Features

Taking the 'N' Out of VPN

Taking the 'N' Out of VPN

Recently, we've been listening to security managers reminisce about the 'good old days' of mainframe computing in which the physical security of the computer room was pretty much all that was needed in order to secure the data on the computer.
Dan Taylor Jan 16 2004 3:00PM Security
A Little Bandwidth Helps Out in an Emergency

A Little Bandwidth Helps Out in an Emergency

Come fall, school bells ring throughout college campuses across the United States, but as excited students move into the dorms and make new friends, employees of the information systems (IS) departments are pulling out their hair trying to manage the dramatic increase in network traffic.
Andy Druda Jan 16 2004 2:57PM Security
Shrinking IT Budgets Call for Stronger IT Governance

Shrinking IT Budgets Call for Stronger IT Governance

For many years, it seemed every request for IT expenditure met with management approval and every IT project, no matter how loosely defined, gained executive support.
Paul A. Jan 16 2004 2:56PM Security
SECURITY CAMERA: Storage, Where's the SANs in That?

SECURITY CAMERA: Storage, Where's the SANs in That?

Maybe it's the current global climate that has made many aware of the need for better storage, backup and disaster recovery capabilities.
Jayne Parkhouse Jan 16 2004 2:55PM Security
Outsourcing IT Security

Outsourcing IT Security

In today's lean, just-in-time business environment, many companies are looking to outsourcing as an alternative to in-house support.
Dave Lang Jan 16 2004 2:54PM Security
Intercepting Communications

Intercepting Communications

Almost every day we hear in the news about allegations centered on communications privacy being violated either by employers or law enforcement agencies.
Alan Sterneckert Jan 16 2004 2:53PM Security
Standardizing Penetration Testing

Standardizing Penetration Testing

While some people consider hacking a 'black art,' it surely has some scientific component to it due to the required knowledge of computers, operating systems and application software.
Anton Chuvakin Jan 16 2004 2:51PM Security
Attacks Keep Coming

Attacks Keep Coming

The recent Techno-Security Conference in Myrtle Beach, South Carolina brought out a bevy of IT security officers, IT administrators, law enforcement types and others to learn about what they can do to better their organization's infosecurity posture.
Illena Armstrong Jan 16 2004 2:50PM Security
Guerrillas in Our Midst

Guerrillas in Our Midst

A little over a year has passed since the publication of the University of Maryland's paper "Your 802.11 Wireless Network Has No Clothes" (www.cs.umd.edu/~waa/wireless.pdf) which detailed a number of holes in wired equivalent privacy (WEP), the encryption protocol used to secure 802.11b wireless LANs.
Perry Norton Jan 16 2004 2:49PM Security
Why Business Continuity Planning is Difficult

Why Business Continuity Planning is Difficult

In the wake of September 11 companies have been scrambling to review and update their disaster recovery and business continuity plans.
Bob Lonadier Jan 16 2004 2:48PM Security
Protecting our Children - You Need to Read This!

Protecting our Children - You Need to Read This!

It's no secret that we now live in a world where technical changes are coming at us at an ever-increasing rate.
Jack Wiles Jan 16 2004 2:46PM Security
Lies, Damned Lies and Statistics

Lies, Damned Lies and Statistics

Analysts and marketers love surveys.
Jon Tullett Jan 16 2004 2:45PM Security
Pro-Privacy is Good For Business

Pro-Privacy is Good For Business

Contrary to popular belief, an aggressive pro-privacy stance is good for business.
Bill Van Jan 16 2004 2:11PM Security
SNMP Apathy - How Much Time Do We Have?

SNMP Apathy - How Much Time Do We Have?

Following on the heels of applying the patch Fred Rica style (see www.infosecnews.com/opinion/2002/04/17_04.htm), the SNMP vulnerability has loomed into view as the next procrastinating administrator’s nightmare.
Melisa LaBancz-Bleasdale Jan 16 2004 2:09PM Security
The Security Equipment Adjustment Cycle

The Security Equipment Adjustment Cycle

It seems obvious to me that electronic security took a significant step forward in 2001.
Jason Wright Jan 16 2004 2:08PM Security
You Have Been Warned

You Have Been Warned

My email went belly up the other weekend, despite the fact that yours truly has been using the Internet since the late 1980s and had taken solid precautions against problems occurring.
Steve Gold Jan 16 2004 2:06PM Security
Are Corporations Making the Internet Safe for Hackers?

Are Corporations Making the Internet Safe for Hackers?

In 1984, the London Metropolitan Police Service, under the efforts of John Austen, had the pioneering vision to start one of the first computer crime units in the world.
Richard R. Jan 16 2004 2:00PM Security
Regulating Security: Telecoms Regulation and Information Security

Regulating Security: Telecoms Regulation and Information Security

With the recent submission to Parliament of the Communications Bill that will give rise to the new Office of Communications (OFCOM), the U.K. is undergoing a dramatic change in the regulation of its communications industries.
Andrew Rathmell Jan 16 2004 1:55PM Security
Using Application Service Providers Securely

Using Application Service Providers Securely

Organizations are increasingly relying on application service providers (ASPs) to perform critical functions in their environments.
Jonathan Gossels Jan 16 2004 1:49PM Security
SECURITY CAMERA: Looking After Number One

SECURITY CAMERA: Looking After Number One

Have you ever noticed the way in which new security solutions seem to appear as an appendage to an already recognized requirement of the IT department’s security strategy?
Jayne Parkhouse Jan 16 2004 1:45PM Security

Log In

  |  Forgot your password?