Features

The big decision: To outsource or not?

The big decision: To outsource or not?

Market analysts predict that more of us will be outsourcing the IT security function over the next few years. In our latest Roundtable discussion, Julie Jervis hears the views and advice of four infosec professionals
Julie Jervis Jan 22 2004 11:40AM Security
We can’t live in a risk-free world...

We can’t live in a risk-free world...

... but we can plan to reduce the impact of things going wrong. Andy Coote assesses the various techniques professionals can use
Andy Coote Jan 22 2004 11:37AM Security
The spy within: So who can you trust?

The spy within: So who can you trust?

Technology can only go so far in protecting company secrets. As Nick Booth discovers, people are the most vulnerable resource
Nick Booth Jan 22 2004 11:26AM Security
Strategies to beat the virus writers

Strategies to beat the virus writers

The virus threat has continued to grow over the past few years, but as Marcia Savage discovers, the anti-virus industry is working hard to develop new techniques and technology to provide users with effective protection
Marcia Savage Jan 22 2004 11:23AM Security
Let’s work together like the cyber attackers do

Let’s work together like the cyber attackers do

Another New Year has begun and with it come predictions about the types of cyber attacks.
Illena Armstrong Jan 22 2004 11:19AM Security
On the Highway: Forensics really can help you stop future attacks

On the Highway: Forensics really can help you stop future attacks

Those who forget the past are condemned to repeat it.
Peter Stephenson Jan 22 2004 11:15AM Security
Tuning in along the streets of London

Tuning in along the streets of London

How easy is it to hack into London companies’ wireless networks? We sent Dan Ilett into the streets to find out
Dan Ilett Jan 22 2004 11:10AM Security
Put your right leg in and take your right leg out

Put your right leg in and take your right leg out

The year has got off to a quick start.
Jon Tullett Jan 22 2004 10:58AM Security
Review: Hacking: The Art of Exploitation

Review: Hacking: The Art of Exploitation

This book is truly meaty stuff. It explains in detail what every hacker should know, but more importantly, what every security expert should be aware of so they can take action to avoid being hacked.  

Dan Ilett Jan 22 2004 12:00AM Security
Review: Rideway Station

Review: Rideway Station

Many small businesses are adopting wireless as a means of providing network and internet access to customers and their own mobile workforce. But in doing so can open up their own networks to attack. The RideWay Station WLAN Plus provides a way around the current flaws in wireless protocols to ensure secure access from wireless networks. 

Staff Writers Jan 22 2004 12:00AM Security
Review: Co-Mail

Review: Co-Mail

One of the challenges to the increased use of encrypted email is the sheer complexity of it all. Designing and managing a secure email infrastructure includes anti-virus, anti-spam/content management, secure web mail, DNS protection, and related policy. However, a potentially high value opportunity that is often missed by enterprises is the use of encrypted email.

Staff Writers Jan 21 2004 12:00AM Security
Critical infrastructure companies must be mindful of infosec

Critical infrastructure companies must be mindful of infosec

Critical infrastructure companies in telecommunications, financial services, transportation and utility markets will need to heed the impact the adoption of new technologies will have on their IT security deployments and practices if they want to keep up with the vulnerabilities such upgrades often cause.
Illena Armstrong Jan 20 2004 9:16PM Security
Check Point offers dedicated internal protection

Check Point offers dedicated internal protection

To help companies tackle threats inside their networks, Check Point has introduced what it is calling an internal security gateway. InterSpect offers network zone segmentation, worm and pre-emptive attack protections, LAN protocol security and more.
Illena Armstrong Jan 20 2004 7:44PM Security
Lawyer offers tips to companies for avoiding RIAA lawsuits

Lawyer offers tips to companies for avoiding RIAA lawsuits

With groups from both the recording and motion picture industries still threatening to file lawsuits against businesses for their employees’ downloading habits, organizations must do more than plead ignorance as the basis for their defense, said an Internet and computer lawyer from Drinker Biddle & Reath LLP.
Illena Armstrong Jan 20 2004 5:25PM Security
Identity Theft

Identity Theft

Recent news events have highlighted individuals actively engaged in criminal pursuits using false identities to disguise themselves and conceal their unlawful acts.
Alan B. Jan 19 2004 11:33AM Security
Corporations Risk Harboring Infoterrorists through Negligence

Corporations Risk Harboring Infoterrorists through Negligence

Terrorism is not a new phenomenon but has gained special popularity recently.
Jacques Halé Jan 19 2004 11:30AM Security
Improving Critical Infrastructure Protection: CISSPs are Getting it Done

Improving Critical Infrastructure Protection: CISSPs are Getting it Done

At the end of 2001, it was widely reported that U.S. government agencies have earned failing grades for their efforts to improve information security.
Laurie Mcquillan Jan 19 2004 11:28AM Security
After the 'Space Odyssey'

After the 'Space Odyssey'

Now that we're beyond the year Space Odyssey popularized, preparations to improve the security of IT systems would be lax if the tons of infosecurity lessons of 2001 were overlooked.
Illena Armstrong Jan 19 2004 11:26AM Security
SECURITY LIBRARY: Incident Response - Investigating Computer Crime

SECURITY LIBRARY: Incident Response - Investigating Computer Crime

Unlike other incident response books, this one has all the technical details.
Anton Chuvakin Jan 19 2004 11:24AM Security
An Effective Managed Security Relationship Depends on the SLA

An Effective Managed Security Relationship Depends on the SLA

Managed security services, the outsourcing of monitoring and management of security devices, is a fast-growing market.
Nathan Tennant Jan 19 2004 11:22AM Security

Log In

  |  Forgot your password?