Features

SECURITY CAMERA: A Home Run

SECURITY CAMERA: A Home Run

Telecommuting or teleworking as some call it is still on the increase.
Jayne Parkhouse Jan 16 2004 11:07AM Security
Authentication: From Passwords to Public Keys

Authentication: From Passwords to Public Keys

An exciting book on authentication, of all things?
Anton Chuvakin Jan 16 2004 11:01AM Security
Computer Forensics - You Need It Now More Than Ever!

Computer Forensics - You Need It Now More Than Ever!

A lot of new terms have come at us over the past decade as computers have reached an unbelievable level of sophistication and speed.
Jack Wiles Jan 16 2004 10:59AM Security
The ‘Risk Gap’: Business Perspectives on Security

The ‘Risk Gap’: Business Perspectives on Security

The dramatic rise in the pace and sophistication of cyberattacks is resulting in real financial and operational losses to major corporations.
Bruce Murphy Jan 16 2004 10:58AM Security
To Hide or Not to Hide?

To Hide or Not to Hide?

Security through obscurity is always the subject of heated debate, although the relevant parties often wish it wasn’t, since no one likes their dirty laundry being aired in public.
Jon Tullett Jan 16 2004 10:55AM Security
New Security Perspectives: What U.S. Firms Can Learn From Overseas

New Security Perspectives: What U.S. Firms Can Learn From Overseas

In today's climate of increasing security concerns, companies are seeking out new policy and practice concepts in addition to new technology upgrades to address vulnerabilities.
Steve Crutchley Jan 16 2004 10:44AM Security
When the Hackers Come Knocking

When the Hackers Come Knocking

When a computer has been hacked, the first reaction of the system administrator is usually to restore the system and bring it back online as soon as possible.
the Interpol Jan 16 2004 10:42AM Security
Putting Spam Back in the Can

Putting Spam Back in the Can

Earlier this year, the Australian division of the Coalition Against Unsolicited Bulk Email (CAUBE) revealed that the volume of spam in 2001 increased six-fold over that for 2000.
Pete Simpson Jan 16 2004 10:39AM Security
Summer’s Long Days: Bouncing from Thought to Thought

Summer’s Long Days: Bouncing from Thought to Thought

Good old reliable time, not the Internet kind, does some flying.
Illena Armstrong Jan 16 2004 10:36AM Security
Survival in the Security Space: Taking a Closer Look at the Ingredients for Longevity

Survival in the Security Space: Taking a Closer Look at the Ingredients for Longevity

Today I was thinking about one-hit wonders.
Melisa LaBancz-Bleasdale Jan 16 2004 10:34AM Security
The Changing Face of Security Penetration Testing

The Changing Face of Security Penetration Testing

The growing importance of adequately protecting computer resources is constantly highlighted by an ever-increasing number of high profile IT security incidents appearing in the media.
Simon Waring Jan 16 2004 10:32AM Security
Business Continuity Management is Not a Luxury

Business Continuity Management is Not a Luxury

The Internet has been the catalyst for incredible change in our economy.
Steven J. Jan 16 2004 10:30AM Security
802.11b Security Needs Beefing Up - And Then Some

802.11b Security Needs Beefing Up - And Then Some

It wasn't until BT Mobility (www.groupbt.com), the recently-created public wireless LAN division of British Telecom, announced its plans earlier this year to open several thousand 802.11b public access hot spots across the U.K., that this writer truly considered the benefits of WLAN access on the go.
Steve Gold Jan 16 2004 10:28AM Security
Cookies and Web Bugs and Spyware, Oh My!

Cookies and Web Bugs and Spyware, Oh My!

A couple of years ago privacy advocates were bringing cookies, and the privacy issues related to them, to the attention of the general public.
Thresa Lang Jan 16 2004 10:26AM Security
Wake Up and Smell the Coffee

Wake Up and Smell the Coffee

Over the last several years a number of threats to information security have received more than their share of debate - starting with profiles on the distributed denial-of-service attacks of early 2000 and, alongside these stories, recurring news on a long list of high-profile web defacements.
Andrew Christensen Jan 16 2004 10:25AM Security
Economic Models for Information Security

Economic Models for Information Security

Security managers are under increasing pressure from corporate management to justify investments in information security technologies.
Dan Taylor Jan 16 2004 10:23AM Security
Winning The Virus War - But When?

Winning The Virus War - But When?

Gone are the days when a careless user would infect their machine with a rogue floppy disk, and we’d all look on in dismay as the data disappeared and the monitor went blank.
Jayne Parkhouse Jan 16 2004 10:22AM Security
Penetration Testing: Thinking outside the Black Box

Penetration Testing: Thinking outside the Black Box

Perimeter security technology such as firewalls, content filtering and anti-virus protection, is paramount to a business's defense against attack but can by no means be assumed to be impenetrable.
Diane Seddon Jan 16 2004 10:20AM Security
Calculating PKI Return on Investment - Why Is It So Difficult?

Calculating PKI Return on Investment - Why Is It So Difficult?

Companies invest millions of dollars into public key infrastructure (PKI) products and services; yet demonstrating a return on that investment can prove difficult.
Robert Lonadier Jan 16 2004 10:18AM Security
Looking for Security Problems, Focus on Organizational Fault Lines

Looking for Security Problems, Focus on Organizational Fault Lines

While it is hard to argue that the general level of security competence is increasing and better security tools are available every day, why is it that security remains a problem?
Mark K. Jan 16 2004 10:17AM Security

Log In

  |  Forgot your password?