Features

Securing removable media

Securing removable media

Removable media devices are here to stay. Their ease of use and low cost have made them ubiquitous in the work environment – but at what price? In this article we look at the pro’s and con’s of removable media, and the steps IT managers can take to mitigate the security risks associated with them.
Magnus Ahlberg Nov 2 2004 4:25PM Security
California law hits firms nationwide

California law hits firms nationwide

Firms used to like handling security breaches quietly but that is no longer an option
Marcia Savage Oct 29 2004 5:04PM Security
Review: Windows Forensics and Incident Recovery

Review: Windows Forensics and Incident Recovery

Every attack on a computer system leaves a trace behind, no matter what an attacker might to to cover their steps. Also, data can be hidden by an attacker to use later as a back door. Forensics in part looks at uncovering evidence of this activity.

René Millman Oct 28 2004 12:00AM Security
Multi-layer dual firewall topologies

Multi-layer dual firewall topologies

The use of a multi-layer dual firewall topology is relatively new in network security, but it is rapidly gaining in popularity.
Paul A. Oct 27 2004 3:27PM Security
Beating the social engineering scams: what employees must do to protect company data

Beating the social engineering scams: what employees must do to protect company data

While technology can dramatically reduce the risk associated with threats and vulnerabilities in enterprise IT, the human factor is always critical in a comprehensive security strategy.
John Roese Oct 27 2004 3:27PM Security
Back-up or pack-up?

Back-up or pack-up?

Data is the lifeblood of the organisation and any incidents, which stop access or result in a loss of critical data can have serious consequences for the business in terms of day-to-day operations and financial loss. This emphasises the ongoing need for back-up and recovery processes to be in place to minimise the effects of unplanned downtime and ensure the continuity of business processes. Paul Butler, principal consultant at Altiris, warns of the implications of not having sufficient processes in place to deal with the loss of business critical systems and data.
Paul Butler Oct 27 2004 3:27PM Security
Using events-per-second as a factor in selecting SEM tools

Using events-per-second as a factor in selecting SEM tools

Events Per Second, or EPS, as it is commonly referred to in the world of network security, is a measurement that is used to convey how fast a network generates data from its security devices (firewalls, Intrusion Detection Systems (IDS), servers, routers, etc.), and/or how fast an SEM product can correlate data from those devices. A savvy buyer will match the EPS his network is generating to those that can be accommodated by the SEM tool that he is purchasing.
Roberto Angelino, Oct 19 2004 5:46PM Security
Keeping email legal – the issues of email monitoring

Keeping email legal – the issues of email monitoring

Thanks to its speed, accessibility and ease of use, email is an essential part of both our business and personal lives. But as the IT departments charged with managing a company’s email deal with increasing volumes of traffic, spam levels and virus-infected mail, they also encounter a minefield of legal traps and regulatory pitfalls when they monitor employees’ emails.
Ken Watt Oct 19 2004 5:46PM Security
Why every business needs an SCM strategy

Why every business needs an SCM strategy

Running a business has changed a lot over time—businesses are increasingly becoming more global in nature and constantly taking advantage of technology to help them become more efficient, cost conscious and competitive.
Zoe Lowther Oct 19 2004 5:46PM Security
ID mapping: the compliance key

ID mapping: the compliance key

Brian Milas argues that identity mapping offers cost and security benefits, while meeting strict regulations
Brian Milas Oct 15 2004 4:59PM Security
BT’s new boy is ready for action

BT’s new boy is ready for action

Ray Stanton has been set a tough goal – to turn BT into a major force in managed security services. Ron Condon finds out about how he plans to go about it
Ron Condon Oct 15 2004 4:25PM Security
We are all doomed – if you believe the hype

We are all doomed – if you believe the hype

Jon Tullett Oct 15 2004 4:24PM Security
We must beat these automated attackers

We must beat these automated attackers

Automated intrusion worms go around exploiting network vulnerabilities at a rapid rate and can be hard to beat. Kevin Mandia talks about some tried and tested methods used in response to these type of attacks
Kevin Mandia Oct 15 2004 4:24PM Security
Don’t hesitate to call in the professionals

Don’t hesitate to call in the professionals

After online banking customers suffer an attack, financial institutions often look for answers in the wrong places. Kevin Mandia explains why it’s worth investigating the victim’s PC to discover the origins of an attack
Kevin Mandia Oct 15 2004 4:23PM Security
Time to call out the detectives

Time to call out the detectives

Once, the primary goal was to protect network perimeters. But today’s methodologies can do a great deal more than that.
Yiannis Vassiliades Oct 15 2004 4:23PM Security
A safer way to stay in contact

A safer way to stay in contact

As workforces are becoming increasingly mobile, companies are searching for a variety of technologies to secure mobile users.
Marcia Savage Oct 15 2004 4:22PM Security
Biometrics: How to plan your very own project

Biometrics: How to plan your very own project

Good planning before you implement biometrics is key if you want to reap the benefits of this technology, Martin Jacobs explains why
Martin Jacobs Oct 15 2004 4:22PM Security
Biometrics get the thumbs up

Biometrics get the thumbs up

The appeal of biometrics is growing, as more and more organizations are noting the many benefits it offers. Illena Armstrong explains why trends are now changing
Illena Armstrong Oct 15 2004 4:21PM Security
The fine art of patience

The fine art of patience

Gunter Ollmann explains why testing your system before it is ready is a time-wasting and expensive experience
Gunter Ollmann Oct 15 2004 4:21PM Security
The key to secure email

The key to secure email

James Angle explains the changes his hospital undertook in order to secure its confidential health data for HIPAA
Staff Writers Oct 15 2004 4:20PM Security

Log In

  |  Forgot your password?