Features

Is Microsoft at Odds with Best Security Practices?

Is Microsoft at Odds with Best Security Practices?

Microsoft has announced the release of a new security tool aimed at improving the security of home and enterprise systems.
David Thomason Jan 19 2004 9:52AM Security
PDA Security Policy - Worth Its Weight in Gold

PDA Security Policy - Worth Its Weight in Gold

Nowadays, it seems like everybody has a PDA. However, as an inevitable corollary, it seems like everyone is eventually bound to misplace their PDA.
Oba McMillan Jan 19 2004 9:50AM Security
Thinking About Security as you Build Your Architecture

Thinking About Security as you Build Your Architecture

The security of an environment is often won or lost at the architecture level.
Brad Johnson, Jan 19 2004 9:47AM Security
Trustworthy Computing?

Trustworthy Computing?

The fundamental basis for any kind of relationship is trust: the difficulty lies in attaining it.
Illena Armstrong Jan 19 2004 9:44AM Security
Identity Theft Highlights the Importance of Data Responsibility

Identity Theft Highlights the Importance of Data Responsibility

In this article, the concept of 'data responsibility' is proposed, a concept which requires the realization that - in the modern electronic age - owners and users of information which may be regarded as private (credit card details and other personally identifiable information) must take some responsibility for the guardianship of this information.
Neil Robinson Jan 19 2004 9:43AM Security
Security Threats of Pervasive Computing

Security Threats of Pervasive Computing

Remember when we had telephone booths on every street corner?
Dave Lang Jan 19 2004 9:41AM Security
The Sky Is Falling (Again)

The Sky Is Falling (Again)

The past several weeks have brought a lot of press talk about the Great SNMP Crisis.
Peter Stephenson Jan 19 2004 9:39AM Security
The Human Factor

The Human Factor

Every month SC Magazine publishes product reviews, providing the latest information on the solutions available to secure your systems.
Jayne Parkhouse Jan 19 2004 9:38AM Security
Network Security: A New Virtual Foot Soldier Against Cyberterrorism

Network Security: A New Virtual Foot Soldier Against Cyberterrorism

Internet usage is growing at an accelerating pace.
Joseph Vaughn-Perling Jan 16 2004 5:18PM Security
Auditing Software Licensing

Auditing Software Licensing

Dealing with software licensing risks can be one of the overlooked items when conducting internal IT audits.
Alan B. Jan 16 2004 5:14PM Security
Of 'Zombie' Computers and DDoS Attacks: The Security Liability

Of 'Zombie' Computers and DDoS Attacks: The Security Liability

Two years ago, Internet security in the United States changed dramatically when Amazon.com, CNN, Yahoo, E*TRADE, ZDNet and others fell victim to what has come to be known as a distributed denial-of-service (DDoS) attack.
Dorsey Morrow Jan 16 2004 5:13PM Security
In Internet Battle

In Internet Battle

The conflict being waged in Afghanistan is one of the most technologically advanced battles to which the world has ever been witness.
Illena Armstrong Jan 16 2004 5:11PM Security
My Personal Firewall: I Should Have Listened to It!

My Personal Firewall: I Should Have Listened to It!

You could actually title this article "Virus Alert - I just Got Nailed," Part Two. (The link to the first installment, published in December 2001, is www.infosecnews.com/opinion/2001/12/12_03.htm).
Jack Wiles Jan 16 2004 4:49PM Security
Grey Hair, Wrinkles and Sun Spots in the Aging Firewall Market

Grey Hair, Wrinkles and Sun Spots in the Aging Firewall Market

I can't remember what they say the first thing to go is. Memory, perhaps?
Jason Wright Jan 16 2004 4:48PM Security
Twenty Years of Smartcards and Smartcard Attacks

Twenty Years of Smartcards and Smartcard Attacks

Take another look at that replacement credit card from your bank.
Allen Chilver Jan 16 2004 4:47PM Security
W-LAN security issues revealed

W-LAN security issues revealed

The stupidity of companies when it comes to securing their networks seems to know no bounds.
Steve Gold Jan 16 2004 4:45PM Security
Applying the Patch Post September 11

Applying the Patch Post September 11

There is a growing collection of companies touting their product as the 'ultimate post Sept. 11' security solution. Bleary-eyed administrators are asking, "How has my security changed since September 11?"
Melisa LaBancz-Bleasdale Jan 16 2004 4:37PM Security
ISO 17799: Our Two Cents

ISO 17799: Our Two Cents

ISO 17799 was adopted in a fast-track process by the International Organization for Standardization in 2000.
Jonathan Gossels Jan 16 2004 4:36PM Security
Mind Shifts In Progress

Mind Shifts In Progress

During 2001 there was a proliferation of IT security breaches.
Errol Rhoden Jan 16 2004 4:34PM Security
Can You Trust Microsoft?

Can You Trust Microsoft?

This year has seen Microsoft out and about wearing its shiny new security cap, proud of internal and external initiatives which it promises will bring about Bill Gates' defined goal of 'trustworthy computing.'
Jon Tullett Jan 16 2004 4:32PM Security

Log In

  |  Forgot your password?