Features

Gates maps out future for Microsoft anti-virus

Gates maps out future for Microsoft anti-virus

Microsoft boss Bill Gates pledged further action to help users and firms improve security when he opened the RSA conference in San Francisco late February.
Marcia Savage Mar 17 2005 12:56PM Security
Mergers might mean chaos for anti-spam firms

Mergers might mean chaos for anti-spam firms

Two multi-billion dollar ISP mergers have sparked concern in the anti-spam community. SBC inked a $16 billion takeover of AT&T last month and Verizon has finalized a deal to buy out MCI for $6.7bn.
David Quainton Mar 17 2005 12:39PM Security
Password human error “could prove disastrous”

Password human error “could prove disastrous”

The latest research shows that the overwhelming majority of IT security breaches are down to human error.
René Millman Mar 17 2005 12:37PM Security
RSA strides out of safe zone to secure future

RSA strides out of safe zone to secure future

RSA launched a consumer service offering and an appliance at its San Francisco annual conference late February, strategic steps analysts said were bold but necessary.
Jon Tullett Mar 17 2005 12:34PM Security
Industry needs to agree on spyware

Industry needs to agree on spyware

Knocking out spyware is easier said than done, especially when what you say isn’t what you mean. Marcia Savage reports
Marcia Savage Mar 17 2005 12:27PM Security
Would you show this card to Mom?

Would you show this card to Mom?

Poor performance has prompted a move to learn from the private sector.
Illena Armstrong Mar 16 2005 5:24PM Security
Reluctant hero: How the NISCC came in from the cold

Reluctant hero: How the NISCC came in from the cold

Only the NISCC would launch a public website without telling anyone. Ron Condon meets the man who runs Britain’s IT defence unit
Ron Condon Mar 16 2005 4:21PM Security
Washington has a new champion

Washington has a new champion

Dave Cullinane, SC’s CSO of the Year, tells Illena Armstrong why infosec professionals need to be at the center of decision-making – and the best way to kill phishing sites
Illena Armstrong Mar 16 2005 3:52PM Security
Seven steps to heaven

Seven steps to heaven

Stressed? Worried? Can’t sleep at night? Lorne Boden explains his seven golden rules of risk management
Lorne Boden Mar 16 2005 2:18PM Security
Small flaws… big claws

Small flaws… big claws

It’s all too easy to let minor security problems get sidelined, warns Gunter Ollmann, but they need attention
Gunter Ollmann Mar 16 2005 1:51PM Security
Welcome to the new world order

Welcome to the new world order

Virus writers are as active as they ever were, warns Marcia Savage. But villains and spammers now want to use them and their tricks
Marcia Savage Mar 16 2005 12:32PM Security
Who let him in?

Who let him in?

Your company could be unwittingly letting a thief through the door. René Millman exposes the security holes in the world of deprovisioning, and reveals that ex-employees could easily know much more than you’d like
René Millman Mar 16 2005 12:03PM Security
Intelligent surveillance - the death of random review?

Intelligent surveillance - the death of random review?

Every financial institution today is at the mercy of constantly changing regulations. Each new mis-selling or market abuse scandal brings with it a tightening of the rules: whether it is a major shift like the introduction of the Sarbanes-Oxley Act and the Basel II Accord, or the cumulative effect of successive administrations and regulatory regimes adding new sections and clauses to existing regulations.
Bo Manning Mar 16 2005 10:21AM Security
The virus killer: A morning with the woodpecker king

The virus killer: A morning with the woodpecker king

Eugene Kaspersky is Moscow’s malware maestro. But, as David Quainton discovers, his management style is a little unorthodox
David Quainton Mar 15 2005 5:11PM Security
Identity crisis? Factoring the solutions

Identity crisis? Factoring the solutions

Richard E. Mackey Jr and Jonathan G. Gossels explain why they are not convinced by the FDIC’s recent report on two-factor authentication
Richard E. Mar 15 2005 3:39PM Security
Solid investment: Lehman meets ID goals

Solid investment: Lehman meets ID goals

When Lehman Brothers decided to deploy an identity management system, it opted for a complete solution. Illena Armstrong reports
Illena Armstrong Mar 15 2005 3:03PM Security
The traffic cop: Stopping bugs in transit

The traffic cop: Stopping bugs in transit

The Ivy League is just as exposed to malware as anyone, finds Marcia Savage. So how did Dartmouth College tackle the big issue?
Marcia Savage Mar 15 2005 2:29PM Security
Review: RSA SecurID for Microsoft Windows

Review: RSA SecurID for Microsoft Windows

Replacing the weak security of passwords with two-factor authentication is a no-brainer for security today, but there are still situations where passwords remain.

Jon Tullett Mar 15 2005 12:00AM Security
Review: Cyber-Ark Network Vault

Review: Cyber-Ark Network Vault

The Cyber-Ark Network Vault is a consistent enterprise solution that has been designed to provide a secure, central repository for the storage and management of sensitive shared documents, as well as administrative or privileged passwords using defense-in-depth.

Keith Pasley Mar 15 2005 12:00AM Security
Freedom for remote workers

Freedom for remote workers

Clientless virtual private networks (VPNs) have made go-anywhere remote working viable for a far greater number of companies, because they rein in the costs without compromising security.
David Beesley Mar 14 2005 11:34AM Security

Log In

  |  Forgot your password?