Features

Do It Yourself Security: Cutting Our Umbilical Dependence on the Consultant Community

Do It Yourself Security: Cutting Our Umbilical Dependence on the Consultant Community

A long while ago I had a business card identity that branded me as a Security Export Consultant.
Melisa LaBancz-Bleasdale Jan 15 2004 1:26PM Security
SECURITY CAMERA: A Christmas Carrot

SECURITY CAMERA: A Christmas Carrot

Walking through our local shopping center the other day, mingling with the bustling crowds, it dawned on me that it’s almost that time of year again (only nine weeks to go).
Jayne Parkhouse Jan 15 2004 1:25PM Security
What Happens When Email Goes Wrong?

What Happens When Email Goes Wrong?

You may think that sending an email is safe enough.
Steven Jenkins Jan 15 2004 1:21PM Security
The Anatomy of a Security Incident Response Team

The Anatomy of a Security Incident Response Team

As organizations continue to invest in dedicated information security resources, it is imperative that they also develop the capability to respond to security incidents.
Tom Scholtz Jan 15 2004 1:20PM Security
Computer Seizures

Computer Seizures

Recently, a patron was purchasing a pair of sunglasses at a shopping mall kiosk.
Alan B. Jan 15 2004 1:18PM Security
Battle for the Cards: Signatures versus PINs

Battle for the Cards: Signatures versus PINs

Regular readers of SC's Opinionwire will recall me wibbling on about how credit and debit card issuers are moving steadily towards PIN-based authorization of transactions.
Steve Gold Jan 15 2004 1:16PM Security
Network Intrusion Detection 3rd edition

Network Intrusion Detection 3rd edition

The next incarnation of the excellent network intrusion detection manual from SANS's Stephen Northcutt and Judy Novak is here.
Stephen Northcutt Jan 15 2004 12:28PM Security
The Accomplice, Protector and Informer

The Accomplice, Protector and Informer

When you think of computer crime, you immediately think of Internet fraud, hacking, viruses or other external threats to an organization.
Martin. W. Jan 15 2004 12:26PM Security
Web Services: Convenience at a Price

Web Services: Convenience at a Price

We have all heard about web services.
Dick Mackey Jan 15 2004 12:20PM Security
Not Every Card Offers Well Wishes

Not Every Card Offers Well Wishes

Internet marketing and viruses have much in common: they are annoying, unwanted, and usually arrive by email.
Jon Tullett Jan 15 2004 12:17PM Security
Securing Enterprise Application Portals

Securing Enterprise Application Portals

A critical evaluation of success in today’s economy must be the ability to respond to an ever-increasing rate of change.
Tony Caine Jan 15 2004 12:09PM Security
Seeking a Secure Relationship?

Seeking a Secure Relationship?

Despite the economic slowdown, the outsourcing industry grew by 19 percent in the UK last year according to Ovum.
John Alcock Jan 15 2004 12:07PM Security
A Proper Diet of Information Security

A Proper Diet of Information Security

Earlier this year, researchers in Sweden announced that during a research study, they discovered that bread, potato chips, French fries and even cereal contain high levels of the carcinogen acrylamide.
Dan Taylor Jan 15 2004 12:05PM Security
Computer Security - What's Hiding In Your Closet?

Computer Security - What's Hiding In Your Closet?

How's that for a catchy title?
Jack Wiles Jan 15 2004 12:03PM Security
e-Security in the Public Sector

e-Security in the Public Sector

The public sector IT market is enjoying healthy growth in many developed countries.
Staff Writers Jan 15 2004 12:00PM Security
New Technology and Security Déjà Vu

New Technology and Security Déjà Vu

Last May, USA Today reported on the Jacobs family getting implanted with computer chips containing their medical record information.
Ben Rothke Jan 15 2004 11:58AM Security
The Truth about Digital CCTV

The Truth about Digital CCTV

Not too long ago, I was speaking at an International Security Conference on the subject of forensic video analysis.
Teresa Lang Jan 15 2004 11:57AM Security
Incentives for Avoiding a Cyber Pearl Harbor

Incentives for Avoiding a Cyber Pearl Harbor

The Internet Law and Public Policy Forum held a conference in Seattle this fall.
Ed Hearst Jan 15 2004 11:55AM Security
Monitoring Security from the Inside Out: Intrusion Detection at the Configuration Level

Monitoring Security from the Inside Out: Intrusion Detection at the Configuration Level

Today’s intrusion detection (ID) technology is, for the most part, network-centric.
Andy Evans Jan 15 2004 11:45AM Security
Of Votes and Cyberspace

Of Votes and Cyberspace

With the mid-term elections come and gone, it’s time for the Bush Administration to re-focus its attention on protecting cyberspace.
Bob Lonadier Jan 15 2004 11:41AM Security

Log In

  |  Forgot your password?