Features

Put the Plug on those Productivity Drains and Turn On the Taps of Efficiency

Put the Plug on those Productivity Drains and Turn On the Taps of Efficiency

While companies understand that they need to protect themselves and their employees against content security threats (such as the circulation of inappropriate material, litigation, spam, loss or corruption of data, viruses and malicious code), they also need to consider how email and web security can boost productivity.
Alyn Hockey Jan 19 2004 10:40AM Security
You've Got a Whole Lot to Lose On the Web

You've Got a Whole Lot to Lose On the Web

Cyberattacks are not only coming from diverse parts of the world, but, compared to years past, they are hitting their targets more and more frequently these days.
Illena Armstrong Jan 19 2004 10:39AM Security
Board Action Critical to IT Governance Success

Board Action Critical to IT Governance Success

With the collapse of Enron, many urgent and vital business issues are on the minds of boards of directors.
Robert Roussey Jan 19 2004 10:23AM Security
Virtual Private Networks (VPN): The Insecure Solution

Virtual Private Networks (VPN): The Insecure Solution

Return on investment (ROI) will be the business term of 2002, therefore, technology-driven projects that deliver ROI will be high on the corporate agenda.
Simon Jenner Jan 19 2004 10:21AM Security
Managing Your Security Risks: Ten Questions to Ask Before the Next Product Demo

Managing Your Security Risks: Ten Questions to Ask Before the Next Product Demo

The year is still relatively young, which usually means that at some point, we all sit down either alone or with a group of trusted friends and colleagues, and make up lists of issues we intend to resolve over the course of the next 12 months.
Drew Williams Jan 19 2004 10:18AM Security
What's In Store For Infosecurity?

What's In Store For Infosecurity?

Sitting in a hotel room in San Jose, California, I found my interest turn to the local NBC news broadcast when the anchor asked viewers if they thought they were safe wandering cyberspace.
Illena Armstrong Jan 19 2004 10:15AM Security
Cyberterrorism

Cyberterrorism

In 1984 William Gibson's epoch-making novel Neuromancer introduced the world to the term cyberpunk (although many would argue that the term was actually coined by science fiction writer Bruce Bethke and/or editor Gardner Dozois).
Dave Lang Jan 19 2004 10:14AM Security
Information Anarchy? One Simple Solution

Information Anarchy? One Simple Solution

Microsoft calls it "information anarchy."
Bryan Davies Jan 19 2004 10:12AM Security
Keeping Secrets (Part 2)

Keeping Secrets (Part 2)

In the first part of this article (http://www.infosecnews.com/opinion/2002/01/30_03.htm), we identified the potential threats that aim to put your company in financial ruin and discussed who are the likely terrorists in economic warfare.
Jason B. Jan 19 2004 10:10AM Security
SECURITY CAMERA We Have the Technology - Don't We?

SECURITY CAMERA We Have the Technology - Don't We?

With recent events fresh in everyone's mind, it isn't that surprising that security has been thrust into the forefront, or that access control and authentication have become key issues.
Jayne Parkhouse Jan 19 2004 10:08AM Security
SECURITY LIBRARY: Know Your Enemy

SECURITY LIBRARY: Know Your Enemy

For over two years a group of very talented folks have been collecting attack information on a honeynet and analyzing the activities of blackhats attacking an exposed and unprotected suite of computers of different types.
Peter Stephenson Jan 19 2004 10:06AM Security
African Fraud Schemes

African Fraud Schemes

Over the past twenty years fraudulent activities conducted by African criminal groups have escalated posing a significant threat to email users worldwide.
Alan B. Jan 19 2004 10:04AM Security
In Contemplation of Our Small World

In Contemplation of Our Small World

Even Mickey Mouse is buying into it.
Illena Armstrong Jan 19 2004 10:02AM Security
Accelerating Security Policies thru Middleware

Accelerating Security Policies thru Middleware

As the lines dividing intranets and extranets continue to blur, companies like yours are rushing to expose private network applications and information assets to customers, business partners and employees.
Robert Lendvai Jan 19 2004 10:01AM Security
SECURITY LIBRARY: Hacker's Challenge

SECURITY LIBRARY: Hacker's Challenge

Technical books of more than 350 pages are not meant to be read in one helping, like mystery novels.
Anton Chuvakin Jan 19 2004 9:58AM Security
Wanted by the FBI: New InfraGard Members!

Wanted by the FBI: New InfraGard Members!

We in the U.S. have all learned a lot since September 11.
Jack Wiles Jan 19 2004 9:56AM Security
Security Demands Action

Security Demands Action

Security has never been given such attention as it is given today.
Illena Armstrong Jan 19 2004 9:53AM Security
Is Microsoft at Odds with Best Security Practices?

Is Microsoft at Odds with Best Security Practices?

Microsoft has announced the release of a new security tool aimed at improving the security of home and enterprise systems.
David Thomason Jan 19 2004 9:52AM Security
PDA Security Policy - Worth Its Weight in Gold

PDA Security Policy - Worth Its Weight in Gold

Nowadays, it seems like everybody has a PDA. However, as an inevitable corollary, it seems like everyone is eventually bound to misplace their PDA.
Oba McMillan Jan 19 2004 9:50AM Security
Thinking About Security as you Build Your Architecture

Thinking About Security as you Build Your Architecture

The security of an environment is often won or lost at the architecture level.
Brad Johnson, Jan 19 2004 9:47AM Security

Log In

  |  Forgot your password?