Features

Very Unique Product Will Transform Your Life!

Very Unique Product Will Transform Your Life!

My hype-meter has been jumping in recent weeks, illuminating a rocky road for the security market that will produce some corporate casualties in the near future.
Jon Tullett Jan 16 2004 10:15AM Security
Communications Security in the 21st Century

Communications Security in the 21st Century

We are all aware that the ‘electronic age’ in which we exist is in reality an increasingly complex combination of interacting applications.
Staff Writers Jan 16 2004 10:14AM Security
(ISC)²’s Common Body of Knowledge and the HIPAA Security and Privacy Rules

(ISC)²’s Common Body of Knowledge and the HIPAA Security and Privacy Rules

It is no surprise that the security rules of the U.S. 1996 Health Portability and Accountability Act (HIPAA) appear closely modeled after existing generally accepted information security best practices.
Micki Krause Jan 16 2004 10:13AM Security
Take Back Your Security Infrastructure

Take Back Your Security Infrastructure

Imagine you work for one of those companies where information security is taken seriously, senior management support is for granted, the appropriate IT defenses are deployed and users are educated on the security policy.
Anton Chuvakin Jan 16 2004 10:08AM Security
Chasing Infosec Budgets and the Loch Ness Monster

Chasing Infosec Budgets and the Loch Ness Monster

Trying to get an accurate, unbiased reading of today’s Internet security arena is like trying to get a non-fuzzy, close-up and genuine photograph of the Loch Ness Monster.
Illena Armstrong Jan 16 2004 10:07AM Security
Security Training - The Essentials

Security Training - The Essentials

The Four Basics
Peter Curran Jan 16 2004 10:04AM Security
Smart Move

Smart Move

Over the last few years, corporate facilities management has started to come of age.
Nigel Hope Jan 16 2004 10:01AM Security
The Privacy of Data in Motion

The Privacy of Data in Motion

The recent draft on employee monitoring, released earlier this year by the U.K. Information Commissioner, has caused a stir among employees and employers.
Staff Writers Jan 16 2004 10:00AM Security
SECURITY CAMERA Propagating Viruses - Who Me?

SECURITY CAMERA Propagating Viruses - Who Me?

My last opinion piece (Winning the Virus War - But When? July 31, www.infosecnews.com/opinion/2002/07/31_01.htm) resulted in some (positive) responses, for which I’m grateful.
Jayne Parkhouse Jan 16 2004 9:58AM Security
Open File Solutions: Optimization for ‘Now’

Open File Solutions: Optimization for ‘Now’

It’s no secret that in today’s information age, data integrity and redundancy are critical success factors for businesses.
April Nelson Jan 16 2004 9:57AM Security
For Mid-Sized Organizations, High Security Can Be Low Cost

For Mid-Sized Organizations, High Security Can Be Low Cost

In a tight economy, it’s easy to believe that postponing investments is fiscally responsible.
Steve Schlesinger Jan 16 2004 9:55AM Security
Self Help for the Invincible

Self Help for the Invincible

I was listening to a lively debate the other day on the radio.
Adam Holder Jan 16 2004 9:54AM Security
Taking a Realistic Approach to Remote Authentication

Taking a Realistic Approach to Remote Authentication

Just under a decade ago, I was asked to write a white paper on the future of telecommunications and networking for a major telecom company who shall remain nameless.
Steve Gold Jan 16 2004 9:53AM Security
Is Every Crime Becoming a Cybercrime?

Is Every Crime Becoming a Cybercrime?

At first glance, it seems obvious that crime extends well beyond the boundaries of technology and computers.
Thresa Lang Jan 16 2004 9:52AM Security
Securing the Network Edge

Securing the Network Edge

In the evolution of communications networks, the lines between computing and networking have become less than clear.
Dan Taylor Jan 16 2004 9:49AM Security
Mobile Security: New Needs on New Devices

Mobile Security: New Needs on New Devices

As personal digital assistants become more powerful and merge with wireless technology, new means are necessary to ensure the security of such devices as well as the enterprise network they are participating in.
Richard Aufreiter Jan 16 2004 9:47AM Security
The Art of War

The Art of War

It’s not uncommon to hear wisdom such as “if an attacker has physical access to a PC, you’ve lost the battle,” or, “if a Trojan makes it past the defenses, it’s all over.”
Jon Tullett Jan 16 2004 9:44AM Security
Fire and Brimstone in 21st Century Security

Fire and Brimstone in 21st Century Security

It is increasingly disturbing to me that individuals of a certain prominence use their vexing ability to understand complex computations to scare the living heck out of the rest of us humble folks.
Melisa LaBancz-Bleasdale Jan 15 2004 3:07PM Security
Expect the Unexpected

Expect the Unexpected

It's hard to believe that it's been a year since the Code Red worm was making its way across the globe.
Robert Lonadier Jan 15 2004 3:06PM Security
ROI Strategies for Reducing Risk

ROI Strategies for Reducing Risk

The current state of application security practice is grim.
Bob Ayers Jan 15 2004 3:04PM Security

Log In

  |  Forgot your password?