Features

Before a Fall

Before a Fall

A breaking up of old habits typically happens with a characteristic slowness.
Illena Armstrong Jan 15 2004 3:02PM Security
Interpol Tracks Information and Communication Technology Crime

Interpol Tracks Information and Communication Technology Crime

“IT crime constitutes an ‘enormous’ threat to our society!”
Interpol European Jan 15 2004 2:42PM Security
Addressing the Internet’s ‘Human Factor’

Addressing the Internet’s ‘Human Factor’

Since the late 1980s, corporations have invested heavily in network and information systems technology to create network-based applications that can be used by employees, partners and clients regardless of their physical location.
Malcolm Rieke Jan 15 2004 2:40PM Security
Lessons Learned in Global IDS Deployment

Lessons Learned in Global IDS Deployment

Intrusion detection systems (IDS) have been the subject of endless articles, conferences, and discussions.
Jason Reed Jan 15 2004 2:38PM Security
SECURITY CAMERA: Who Said Crime Doesn’t Pay?

SECURITY CAMERA: Who Said Crime Doesn’t Pay?

I was sitting thinking about some of the crazy sayings people have, some of which are true, such as, “Never put your eggs in one basket” or “A stitch in time saves nine.”
Jayne Parkhouse Jan 15 2004 2:35PM Security
Lessons of the Honeypot II: Expect the Unexpected

Lessons of the Honeypot II: Expect the Unexpected

Observation and monitoring of computer intruders have long been performed in a haphazard fashion, if at all.
Anton Chuvakin Jan 15 2004 2:31PM Security
Coping with ISP failure

Coping with ISP failure

The general malaise and recession in the telecommunications sector seems to claim new victims every month.
Tony Anscombe Jan 15 2004 2:29PM Security
Computer Seizures

Computer Seizures

Recently, a patron was purchasing a pair of sunglasses at a shopping mall kiosk.
Alan B. Jan 15 2004 2:27PM Security
PINs, Signatures and Countering Fraud

PINs, Signatures and Countering Fraud

Trotting through the shiny new airport terminal in Brussels recently, I was surprised to be asked to verify my credit card purchases in the duty-free shop with a PIN instead of a signature.
Steve Gold Jan 15 2004 2:25PM Security
Where In the World Did I Put That File?

Where In the World Did I Put That File?

As I get older each minute, my short-term memory doesn't seem to remember a lot about yesterday, much less last month.
Jack Wiles Jan 15 2004 2:14PM Security
Money Alone Won't Solve Network Security Issues

Money Alone Won't Solve Network Security Issues

The combination of terrorism fears and high-profile virus, worm and denial-of-service attacks, along with ongoing break-in revelations, has given new urgency to network and application security issues.
Taher Elgamal Jan 15 2004 2:12PM Security
Why Application Security is the New Threat

Why Application Security is the New Threat

As the use and exploitation of the Internet matures, so does its need for security.
Dan Cuthbert Jan 15 2004 2:10PM Security
Fighting the Good Fight

Fighting the Good Fight

A couple of weeks ago I had the opportunity to sit in on a class on computer forensics, courtesy of Guidance Software.
Jon Tullett Jan 15 2004 2:07PM Security
Business Issues Relating to the Patriot Act

Business Issues Relating to the Patriot Act

Since its passage in October last year, everyone (in the U.S. at least) has heard of the Patriot Act (USAPA). It is 342 pages of reform extending the powers of international intelligence agencies and law enforcement organizations.
Thresa Lang Jan 15 2004 1:55PM Security
Planning for a disaster is half the work - Can you recover?

Planning for a disaster is half the work - Can you recover?

Increasingly, companies are implementing business continuity plans to ensure the constant availability and support of the company infrastructure and business processes.
Phil Carter Jan 15 2004 1:43PM Security
Protecting Documents and Data Shouldn’t Stop at the Server

Protecting Documents and Data Shouldn’t Stop at the Server

There are two types of companies.
Bob Brennan Jan 15 2004 1:38PM Security
There’s no escaping the dentist and cyber planning

There’s no escaping the dentist and cyber planning

Infosecurity is kind of like visiting the dentist: we all know we have to do it, but we seem to put it off for as long as humanly possible.
Illena Armstrong Jan 15 2004 1:36PM Security
Roller-Coaster MSS Industry: An Update

Roller-Coaster MSS Industry: An Update

For those participants and investors in the managed security services (MSS) space, the last two years has seemed more like two lifetimes.
Sean Jackson Jan 15 2004 1:31PM Security
Managed Security Service Providers Are Dead - Long Live MSSPs

Managed Security Service Providers Are Dead - Long Live MSSPs

Managed security services providers (MSSPs) are dead.
Robert Lonadier Jan 15 2004 1:29PM Security
Do It Yourself Security: Cutting Our Umbilical Dependence on the Consultant Community

Do It Yourself Security: Cutting Our Umbilical Dependence on the Consultant Community

A long while ago I had a business card identity that branded me as a Security Export Consultant.
Melisa LaBancz-Bleasdale Jan 15 2004 1:26PM Security

Log In

  |  Forgot your password?