Features

Trustworthy Computing?

Trustworthy Computing?

The fundamental basis for any kind of relationship is trust: the difficulty lies in attaining it.
Illena Armstrong Jan 19 2004 9:44AM Security
Identity Theft Highlights the Importance of Data Responsibility

Identity Theft Highlights the Importance of Data Responsibility

In this article, the concept of 'data responsibility' is proposed, a concept which requires the realization that - in the modern electronic age - owners and users of information which may be regarded as private (credit card details and other personally identifiable information) must take some responsibility for the guardianship of this information.
Neil Robinson Jan 19 2004 9:43AM Security
Security Threats of Pervasive Computing

Security Threats of Pervasive Computing

Remember when we had telephone booths on every street corner?
Dave Lang Jan 19 2004 9:41AM Security
The Sky Is Falling (Again)

The Sky Is Falling (Again)

The past several weeks have brought a lot of press talk about the Great SNMP Crisis.
Peter Stephenson Jan 19 2004 9:39AM Security
The Human Factor

The Human Factor

Every month SC Magazine publishes product reviews, providing the latest information on the solutions available to secure your systems.
Jayne Parkhouse Jan 19 2004 9:38AM Security
Network Security: A New Virtual Foot Soldier Against Cyberterrorism

Network Security: A New Virtual Foot Soldier Against Cyberterrorism

Internet usage is growing at an accelerating pace.
Joseph Vaughn-Perling Jan 16 2004 5:18PM Security
Auditing Software Licensing

Auditing Software Licensing

Dealing with software licensing risks can be one of the overlooked items when conducting internal IT audits.
Alan B. Jan 16 2004 5:14PM Security
Of 'Zombie' Computers and DDoS Attacks: The Security Liability

Of 'Zombie' Computers and DDoS Attacks: The Security Liability

Two years ago, Internet security in the United States changed dramatically when Amazon.com, CNN, Yahoo, E*TRADE, ZDNet and others fell victim to what has come to be known as a distributed denial-of-service (DDoS) attack.
Dorsey Morrow Jan 16 2004 5:13PM Security
In Internet Battle

In Internet Battle

The conflict being waged in Afghanistan is one of the most technologically advanced battles to which the world has ever been witness.
Illena Armstrong Jan 16 2004 5:11PM Security
My Personal Firewall: I Should Have Listened to It!

My Personal Firewall: I Should Have Listened to It!

You could actually title this article "Virus Alert - I just Got Nailed," Part Two. (The link to the first installment, published in December 2001, is www.infosecnews.com/opinion/2001/12/12_03.htm).
Jack Wiles Jan 16 2004 4:49PM Security
Grey Hair, Wrinkles and Sun Spots in the Aging Firewall Market

Grey Hair, Wrinkles and Sun Spots in the Aging Firewall Market

I can't remember what they say the first thing to go is. Memory, perhaps?
Jason Wright Jan 16 2004 4:48PM Security
Twenty Years of Smartcards and Smartcard Attacks

Twenty Years of Smartcards and Smartcard Attacks

Take another look at that replacement credit card from your bank.
Allen Chilver Jan 16 2004 4:47PM Security
W-LAN security issues revealed

W-LAN security issues revealed

The stupidity of companies when it comes to securing their networks seems to know no bounds.
Steve Gold Jan 16 2004 4:45PM Security
Applying the Patch Post September 11

Applying the Patch Post September 11

There is a growing collection of companies touting their product as the 'ultimate post Sept. 11' security solution. Bleary-eyed administrators are asking, "How has my security changed since September 11?"
Melisa LaBancz-Bleasdale Jan 16 2004 4:37PM Security
ISO 17799: Our Two Cents

ISO 17799: Our Two Cents

ISO 17799 was adopted in a fast-track process by the International Organization for Standardization in 2000.
Jonathan Gossels Jan 16 2004 4:36PM Security
Mind Shifts In Progress

Mind Shifts In Progress

During 2001 there was a proliferation of IT security breaches.
Errol Rhoden Jan 16 2004 4:34PM Security
Can You Trust Microsoft?

Can You Trust Microsoft?

This year has seen Microsoft out and about wearing its shiny new security cap, proud of internal and external initiatives which it promises will bring about Bill Gates' defined goal of 'trustworthy computing.'
Jon Tullett Jan 16 2004 4:32PM Security
Taking the 'N' Out of VPN

Taking the 'N' Out of VPN

Recently, we've been listening to security managers reminisce about the 'good old days' of mainframe computing in which the physical security of the computer room was pretty much all that was needed in order to secure the data on the computer.
Dan Taylor Jan 16 2004 3:00PM Security
A Little Bandwidth Helps Out in an Emergency

A Little Bandwidth Helps Out in an Emergency

Come fall, school bells ring throughout college campuses across the United States, but as excited students move into the dorms and make new friends, employees of the information systems (IS) departments are pulling out their hair trying to manage the dramatic increase in network traffic.
Andy Druda Jan 16 2004 2:57PM Security
Shrinking IT Budgets Call for Stronger IT Governance

Shrinking IT Budgets Call for Stronger IT Governance

For many years, it seemed every request for IT expenditure met with management approval and every IT project, no matter how loosely defined, gained executive support.
Paul A. Jan 16 2004 2:56PM Security

Log In

  |  Forgot your password?