Features

Creating an ROI to justify information security budgets

Creating an ROI to justify information security budgets

The way to get the executive team to pay attention is to provide a quality ROI on any new initiative. If the boards of directors can’t understand the needs of various departments then the only way to their pocketbook is to present them with a bottom line return on their investment.
Ron Lepofsky Sep 22 2004 3:12PM Security
Set clear boundaries for USB storage

Set clear boundaries for USB storage

More security advice from an industry analyst doesn't usually rouse much interest. Then why such a stir after the recent Gartner Group report on threats from portable storage media?
Vladimir Chernavsky Sep 22 2004 3:11PM Security
F5 Networks and Radware cookie lawsuit crumbles

F5 Networks and Radware cookie lawsuit crumbles

F5 Networks and Radware have reached agreement to settle a patent dispute concerning alleged breaches of F5 Networks' US Patent No. 6,473,802 entitled, Method and System for Storing Load Balancing Information with a HTTP Cookie.
Robert Jaques Sep 21 2004 1:53PM Security
Go for zero point of compromise

Go for zero point of compromise

Joe Uniejewski warns that concentrating sensitive data in one place is no longer a responsible solution
Joe Uniejewski Sep 15 2004 2:50PM Security
Debunking the Security Tool Myth

Debunking the Security Tool Myth

As organizations continue to move more of their business online, and as they upgrade to newer, better, faster, feature-laden software, their vulnerability to cyberattacks grows, as does the pressure on security professionals entrusted to keep the infrastructure safe.
Tom Kuhr Sep 15 2004 10:52AM Security
When it comes to wireless security, good enough is simply not good

When it comes to wireless security, good enough is simply not good

As security threats increase in quantity and complexity, assuring business continuity means that corporations need to aggressively and proactively protect the entire network infrastructure.
Bethany Mayer Sep 15 2004 10:52AM Security
A five step process for achieving measurable returns on security investments

A five step process for achieving measurable returns on security investments

What do the president of the United States and a Fortune 1000 CIO have in common? For starters, both are responsible for mitigating immense security threats, maintaining budgets and justifying expenditures to governing committees for approval. They are also accountable for the failure or success of security in their respective domains.
Edward Schenk Sep 15 2004 10:52AM Security
The value of know-how

The value of know-how

When it comes to solving a problem Scott Rasmussen thinks a bit of common sense can go a long way
Scott Rasmussen Sep 14 2004 11:25AM Security
Review: Innominate mGuard

Review: Innominate mGuard

The mGuard security appliance from Innominate claims to be the smallest in the world - measuring in at 20 by 56 by 95mm. It is a firewall and IPSec VPN device that attaches on the back of a desktop computer or server and provides for secure transmission of data from the computer to the internet.

René Millman Sep 13 2004 12:00AM Security
Perimeter security is changing fast

Perimeter security is changing fast

Most security solutions today are built around attempting to protect the vulnerability of the PC and, or the server, by attempting to keep “bad” things outside of the network security perimeter. But, with the changing and disappearing perimeter - security now needs to be intrinsic in every system and for every user.
Bob Johnson Sep 7 2004 12:49PM Security
Security concerns over Metro Ethernet

Security concerns over Metro Ethernet

Ethernet technology has continually reinvented itself over the years to satisfy user requirements. It now supports a range of speeds from 10 Mbps to 10 Gbps, and due to the open, competitive nature of the Ethernet market, prices are very competitive. Ethernet has won the local area network (LAN) battle and is today a ubiquitous technology that provides connectivity for over 97 per cent of networking devices worldwide.
Rami Houbby Sep 7 2004 11:15AM Security
How to prevent the unknown attack - proactive filtering

How to prevent the unknown attack - proactive filtering

If you’re in corporate IT, it can be a difficult world keeping on top of security to keep your business systems running.
Dr. Horst Sep 7 2004 10:54AM Security
Microsoft making the headlines once again…

Microsoft making the headlines once again…

One of the most important announcements in August was the long-awaited release of SP2 for Windows XP. Although it is big step for Microsoft, "lukewarm" would be a kind way to describe its reception in the market.
Jon Tullett Sep 3 2004 4:59PM Security
It’s a testing time for all

It’s a testing time for all

Gunter Ollmann explains the dangers of penetration testing and reviews the best ways to reduce the risks
Gunter Ollmann Sep 3 2004 1:11PM Security
Do you already know your cyber attacker?

Do you already know your cyber attacker?

The victim of a hardware robbery decided to investigate things further when his business began to suffer. Justice was served as the culprits were caught and legal history was made. Neil Hare-Brown explains how
Neil Hare-Brown Sep 2 2004 3:18PM Security
Seven steps to combat cybercriminals in court

Seven steps to combat cybercriminals in court

With the number of cyber attacks escalating, dealing with digital evidence is becoming a pressing issue. Simon Janes gives you a helping hand, guiding you right through from the crime scene to the court room
Simon Janes Sep 2 2004 12:47PM Security
So who hit your network today?

So who hit your network today?

If disaster strikes, the first impulse is to get systems up and running again. But as Illena Armstrong discovers, that could be a bad move
Illena Armstrong Sep 2 2004 12:14PM Security
A problem shared could be a problem solved

A problem shared could be a problem solved

Typically, IT security professionals couldn't care less about public relations. They are too busy trying to keep their companies' computer systems securely up and running. And that particular duty is not simple.
Illena Armstrong Sep 2 2004 11:57AM Security
Chip-maker takes message control

Chip-maker takes message control

California-based company Kingston Technology recognized the security problems caused by the increased use of IM by its employees, so it took positive action to allow them to utilise the tool securely. John Sterlicchi reports
John Sterlicchi Sep 1 2004 5:01PM Security
Time for a tighter hold on IM usage

Time for a tighter hold on IM usage

While users are basking in the delights of the latest powerful communication tool, employers are likely to pay the price unless they implement strong policies that will help avoid any major threats, as Ron Condon reports
Ron Condon Sep 1 2004 4:52PM Security

Log In

  |  Forgot your password?