Features

SECURITY CAMERA: Storage, Where's the SANs in That?

SECURITY CAMERA: Storage, Where's the SANs in That?

Maybe it's the current global climate that has made many aware of the need for better storage, backup and disaster recovery capabilities.
Jayne Parkhouse Jan 16 2004 2:55PM Security
Outsourcing IT Security

Outsourcing IT Security

In today's lean, just-in-time business environment, many companies are looking to outsourcing as an alternative to in-house support.
Dave Lang Jan 16 2004 2:54PM Security
Intercepting Communications

Intercepting Communications

Almost every day we hear in the news about allegations centered on communications privacy being violated either by employers or law enforcement agencies.
Alan Sterneckert Jan 16 2004 2:53PM Security
Standardizing Penetration Testing

Standardizing Penetration Testing

While some people consider hacking a 'black art,' it surely has some scientific component to it due to the required knowledge of computers, operating systems and application software.
Anton Chuvakin Jan 16 2004 2:51PM Security
Attacks Keep Coming

Attacks Keep Coming

The recent Techno-Security Conference in Myrtle Beach, South Carolina brought out a bevy of IT security officers, IT administrators, law enforcement types and others to learn about what they can do to better their organization's infosecurity posture.
Illena Armstrong Jan 16 2004 2:50PM Security
Guerrillas in Our Midst

Guerrillas in Our Midst

A little over a year has passed since the publication of the University of Maryland's paper "Your 802.11 Wireless Network Has No Clothes" (www.cs.umd.edu/~waa/wireless.pdf) which detailed a number of holes in wired equivalent privacy (WEP), the encryption protocol used to secure 802.11b wireless LANs.
Perry Norton Jan 16 2004 2:49PM Security
Why Business Continuity Planning is Difficult

Why Business Continuity Planning is Difficult

In the wake of September 11 companies have been scrambling to review and update their disaster recovery and business continuity plans.
Bob Lonadier Jan 16 2004 2:48PM Security
Protecting our Children - You Need to Read This!

Protecting our Children - You Need to Read This!

It's no secret that we now live in a world where technical changes are coming at us at an ever-increasing rate.
Jack Wiles Jan 16 2004 2:46PM Security
Lies, Damned Lies and Statistics

Lies, Damned Lies and Statistics

Analysts and marketers love surveys.
Jon Tullett Jan 16 2004 2:45PM Security
Pro-Privacy is Good For Business

Pro-Privacy is Good For Business

Contrary to popular belief, an aggressive pro-privacy stance is good for business.
Bill Van Jan 16 2004 2:11PM Security
SNMP Apathy - How Much Time Do We Have?

SNMP Apathy - How Much Time Do We Have?

Following on the heels of applying the patch Fred Rica style (see www.infosecnews.com/opinion/2002/04/17_04.htm), the SNMP vulnerability has loomed into view as the next procrastinating administrator’s nightmare.
Melisa LaBancz-Bleasdale Jan 16 2004 2:09PM Security
The Security Equipment Adjustment Cycle

The Security Equipment Adjustment Cycle

It seems obvious to me that electronic security took a significant step forward in 2001.
Jason Wright Jan 16 2004 2:08PM Security
You Have Been Warned

You Have Been Warned

My email went belly up the other weekend, despite the fact that yours truly has been using the Internet since the late 1980s and had taken solid precautions against problems occurring.
Steve Gold Jan 16 2004 2:06PM Security
Are Corporations Making the Internet Safe for Hackers?

Are Corporations Making the Internet Safe for Hackers?

In 1984, the London Metropolitan Police Service, under the efforts of John Austen, had the pioneering vision to start one of the first computer crime units in the world.
Richard R. Jan 16 2004 2:00PM Security
Regulating Security: Telecoms Regulation and Information Security

Regulating Security: Telecoms Regulation and Information Security

With the recent submission to Parliament of the Communications Bill that will give rise to the new Office of Communications (OFCOM), the U.K. is undergoing a dramatic change in the regulation of its communications industries.
Andrew Rathmell Jan 16 2004 1:55PM Security
Using Application Service Providers Securely

Using Application Service Providers Securely

Organizations are increasingly relying on application service providers (ASPs) to perform critical functions in their environments.
Jonathan Gossels Jan 16 2004 1:49PM Security
SECURITY CAMERA: Looking After Number One

SECURITY CAMERA: Looking After Number One

Have you ever noticed the way in which new security solutions seem to appear as an appendage to an already recognized requirement of the IT department’s security strategy?
Jayne Parkhouse Jan 16 2004 1:45PM Security
A Real Form of “CyberLiability” Emerges

A Real Form of “CyberLiability” Emerges

When Arthur Andersen partner David Duncan met with his colleagues in their Houston office last fall, just before the onset of their now infamous computer file delete-fest, they did not couch their planned mission as a purposeful endeavor to destroy evidence relevant to an impending Securities and Exchange Commission (SEC) investigation.
John Patzakis Jan 16 2004 1:37PM Security
It Never Ceases to Amaze Me

It Never Ceases to Amaze Me

I think I’ve used that phrase in these columns before.
Peter Stephenson Jan 16 2004 1:34PM Security
Playing Defense in Information Warfare

Playing Defense in Information Warfare

The September 11 attacks on the World Trade Center illustrate that in a free market economy, attacks against privately owned facilities can be even more damaging than those against government targets such as the Pentagon.
Edward Hearst Jan 16 2004 1:27PM Security

Log In

  |  Forgot your password?