Features

Identity Theft

Identity Theft

Recent news events have highlighted individuals actively engaged in criminal pursuits using false identities to disguise themselves and conceal their unlawful acts.
Alan B. Jan 19 2004 11:33AM Security
Corporations Risk Harboring Infoterrorists through Negligence

Corporations Risk Harboring Infoterrorists through Negligence

Terrorism is not a new phenomenon but has gained special popularity recently.
Jacques Halé Jan 19 2004 11:30AM Security
Improving Critical Infrastructure Protection: CISSPs are Getting it Done

Improving Critical Infrastructure Protection: CISSPs are Getting it Done

At the end of 2001, it was widely reported that U.S. government agencies have earned failing grades for their efforts to improve information security.
Laurie Mcquillan Jan 19 2004 11:28AM Security
After the 'Space Odyssey'

After the 'Space Odyssey'

Now that we're beyond the year Space Odyssey popularized, preparations to improve the security of IT systems would be lax if the tons of infosecurity lessons of 2001 were overlooked.
Illena Armstrong Jan 19 2004 11:26AM Security
SECURITY LIBRARY: Incident Response - Investigating Computer Crime

SECURITY LIBRARY: Incident Response - Investigating Computer Crime

Unlike other incident response books, this one has all the technical details.
Anton Chuvakin Jan 19 2004 11:24AM Security
An Effective Managed Security Relationship Depends on the SLA

An Effective Managed Security Relationship Depends on the SLA

Managed security services, the outsourcing of monitoring and management of security devices, is a fast-growing market.
Nathan Tennant Jan 19 2004 11:22AM Security
U.S. Secret Service Electronic Crimes Task Force - We Need You to Join Us!

U.S. Secret Service Electronic Crimes Task Force - We Need You to Join Us!

And we really mean it!
Jack Wiles Jan 19 2004 11:21AM Security
Worries of Wireless

Worries of Wireless

Most infosecurity experts have their ideas about what to expect over the course of 2002.
Illena Armstrong Jan 19 2004 11:18AM Security
VoIP Security: Is Anyone Listening?

VoIP Security: Is Anyone Listening?

There is every indication that 2002 will be the year of voice over Internet protocol (VoIP).
R. Subha Jan 19 2004 11:16AM Security
IDS: Alarms, Not Walls

IDS: Alarms, Not Walls

Acronyms and coined phrases bedevil us, but during 2002, we probably aren't getting rid of them.
Barton Taylor Jan 19 2004 11:14AM Security
Leveraging a Super-View of the Individual User

Leveraging a Super-View of the Individual User

Traditionally, security administration has focused on enforcement products.
Mark Becker Jan 19 2004 11:12AM Security
SECURITY CAMERA: Power to the People

SECURITY CAMERA: Power to the People

Many computer security solutions are quite exciting, technologically speaking, and others are simply very effective.
Jayne Parkhouse Jan 19 2004 11:10AM Security
Information Assurance and Corporate Governance: Engaging Senior Management

Information Assurance and Corporate Governance: Engaging Senior Management

Information assurance (IA) is key to the effective management of any organization in today's economy.
Aarti Anhal Jan 19 2004 11:08AM Security
Developing an ISAP ASAP

Developing an ISAP ASAP

Keeping your network secure in the current climate of Internet assault is no small job.
Ken Shaurette Jan 19 2004 11:07AM Security
Hacking: The Cyberworld's Oldest Profession is Indispensable R&D

Hacking: The Cyberworld's Oldest Profession is Indispensable R&D

To label the genre that is a combination of pure digital finesse and old fashioned guile as something so artless and blunt as 'hacking' seems unfortunate.
Bryan Davies Jan 19 2004 11:05AM Security
Privacy in an Internet World?

Privacy in an Internet World?

Anonymity is a circumstance that many everyday web surfers believe they enjoy while hopping from one online store to the next.
Illena Armstrong Jan 19 2004 11:02AM Security
Lawyers Draft IT Security Professionals for Litigation Support Duty

Lawyers Draft IT Security Professionals for Litigation Support Duty

The process of litigation discovery - where parties to a lawsuit seek documents, depositions and other information from their foes and third-party witnesses prior to trial - is seeing a dramatic transition with the advent of the 'paperless office.'
John Patzakis Jan 19 2004 10:58AM Security
The Cyberspace War

The Cyberspace War

Advancement in the use of technology is unfortunately not confined to the law-abiding citizens and organizations of the world.
John Holden Jan 19 2004 10:56AM Security
Keeping Secrets (Part 1)

Keeping Secrets (Part 1)

Last October, many of us were shocked to read in newspapers that Procter & Gamble, a leading Fortune 500 firm, settled a dispute with European based Unilever over accusations of blatant corporate espionage - better known as economic warfare.
Jason B. Jan 19 2004 10:54AM Security
Sharing Infosec Information

Sharing Infosec Information

Infosecurity is hitting the mainstream.
Illena Armstrong Jan 19 2004 10:52AM Security

Log In

  |  Forgot your password?