Features

Email is a victim of its own success

Email is a victim of its own success

What began as a communication tool for the academic community is now rated as the most critical form of business communication.
Steve Ronksley Aug 17 2004 3:36PM Security
Betting against VOIP security

Betting against VOIP security

After more false dawns than a TV soap opera, IP Telephony (IPT) is finally happening in the mass market.
Denny Meijer Aug 17 2004 3:03PM Security
Review: Cyber Adversary Characterization

Review: Cyber Adversary Characterization

A book about the inner workings of the hacker's mind would not be complete without mentioning the world's most famous hacker, Kevin Mitnick. This book does not disappoint in that respect. This book deals with getting inside the mind of a hacker. It a kind of "know your enemy"-type book.

René Millman Aug 11 2004 12:00AM Security
Identity Management – an industry need

Identity Management – an industry need

There is a lot of talk recently about Identity Management (IM) solutions not only within enterprises that have teams to assess the variety of technology solutions available, but also by industry analysts whose job it is to size up the IM market space, including vendors. Increasingly, IM is also becoming a key focus of discussion at industry and analyst conferences on IT security.
Rosa Caputo Aug 10 2004 4:58PM Security
Who is in control of Sarbanes Oxley?

Who is in control of Sarbanes Oxley?

The deadline for compliance with Section 404 of the Sarbanes-Oxley requirements (SOX) will come into force at the close of this fiscal year. Companies disclosing their results must implement an internal control structure to assure the accuracy of financial reports, evaluate the control structure periodically and make sure that controls are tested at least annually by an independent audit firm.
Luke Brown Aug 10 2004 4:52PM Security
Corporations spend millions on single sign-on, yet don’t achieve their security goals

Corporations spend millions on single sign-on, yet don’t achieve their security goals

Single sign-on (SSO) has gained great popularity, but due to confusion in the marketplace, decision makers in many organizations don’t realize that SSO alone doesn’t adequately address their security requirements, nor does it address issues of compliance with Sarbanes-Oxley, the European Privacy Directives, HIPAA and other regulations. Though implementing SSO can be part of a good security infrastructure, it is only one aspect. Companies that don’t understand this can spend millions without accomplishing their goals.
Glenn Choquette Aug 10 2004 4:47PM Security
Outwit the web bandits

Outwit the web bandits

Gunter Ollmann explains the countermeasures you can use to actively respond to, and control, phishing attacks
Gunter Ollmann Aug 5 2004 4:55PM Security
It’s a very painful way to learn an obvious lesson

It’s a very painful way to learn an obvious lesson

Illena Armstrong Aug 5 2004 4:33PM Security
Who do you go to for all your browsing needs?

Who do you go to for all your browsing needs?

Jon Tullett Aug 5 2004 4:18PM Security
The busy life of a forensics expert

The busy life of a forensics expert

As an academic and expert witness and advisor to the government, Peter Sommer is a man trying to juggle his time, as Dan Ilett reports
Dan Ilett Aug 5 2004 4:11PM Security
How to curb those dispersed users

How to curb those dispersed users

What can you do if a careless user brings a worm into your network? Marcia Savage outlines how companies can control their mobile users
Marcia Savage Aug 5 2004 3:29PM Security
Divide and rule is the new way of working

Divide and rule is the new way of working

In a connected world, companies need to supplement the security perimeter with other technologies and techniques. Jonathan Gossels and Dick Mackey suggest that zoning could make a significant difference
Jonathan Gossels Aug 5 2004 2:37PM Security
Why strong walls are not enough

Why strong walls are not enough

The crucial job of guarding your enterprise’s network used to boil down to keeping the bad guys out. But as Marcia Savage explains, with wireless, web and remote access, protecting the perimeter is just the start of it
Marcia Savage Aug 5 2004 2:26PM Security
Why storage has to be for keeps

Why storage has to be for keeps

As the vulnerability of stored data grows, and legislation is passed to protect users, senior managers now face the threat of fines and even jail if data is lost on their watch. Failure is not an option, as Illena Armstrong reports
Illena Armstrong Aug 5 2004 1:07PM Security
Take control of your passwords

Take control of your passwords

The tight security at casinos needs to be extended to how the IT systems are used and accessed. John Sterlicchi reports on a case in point
John Sterlicchi Aug 5 2004 12:42PM Security
Long-distance data

Long-distance data

iSCSI was meant to provide a cheap way to link dispersed storage. Paul Hickingbotham reviews its progress
Paul Hickingbotham Aug 5 2004 12:40PM Security
New rules force a focus on data

New rules force a focus on data

If there is a dispute over an email sent last year, will you be able to locate it? Better make sure it’s stored away safely. Ron Condon reports
Ron Condon Aug 5 2004 12:17PM Security
Friend or foe? Show your ID, please!

Friend or foe? Show your ID, please!

What began as a communication tool for the academic community is now rated as the most critical form of business communication.
Steve Ronksley Aug 3 2004 11:04AM Security
To London and beyond

To London and beyond

The Madrid train bombs have raised fears that it is only a matter of when – rather than if – there will be a serious terrorist incident elsewhere. For my own part, I honestly believe that one will happen within two years – and that it will have a massive impact on how business continuity (BC) and disaster recovery (DR) is viewed in this country.
Neil Stephenson Aug 3 2004 10:51AM Security
Chips with everything - the benefits of chip and PIN

Chips with everything - the benefits of chip and PIN

Chip and PIN is on the minds of IT managers looking for EMV certification, finance directors seeking protection from credit card fraud, and store managers wanting to speed up the transaction process to reduce queuing times.
Staff Writers Aug 3 2004 10:35AM Security

Log In

  |  Forgot your password?