Features

Speaker held at JFK by NY immigration officials

Speaker held at JFK by NY immigration officials

John Sterlicchi Jan 10 2005 5:09PM Security
Educause and CIS in joint offering to colleges

Educause and CIS in joint offering to colleges

Staff Writers Jan 10 2005 5:00PM Security
Banks failing to tackle email phishing attacks

Banks failing to tackle email phishing attacks

David Quainton Jan 10 2005 4:53PM Security
Standing room only at Interchange

Standing room only at Interchange

From patching to wireless networks, CSOs’ various concerns run the gamut, as John Sterlicchi and Illena Armstrong discover
John Sterlicchi Jan 10 2005 3:57PM Security
Statistics point up lack of progress

Statistics point up lack of progress

Last year saw new threats but some old problems too, as Ron Condon reports
Ron Condon Jan 10 2005 3:45PM Security
Escape the fold: Stop being a sheep and be a dolphin

Escape the fold: Stop being a sheep and be a dolphin

Ron Condon speaks to a woman who trains IT professionals to win friends and influence people, right up to the boardroom
Ron Condon Jan 7 2005 5:28PM Security
Meet the board members

Meet the board members

SC Magazine has a new Editorial Advisory Board. Illena Armstrong polled the members for their views on the trends facing IT security, taking in topics ranging from vendor consolidation to the impact of the Patriot Act
Illena Armstrong Jan 7 2005 4:55PM Security
A new role for libraries?

A new role for libraries?

Should libraries be at the forefront of information security? Lee Ratzan is sure they have an important role
Lee Ratzan Jan 7 2005 4:23PM Security
10 XML best practices

10 XML best practices

Web services hold great commercial potential, but can be a security nightmare. DataPower Technology’s Eugene Kuznetsov lists the ten XML Web Services best practices
Eugene Kuznetsov Jan 7 2005 3:57PM Security
Microsoft and Cisco play nice

Microsoft and Cisco play nice

Unity has broken out in the realm of endpoint security. But for many organizations, grand plans and vision are all well and good, but what about the practicalities? René Millman goes in search of some answers
René Millman Jan 7 2005 3:21PM Security
Providing system support for doctors

Providing system support for doctors

A Pennsylvania hospital has extended its systems boundaries by providing staff with remote secure access
John Sterlicchi Jan 7 2005 2:53PM Security
New boundaries and new rules

New boundaries and new rules

Securing your perimeter is not what it used to be. John Sterlicchi finds out about the range of new ways to control your borders
John Sterlicchi Jan 7 2005 1:03PM Security
Is your website an easy target?

Is your website an easy target?

Working to strict deadlines and under financial constraints, website developers are often forced to place security near the bottom of the list of requirements. Marcia Savage looks at the inevitable consequences
Marcia Savage Jan 7 2005 12:38PM Security
Closing the door to web hackers

Closing the door to web hackers

More organizations are turning to remote access to boost productivity, but this makes them more vulnerable to malicious attacks. Check Point’s Niall Moynihan looks at how to go about protecting your web services
Niall Moynihan Jan 7 2005 11:47AM Security
The dangers of zero-day

The dangers of zero-day

We hear a lot about new vulnerabilities, but as Gunter Ollmann explains, there are still plenty waiting for a patch
Gunter Ollmann Jan 7 2005 11:22AM Security
Storage islands in a sea of risks

Storage islands in a sea of risks

More efficient networks have opened up your data to a host of new dangers. Scott Gordon outlines how best to protect it.
Scott Gordon Jan 6 2005 2:46PM Security
What you measure is what you get

What you measure is what you get

Creating Information Security Performance Measures: Five Recommendations for CIOs and CISOs
Edward Schwartz Jan 5 2005 2:07PM Security
Avoiding IT security mishaps in 2005

Avoiding IT security mishaps in 2005

Some new year resolutions for better information security practices.
Calum Macleod Jan 4 2005 4:15PM Security
Protect your Crown Jewels

Protect your Crown Jewels

Companies need to change their attitudes to outsourcing, says Neil Lloyd.
Neil Lloyd Jan 4 2005 2:36PM Security
Review: Client Migration 3.01

Review: Client Migration 3.01

Migrating users to new versions of applications or operating systems can be a complex, time-consuming and tedious process for systems administrators. And, from a security perspective, it is crucial that the migration of end-users and application settings is done properly in order to prevent vulnerabilities from creeping in.

Alan Bridges Dec 31 2004 12:00AM Security

Log In

  |  Forgot your password?