Features

Who is in control of Sarbanes Oxley?

Who is in control of Sarbanes Oxley?

The deadline for compliance with Section 404 of the Sarbanes-Oxley requirements (SOX) will come into force at the close of this fiscal year. Companies disclosing their results must implement an internal control structure to assure the accuracy of financial reports, evaluate the control structure periodically and make sure that controls are tested at least annually by an independent audit firm.
Luke Brown Aug 10 2004 4:52PM Security
Corporations spend millions on single sign-on, yet don’t achieve their security goals

Corporations spend millions on single sign-on, yet don’t achieve their security goals

Single sign-on (SSO) has gained great popularity, but due to confusion in the marketplace, decision makers in many organizations don’t realize that SSO alone doesn’t adequately address their security requirements, nor does it address issues of compliance with Sarbanes-Oxley, the European Privacy Directives, HIPAA and other regulations. Though implementing SSO can be part of a good security infrastructure, it is only one aspect. Companies that don’t understand this can spend millions without accomplishing their goals.
Glenn Choquette Aug 10 2004 4:47PM Security
Outwit the web bandits

Outwit the web bandits

Gunter Ollmann explains the countermeasures you can use to actively respond to, and control, phishing attacks
Gunter Ollmann Aug 5 2004 4:55PM Security
It’s a very painful way to learn an obvious lesson

It’s a very painful way to learn an obvious lesson

Illena Armstrong Aug 5 2004 4:33PM Security
Who do you go to for all your browsing needs?

Who do you go to for all your browsing needs?

Jon Tullett Aug 5 2004 4:18PM Security
The busy life of a forensics expert

The busy life of a forensics expert

As an academic and expert witness and advisor to the government, Peter Sommer is a man trying to juggle his time, as Dan Ilett reports
Dan Ilett Aug 5 2004 4:11PM Security
How to curb those dispersed users

How to curb those dispersed users

What can you do if a careless user brings a worm into your network? Marcia Savage outlines how companies can control their mobile users
Marcia Savage Aug 5 2004 3:29PM Security
Divide and rule is the new way of working

Divide and rule is the new way of working

In a connected world, companies need to supplement the security perimeter with other technologies and techniques. Jonathan Gossels and Dick Mackey suggest that zoning could make a significant difference
Jonathan Gossels Aug 5 2004 2:37PM Security
Why strong walls are not enough

Why strong walls are not enough

The crucial job of guarding your enterprise’s network used to boil down to keeping the bad guys out. But as Marcia Savage explains, with wireless, web and remote access, protecting the perimeter is just the start of it
Marcia Savage Aug 5 2004 2:26PM Security
Why storage has to be for keeps

Why storage has to be for keeps

As the vulnerability of stored data grows, and legislation is passed to protect users, senior managers now face the threat of fines and even jail if data is lost on their watch. Failure is not an option, as Illena Armstrong reports
Illena Armstrong Aug 5 2004 1:07PM Security
Take control of your passwords

Take control of your passwords

The tight security at casinos needs to be extended to how the IT systems are used and accessed. John Sterlicchi reports on a case in point
John Sterlicchi Aug 5 2004 12:42PM Security
Long-distance data

Long-distance data

iSCSI was meant to provide a cheap way to link dispersed storage. Paul Hickingbotham reviews its progress
Paul Hickingbotham Aug 5 2004 12:40PM Security
New rules force a focus on data

New rules force a focus on data

If there is a dispute over an email sent last year, will you be able to locate it? Better make sure it’s stored away safely. Ron Condon reports
Ron Condon Aug 5 2004 12:17PM Security
Friend or foe? Show your ID, please!

Friend or foe? Show your ID, please!

What began as a communication tool for the academic community is now rated as the most critical form of business communication.
Steve Ronksley Aug 3 2004 11:04AM Security
To London and beyond

To London and beyond

The Madrid train bombs have raised fears that it is only a matter of when – rather than if – there will be a serious terrorist incident elsewhere. For my own part, I honestly believe that one will happen within two years – and that it will have a massive impact on how business continuity (BC) and disaster recovery (DR) is viewed in this country.
Neil Stephenson Aug 3 2004 10:51AM Security
Chips with everything - the benefits of chip and PIN

Chips with everything - the benefits of chip and PIN

Chip and PIN is on the minds of IT managers looking for EMV certification, finance directors seeking protection from credit card fraud, and store managers wanting to speed up the transaction process to reduce queuing times.
Staff Writers Aug 3 2004 10:35AM Security
Review: LANDesk Asset Manager

Review: LANDesk Asset Manager

LANDesk Asset Manager – actually an add-in to the comprehensive LANDesk Management Suite 8.1 application – provides a host of valuable functionality.

Julian Ashbourn Aug 3 2004 12:00AM Security
Review: Altiris Asset Management Suite

Review: Altiris Asset Management Suite

Altiris speaks in terms of "lifecycle management," by which it means managing your IT-related assets throughout their useful term of operation. This is enabled by the provision of a core Notification Server, to which might be added a Server Provisioning Suite, a Client Management Suite , (CMS), and an Asset Management Suite, (AMS). The Altiris brochure also describes a utility named the Wise Package Studio which, as you might expect, provides for software distribution.

Julian Ashbourn Aug 3 2004 12:00AM Security
Review: Centennial Discovery

Review: Centennial Discovery

Centennial Discovery 4.51 is a comprehensive, but easy to use, auditing tool which might be used with a variety of client operating systems. It requires Microsoft SQL Server 7.0 or later, a run-time version of which is supplied on the installation CD.

Julian Ashbourn Aug 3 2004 12:00AM Security
Review: iInventory

Review: iInventory

This product is a straightforward and competent auditing tool whose apparent simplicity and ease of use will appeal to many system administrators.

Julian Ashbourn Aug 3 2004 12:00AM Security

Log In

  |  Forgot your password?