Features

What Good Is Foreknowledge?

What Good Is Foreknowledge?

U.S. Vice President Dick Cheney was recently on NBC's Meet the Press where he said that the inevitability of another terrorist attack on American soil is as sure today as it was September 12.
Illena Armstrong Jan 16 2004 1:25PM Security
Authentication - Was That Really You Who Just Logged In?

Authentication - Was That Really You Who Just Logged In?

For this month’s article, I felt a need to address one of my most frequent concerns - authentication.
Jack Wiles Jan 16 2004 1:08PM Security
Cyber Deviance

Cyber Deviance

Frequently, the media characterizes computer crimes as those involving hacking (gaining unauthorized computer network access), cracking (another word for gaining unauthorized access to a computer or program), or web page defacing (gaining unauthorized access to a web page and changing its content).
Alan B. Jan 16 2004 1:06PM Security
SECURITY LIBRARY: CERT Guide to System and Network Security

SECURITY LIBRARY: CERT Guide to System and Network Security

CERT (www.cert.org) has released a comprehensive guide for protecting information systems.
Anton Chuvakin Jan 16 2004 1:04PM Security
Suspicious Web Services Want YOU!

Suspicious Web Services Want YOU!

The other day, while I was going about my browsing, a pop-under ad stopped by.
Jon Tullett Jan 16 2004 1:02PM Security
Identity Management - Delivering Security and Value

Identity Management - Delivering Security and Value

Ensuring information security has never been more important.
Peter Shillito Jan 16 2004 1:00PM Security
Protecting Consumer Privacy Is as Easy

Protecting Consumer Privacy Is as Easy

In his last column [www.infosecnews.com/opinion/2002/05/15_04.htm], Bill Van Emburg discussed the urgent requirement for companies to address the privacy of their customers' data.
Bill Van Jan 16 2004 12:57PM Security
Will the Web Ever Be Secure?

Will the Web Ever Be Secure?

If you lived your life based on what you read about crime in the daily papers, you wouldn't get out of bed in the morning.
Peter Jopling Jan 16 2004 12:55PM Security
Educating and Policing with Policy

Educating and Policing with Policy

By nature, human beings take the easiest route. Every one of us is all about the path of least resistance
Illena Armstrong Jan 16 2004 12:53PM Security
Lessons of the Honeypot I: Aggressive and Careless

Lessons of the Honeypot I: Aggressive and Careless

The amazing book of Lance Spitzner "Know Your Enemy" seems to have opened the floodgates of honeypot deployment.
Anton Chuvakin Jan 16 2004 12:51PM Security
Cryptographic Policy - What’s the Blowback?

Cryptographic Policy - What’s the Blowback?

In early 2000, Americans became aware of a common U.S. Intelligence term called ‘blowback.’
Melisa LaBancz-Bleasdale Jan 16 2004 12:48PM Security
Information Security: Addressing the Human Factor

Information Security: Addressing the Human Factor

Interest in information security is at unprecedented levels.
Steve Crutchley Jan 16 2004 12:47PM Security
Hiding in Plain Sight

Hiding in Plain Sight

Hidden in this column is a secret message.
Jon Tullett Jan 16 2004 12:45PM Security
Is Information Security Crossing the Proverbial You Know What?

Is Information Security Crossing the Proverbial You Know What?

Information security is a hot topic these days, something that often gets credited to an increased awareness of terrorism.
Dan Taylor Jan 16 2004 11:37AM Security
Information Availability - the Future of Business Continuity

Information Availability - the Future of Business Continuity

It’s on a “need to know” basis, and I need to know!
Keith Tilley Jan 16 2004 11:36AM Security
When Worlds Collide: Physical and Information Security

When Worlds Collide: Physical and Information Security

Information security and physical security are frequently viewed as either conflicting or as far removed from one another as the sun is from the moon.
Thresa Lang Jan 16 2004 11:34AM Security
Secure Mobile Data Comes of Age

Secure Mobile Data Comes of Age

I've just spent the day with O2 (www.o2.com), the new name for what used to be known as BT Cellnet in the U.K., Viag Interkom in Germany, Esat Digifone in Ireland and Telfort in the Netherlands.
Steve Gold Jan 16 2004 11:32AM Security
The Right Analysis at the Right Time

The Right Analysis at the Right Time

The good news is that over the past several years, security analysis has become a widely accepted and integral part of development and deployment processes.
Brad Johnson Jan 16 2004 11:19AM Security
Close the Door on Unwanted Guests: Keys to a Safe and Secure Wireless Network

Close the Door on Unwanted Guests: Keys to a Safe and Secure Wireless Network

As the benefits of a wireless local area network (WLAN) become more apparent, an increasing number of businesses are quick to adopt this technology.
Chris O’Ferrell Jan 16 2004 11:12AM Security
Information Insecurity

Information Insecurity

What is information security?
Bob Lonadier Jan 16 2004 11:10AM Security

Log In

  |  Forgot your password?