Features

Hackers Get Green Light

Hackers Get Green Light

There have been endless debates over whether or not to hire hackers.
Peter Stephenson Jan 19 2004 10:45AM Security
Security: State of the Enterprise

Security: State of the Enterprise

Last month's column, "IDS: Alarms, not Walls," incited some interesting responses.
Bart Taylor Jan 19 2004 10:43AM Security
Security Awareness Training - It's Time To Get Serious

Security Awareness Training - It's Time To Get Serious

This is one of a series of articles where I will try to encourage everyone who reads them to finally get serious about establishing an employee awareness training program.
Jack Wiles Jan 19 2004 10:42AM Security
Put the Plug on those Productivity Drains and Turn On the Taps of Efficiency

Put the Plug on those Productivity Drains and Turn On the Taps of Efficiency

While companies understand that they need to protect themselves and their employees against content security threats (such as the circulation of inappropriate material, litigation, spam, loss or corruption of data, viruses and malicious code), they also need to consider how email and web security can boost productivity.
Alyn Hockey Jan 19 2004 10:40AM Security
You've Got a Whole Lot to Lose On the Web

You've Got a Whole Lot to Lose On the Web

Cyberattacks are not only coming from diverse parts of the world, but, compared to years past, they are hitting their targets more and more frequently these days.
Illena Armstrong Jan 19 2004 10:39AM Security
Board Action Critical to IT Governance Success

Board Action Critical to IT Governance Success

With the collapse of Enron, many urgent and vital business issues are on the minds of boards of directors.
Robert Roussey Jan 19 2004 10:23AM Security
Virtual Private Networks (VPN): The Insecure Solution

Virtual Private Networks (VPN): The Insecure Solution

Return on investment (ROI) will be the business term of 2002, therefore, technology-driven projects that deliver ROI will be high on the corporate agenda.
Simon Jenner Jan 19 2004 10:21AM Security
Managing Your Security Risks: Ten Questions to Ask Before the Next Product Demo

Managing Your Security Risks: Ten Questions to Ask Before the Next Product Demo

The year is still relatively young, which usually means that at some point, we all sit down either alone or with a group of trusted friends and colleagues, and make up lists of issues we intend to resolve over the course of the next 12 months.
Drew Williams Jan 19 2004 10:18AM Security
What's In Store For Infosecurity?

What's In Store For Infosecurity?

Sitting in a hotel room in San Jose, California, I found my interest turn to the local NBC news broadcast when the anchor asked viewers if they thought they were safe wandering cyberspace.
Illena Armstrong Jan 19 2004 10:15AM Security
Cyberterrorism

Cyberterrorism

In 1984 William Gibson's epoch-making novel Neuromancer introduced the world to the term cyberpunk (although many would argue that the term was actually coined by science fiction writer Bruce Bethke and/or editor Gardner Dozois).
Dave Lang Jan 19 2004 10:14AM Security
Information Anarchy? One Simple Solution

Information Anarchy? One Simple Solution

Microsoft calls it "information anarchy."
Bryan Davies Jan 19 2004 10:12AM Security
Keeping Secrets (Part 2)

Keeping Secrets (Part 2)

In the first part of this article (http://www.infosecnews.com/opinion/2002/01/30_03.htm), we identified the potential threats that aim to put your company in financial ruin and discussed who are the likely terrorists in economic warfare.
Jason B. Jan 19 2004 10:10AM Security
SECURITY CAMERA We Have the Technology - Don't We?

SECURITY CAMERA We Have the Technology - Don't We?

With recent events fresh in everyone's mind, it isn't that surprising that security has been thrust into the forefront, or that access control and authentication have become key issues.
Jayne Parkhouse Jan 19 2004 10:08AM Security
SECURITY LIBRARY: Know Your Enemy

SECURITY LIBRARY: Know Your Enemy

For over two years a group of very talented folks have been collecting attack information on a honeynet and analyzing the activities of blackhats attacking an exposed and unprotected suite of computers of different types.
Peter Stephenson Jan 19 2004 10:06AM Security
African Fraud Schemes

African Fraud Schemes

Over the past twenty years fraudulent activities conducted by African criminal groups have escalated posing a significant threat to email users worldwide.
Alan B. Jan 19 2004 10:04AM Security
In Contemplation of Our Small World

In Contemplation of Our Small World

Even Mickey Mouse is buying into it.
Illena Armstrong Jan 19 2004 10:02AM Security
Accelerating Security Policies thru Middleware

Accelerating Security Policies thru Middleware

As the lines dividing intranets and extranets continue to blur, companies like yours are rushing to expose private network applications and information assets to customers, business partners and employees.
Robert Lendvai Jan 19 2004 10:01AM Security
SECURITY LIBRARY: Hacker's Challenge

SECURITY LIBRARY: Hacker's Challenge

Technical books of more than 350 pages are not meant to be read in one helping, like mystery novels.
Anton Chuvakin Jan 19 2004 9:58AM Security
Wanted by the FBI: New InfraGard Members!

Wanted by the FBI: New InfraGard Members!

We in the U.S. have all learned a lot since September 11.
Jack Wiles Jan 19 2004 9:56AM Security
Security Demands Action

Security Demands Action

Security has never been given such attention as it is given today.
Illena Armstrong Jan 19 2004 9:53AM Security

Log In

  |  Forgot your password?