Features

The business of utilizing an IDS

The business of utilizing an IDS

Andrew Wilson explains why fancy intrusion detection technology is worth little if it is not supported by sound, mindful business decisions
Andrew Wilson Jul 15 2004 11:58AM Security
The holistic approach

The holistic approach

Rajesh Patel explains why devices, policies and people are all elements of optimal and total network security
Rajesh Patel Jul 15 2004 11:43AM Security
The four phases of SEM

The four phases of SEM

Jim McGrath explains how to collect, analyze, correlate and respond for complete security event management
Jim McGrath Jul 15 2004 11:38AM Security
As easy as one, two, ten

As easy as one, two, ten

A solid cybersecurity program requires more than three steps, but Paul Kurtz thinks they are surely worth it
A solid Jul 15 2004 11:26AM Security
It’s always the right time

It’s always the right time

Gunter Ollmann explains how security can be assessed at each phase of the application development lifecycle
Gunter Ollmann Jul 15 2004 11:20AM Security
Top 10 techniques to control spam for the enterprise

Top 10 techniques to control spam for the enterprise

Spam within the enterprise has undoubtedly evolved from an annoyance to a critical business problem. No approach to spam can work in isolation as unlike viruses, no single technology is able to stem the tide. I believe that by utilising the following top ten techniques an organisation can arm itself successfully against the menace of spam.
Colin Gray Jul 13 2004 2:52PM Security
Biometric security: more bottom-line benefits, less James Bond

Biometric security: more bottom-line benefits, less James Bond

NEC’s Gohringer cuts through the misconceptions that surround biometrics and puts forward the business case for the integration of biometric technologies into a company’s security strategy.
Carl Gohringer Jul 13 2004 11:38AM Security
Wi-Fi hotspots pose corporate security risk

Wi-Fi hotspots pose corporate security risk

Wi-fi has exploded across Britain this year, and is set to continue growing. The capability to improve mobile working means that wireless technology is allowing networked enterprises to tap into the true potential of their employees. But mobile users accessing the internet from corporate machines in Wi-fi hotspots are often doing so with little or no security controls in place. This could lead to network infection, which can have dramatic financial and operating consequences. With the average corporate enterprise infection costing an estimated £33,000 to repair, preventing infection at Wi-fi hotspots is a critical concern for many organisations.
Ian Schenkel Jul 13 2004 11:17AM Security
Smartphones are great tools, but at what risk?

Smartphones are great tools, but at what risk?

Hands up if you own a smartphone and feel secure. If so, maybe you haven’t been following the upward trends in Bluetooth vulnerabilities, Symbian worms and ordinary theft.
Jon Tullett Jul 8 2004 4:15PM Security
Forget the FUD line and stop the “geek-speak”

Forget the FUD line and stop the “geek-speak”

Some stats indicate that the IT security market is going to reach $40 billion by 2007. If you are a vendor offering something in that space that executives feel they need, you are going to be rolling in cash. For now, though, buyers are still a bit covetous with the green stuff.
Illena Armstrong Jul 8 2004 4:12PM Security
Crypto man

Crypto man

Whitfield Diffie made his name in encryption back in the 1970s, paving the way for modern e-commerce. Andy Coote learns more about his early work and hears his predictions for web services and grid computing
Andy Coote Jul 8 2004 4:07PM Security
Review: ID100

Review: ID100

A growing area of investment for enterprises large and small is the area of identity and access management of internal network users.
Keith Pasley Jul 8 2004 12:00AM Security
Review: Application Security Gateway

Review: Application Security Gateway

Controlling how your enterprise's employees are able to access external networks can be a difficult problem for most security managers.
René Millman Jul 8 2004 12:00AM Security
Spyware – a nuisance or a real threat?

Spyware – a nuisance or a real threat?

Spyware is a term whose use is becoming increasingly frequent in the lexicon of internet security threats. Just as computer users begin to think that their systems are protected against current menaces – various types of computer malware and spam, etc, so they are faced with yet another challenge. But just how big a threat is spyware for the corporate and home computer user today?
Matthieu Brignon Jul 6 2004 4:30PM Security
Surviving the CISSP boot camp

Surviving the CISSP boot camp

Certified Information Systems Security Professional (CISSP) is becoming an important industry accreditation for professionals working in IT security. But what does it involve and is it worthwhile? Mark Harris, chief information security officer at ASPACE Solutions, chose to do the intensive seven-day crash course and reflects on the experience.
Mark Harris Jul 6 2004 4:25PM Security
Computer viruses – the new arms race

Computer viruses – the new arms race

The stark reality is that network security in this internet age is a race. This race starts every time a new virus, worm or vulnerability is discovered; and only finishes when either an organisation’s network is protected or compromised.
Simon Heron, Jul 6 2004 11:35AM Security
Review: Secure Storage Router Pro

Review: Secure Storage Router Pro

On first appearance this router would seem another ho-hum product for sharing an internet connection within a small office/branch office, but looks can be deceiving. There maybe be similar looking devices on the market for a fraction of the price of this product but the amount of features make it a worthwhile consideration.

René Millman Jul 2 2004 12:00AM Security
Ex-hacker: The unspoken, dirty little secret

Ex-hacker: The unspoken, dirty little secret

I rarely make a bet, but if you asked me whether I'd wager some money on the likelihood of an organisation employing a hacker to assess their security risk, I'd almost certainly accept on the basis that they would not.
Jane Frankland Jun 29 2004 3:19PM Security
Is reactive patching the answer to protecting against known vulnerabilities?

Is reactive patching the answer to protecting against known vulnerabilities?

The time in which it takes hackers to write malicious code to exploit a known vulnerability is rapidly shrinking. The appearance of the Sasser worm in the shortest time ever, just 18 days between the revealing of a Microsoft vulnerability and the beginning of an attack, marks a new low point in the fight against cyber crime. With the protective window of opportunity getting ever smaller, the task of patching vulnerable software is becoming an increasingly endless one.
David Williamson Jun 29 2004 2:58PM Security
Third-generation security

Third-generation security

How virtualization technology is making layered security a reality
Tony Morrish Jun 29 2004 2:52PM Security

Log In

  |  Forgot your password?