Features

Prepare for more threats on Valentine’s Day

Prepare for more threats on Valentine’s Day

Akonix Systems, an enterprise security solutions provider, is warning companies to be on guard for additional infosec threats come Valentine’s Day.
Illena Armstrong Jan 28 2004 9:50PM Security
Top 10 list of web application vulnerabilities released

Top 10 list of web application vulnerabilities released

Companies wanting to better secure their web applications and services can start the process by reviewing the newly released Top 10 list of critical web application security problems recently disseminated by the Open Web Application Security Project (OWASP).
Illena Armstrong Jan 28 2004 9:48PM Security
PKWare expands reach of SecureZIP

PKWare expands reach of SecureZIP

PKWARE announced this week [jan.21] that it launched a series of initiatives to expand the availability of the its SecureZIP technology and PKZIP Reader product.
Marcia Savage Jan 24 2004 1:44AM Security
TruSecure product nixes vulnerabilities based on company assets

TruSecure product nixes vulnerabilities based on company assets

{Announcement hits Monday}TruSecure Corporation has released a product to help security administrators quickly understand intelligence data from their disparate security solutions and take action where necessary.
Illena Armstrong Jan 23 2004 3:04PM Security
More sophisticated email fraud emerges

More sophisticated email fraud emerges

Anti-spam company MailFrontier is warning companies that a new phishing technique has surfaced.
Illena Armstrong Jan 23 2004 2:46PM Security
Preparing for battle

Preparing for battle

Know your enemy: That’s the thrust of a new book just released through O’Reilly by infosec gurus Cyrus Peikari and Anton Chuvakin.
Illena Armstrong Jan 23 2004 2:45PM Security
The big decision: To outsource or not?

The big decision: To outsource or not?

Market analysts predict that more of us will be outsourcing the IT security function over the next few years. In our latest Roundtable discussion, Julie Jervis hears the views and advice of four infosec professionals
Julie Jervis Jan 22 2004 11:40AM Security
We can’t live in a risk-free world...

We can’t live in a risk-free world...

... but we can plan to reduce the impact of things going wrong. Andy Coote assesses the various techniques professionals can use
Andy Coote Jan 22 2004 11:37AM Security
The spy within: So who can you trust?

The spy within: So who can you trust?

Technology can only go so far in protecting company secrets. As Nick Booth discovers, people are the most vulnerable resource
Nick Booth Jan 22 2004 11:26AM Security
Strategies to beat the virus writers

Strategies to beat the virus writers

The virus threat has continued to grow over the past few years, but as Marcia Savage discovers, the anti-virus industry is working hard to develop new techniques and technology to provide users with effective protection
Marcia Savage Jan 22 2004 11:23AM Security
Let’s work together like the cyber attackers do

Let’s work together like the cyber attackers do

Another New Year has begun and with it come predictions about the types of cyber attacks.
Illena Armstrong Jan 22 2004 11:19AM Security
On the Highway: Forensics really can help you stop future attacks

On the Highway: Forensics really can help you stop future attacks

Those who forget the past are condemned to repeat it.
Peter Stephenson Jan 22 2004 11:15AM Security
Tuning in along the streets of London

Tuning in along the streets of London

How easy is it to hack into London companies’ wireless networks? We sent Dan Ilett into the streets to find out
Dan Ilett Jan 22 2004 11:10AM Security
Put your right leg in and take your right leg out

Put your right leg in and take your right leg out

The year has got off to a quick start.
Jon Tullett Jan 22 2004 10:58AM Security
Review: Hacking: The Art of Exploitation

Review: Hacking: The Art of Exploitation

This book is truly meaty stuff. It explains in detail what every hacker should know, but more importantly, what every security expert should be aware of so they can take action to avoid being hacked.  

Dan Ilett Jan 22 2004 12:00AM Security
Review: Rideway Station

Review: Rideway Station

Many small businesses are adopting wireless as a means of providing network and internet access to customers and their own mobile workforce. But in doing so can open up their own networks to attack. The RideWay Station WLAN Plus provides a way around the current flaws in wireless protocols to ensure secure access from wireless networks. 

Staff Writers Jan 22 2004 12:00AM Security
Review: Co-Mail

Review: Co-Mail

One of the challenges to the increased use of encrypted email is the sheer complexity of it all. Designing and managing a secure email infrastructure includes anti-virus, anti-spam/content management, secure web mail, DNS protection, and related policy. However, a potentially high value opportunity that is often missed by enterprises is the use of encrypted email.

Staff Writers Jan 21 2004 12:00AM Security
Critical infrastructure companies must be mindful of infosec

Critical infrastructure companies must be mindful of infosec

Critical infrastructure companies in telecommunications, financial services, transportation and utility markets will need to heed the impact the adoption of new technologies will have on their IT security deployments and practices if they want to keep up with the vulnerabilities such upgrades often cause.
Illena Armstrong Jan 20 2004 9:16PM Security
Check Point offers dedicated internal protection

Check Point offers dedicated internal protection

To help companies tackle threats inside their networks, Check Point has introduced what it is calling an internal security gateway. InterSpect offers network zone segmentation, worm and pre-emptive attack protections, LAN protocol security and more.
Illena Armstrong Jan 20 2004 7:44PM Security
Lawyer offers tips to companies for avoiding RIAA lawsuits

Lawyer offers tips to companies for avoiding RIAA lawsuits

With groups from both the recording and motion picture industries still threatening to file lawsuits against businesses for their employees’ downloading habits, organizations must do more than plead ignorance as the basis for their defense, said an Internet and computer lawyer from Drinker Biddle & Reath LLP.
Illena Armstrong Jan 20 2004 5:25PM Security

Log In

  |  Forgot your password?