Features

Beating the social engineering scams: what employees must do to protect company data

Beating the social engineering scams: what employees must do to protect company data

While technology can dramatically reduce the risk associated with threats and vulnerabilities in enterprise IT, the human factor is always critical in a comprehensive security strategy.
John Roese Oct 27 2004 3:27PM Security
Back-up or pack-up?

Back-up or pack-up?

Data is the lifeblood of the organisation and any incidents, which stop access or result in a loss of critical data can have serious consequences for the business in terms of day-to-day operations and financial loss. This emphasises the ongoing need for back-up and recovery processes to be in place to minimise the effects of unplanned downtime and ensure the continuity of business processes. Paul Butler, principal consultant at Altiris, warns of the implications of not having sufficient processes in place to deal with the loss of business critical systems and data.
Paul Butler Oct 27 2004 3:27PM Security
Using events-per-second as a factor in selecting SEM tools

Using events-per-second as a factor in selecting SEM tools

Events Per Second, or EPS, as it is commonly referred to in the world of network security, is a measurement that is used to convey how fast a network generates data from its security devices (firewalls, Intrusion Detection Systems (IDS), servers, routers, etc.), and/or how fast an SEM product can correlate data from those devices. A savvy buyer will match the EPS his network is generating to those that can be accommodated by the SEM tool that he is purchasing.
Roberto Angelino, Oct 19 2004 5:46PM Security
Keeping email legal – the issues of email monitoring

Keeping email legal – the issues of email monitoring

Thanks to its speed, accessibility and ease of use, email is an essential part of both our business and personal lives. But as the IT departments charged with managing a company’s email deal with increasing volumes of traffic, spam levels and virus-infected mail, they also encounter a minefield of legal traps and regulatory pitfalls when they monitor employees’ emails.
Ken Watt Oct 19 2004 5:46PM Security
Why every business needs an SCM strategy

Why every business needs an SCM strategy

Running a business has changed a lot over time—businesses are increasingly becoming more global in nature and constantly taking advantage of technology to help them become more efficient, cost conscious and competitive.
Zoe Lowther Oct 19 2004 5:46PM Security
ID mapping: the compliance key

ID mapping: the compliance key

Brian Milas argues that identity mapping offers cost and security benefits, while meeting strict regulations
Brian Milas Oct 15 2004 4:59PM Security
BT’s new boy is ready for action

BT’s new boy is ready for action

Ray Stanton has been set a tough goal – to turn BT into a major force in managed security services. Ron Condon finds out about how he plans to go about it
Ron Condon Oct 15 2004 4:25PM Security
We are all doomed – if you believe the hype

We are all doomed – if you believe the hype

Jon Tullett Oct 15 2004 4:24PM Security
We must beat these automated attackers

We must beat these automated attackers

Automated intrusion worms go around exploiting network vulnerabilities at a rapid rate and can be hard to beat. Kevin Mandia talks about some tried and tested methods used in response to these type of attacks
Kevin Mandia Oct 15 2004 4:24PM Security
Don’t hesitate to call in the professionals

Don’t hesitate to call in the professionals

After online banking customers suffer an attack, financial institutions often look for answers in the wrong places. Kevin Mandia explains why it’s worth investigating the victim’s PC to discover the origins of an attack
Kevin Mandia Oct 15 2004 4:23PM Security
Time to call out the detectives

Time to call out the detectives

Once, the primary goal was to protect network perimeters. But today’s methodologies can do a great deal more than that.
Yiannis Vassiliades Oct 15 2004 4:23PM Security
A safer way to stay in contact

A safer way to stay in contact

As workforces are becoming increasingly mobile, companies are searching for a variety of technologies to secure mobile users.
Marcia Savage Oct 15 2004 4:22PM Security
Biometrics: How to plan your very own project

Biometrics: How to plan your very own project

Good planning before you implement biometrics is key if you want to reap the benefits of this technology, Martin Jacobs explains why
Martin Jacobs Oct 15 2004 4:22PM Security
Biometrics get the thumbs up

Biometrics get the thumbs up

The appeal of biometrics is growing, as more and more organizations are noting the many benefits it offers. Illena Armstrong explains why trends are now changing
Illena Armstrong Oct 15 2004 4:21PM Security
The fine art of patience

The fine art of patience

Gunter Ollmann explains why testing your system before it is ready is a time-wasting and expensive experience
Gunter Ollmann Oct 15 2004 4:21PM Security
The key to secure email

The key to secure email

James Angle explains the changes his hospital undertook in order to secure its confidential health data for HIPAA
Staff Writers Oct 15 2004 4:20PM Security
Industry’s voice up on Capitol Hill

Industry’s voice up on Capitol Hill

Some in the industry have accused the Cyber Security Industry Alliance of being just a ploy to curb government interference. But CSIA’s leader Paul Kurtz insists the group has much wider goals.
Marcia Savage Oct 15 2004 4:20PM Security
A new breed of criminal on the scene

A new breed of criminal on the scene

The Gartner IT summit has highlighted the need for user awareness in light of the rise of sinister attacks.
Ron Condon Oct 15 2004 4:19PM Security
A life-threatening security problem?

A life-threatening security problem?

Having a medical scan may no longer be the life-saving process we once thought it was.
John Sterlicchi Oct 15 2004 4:19PM Security
Facing up to the spate of menacing attacks

Facing up to the spate of menacing attacks

Illena Armstrong Oct 15 2004 4:18PM Security

Log In

  |  Forgot your password?