feb 22 2005 3:07PM Security
Aon uses Postini for mail security

Aon uses Postini for mail security

Risk management and reinsurance giant Aon is deploying mail encryption across its UK operation, using email security service provider Postini to switch on TLS (Transport Layer Security) encryption at its mail gateways.
Staff Writers Feb 22 2005 3:02PM Security
Application compatibility may slow Firefox growth

Application compatibility may slow Firefox growth

The increasingly popular Firefox browser could stumble in its bid to make inroads into the corporate environment, despite its many plaudits for increased security and user-friendliness.
René Millman Feb 22 2005 3:01PM Security

Log In

  |  Forgot your password?