Features

Centrally Managed Network Security: Hope or Reality?

Centrally Managed Network Security: Hope or Reality?

Ask any IT professional to predict the future of computer networking and you will get different answers.
Dan Thomsen Jan 15 2004 11:40AM Security
Rules or Signatures?

Rules or Signatures?

As the industry increasingly moves towards the adoption of new preventative security products, an interesting debate has arisen as a consequence.
Iain Franklin Jan 15 2004 11:38AM Security
Making Sense of “Homeland Security”

Making Sense of “Homeland Security”

As the Homeland Security Act makes its way through the United States Congress, the topic of homeland security has become a relevant discussion in the information security marketplace.
Dan Taylor Jan 15 2004 11:27AM Security
Intrusion Detection: Let’s Make Some Real Progress, Today!

Intrusion Detection: Let’s Make Some Real Progress, Today!

It would be nice if most intrusions were detected, but they are not.
Brad C. Jan 15 2004 11:26AM Security
Secure Computing - Blended Viruses: A New Era in Anti-Virus Protection

Secure Computing - Blended Viruses: A New Era in Anti-Virus Protection

We live in a new era of blended threats, worm viruses and a host of new breeds of malicious mobile code that are more dangerous than ever.
Dean Coza Jan 15 2004 11:22AM Security
Real-World IT Security - The Social Engineering Perils of Commuting

Real-World IT Security - The Social Engineering Perils of Commuting

The morning commute from my suburban town of residence to London, where I presently work, and back is an opportunity to catch up on some reading and the news.
Stuart King Jan 15 2004 11:16AM Security
Dedication is what you need?

Dedication is what you need?

In an ideal world, every company would have a dedicated recovery center to ensure information availability 24/7/365. It is the ultimate defense against unforeseen circumstances impacting on critical business functions.
Andrew Waterston Jan 15 2004 11:14AM Security
Smart ID Cards to Protect Citizen Privacy

Smart ID Cards to Protect Citizen Privacy

Secure identification of individuals within a country’s population is a fundamental and critical function for any population’s economic and moral well-being.
Bruno Lassus Jan 15 2004 11:12AM Security
It Could Never Happen to Us…

It Could Never Happen to Us…

Simply by operating on a day-to-day basis, companies are risking their reputations.
Graham Peat Jan 15 2004 11:11AM Security
Super! Ultra! Jumbo! Privacy as the New Multi-Purpose Word

Super! Ultra! Jumbo! Privacy as the New Multi-Purpose Word

I am becoming more convinced that there are way too many interpretations of the word “privacy.”
Melisa LaBancz-Bleasdale Jan 15 2004 11:10AM Security
Trusted Information Awareness - Another Name for Domestic Spying?

Trusted Information Awareness - Another Name for Domestic Spying?

Co-incident with the news about the formation of the U.S. Department of Homeland Defense is the breaking of a story about a Defense Advanced Research Projects Agency (DARPA) ‘research project’ exploring the viability of sifting through huge amounts of transaction data looking for possible terrorist activities.
Bob Lonadier Jan 15 2004 10:57AM Security
Redefining Email Security Policies

Redefining Email Security Policies

Corporations the world over are beginning to see email in a whole new light: not just as a revolutionary business tool, but also as a major potential liability if not controlled.
Tanya Candia Jan 15 2004 10:55AM Security
Securing and Managing Electronic Messaging in the Enterprise

Securing and Managing Electronic Messaging in the Enterprise

The threats and problems posed by email in large and complex organizations are of a different type and scale of magnitude from the email problems that such organizations first solved with an email ‘point product’ some years previously.
Staff Writers Jan 15 2004 10:53AM Security
White Hat v. Black Hat

White Hat v. Black Hat

Stereotyping is very dangerous in investigations, particularly in the field of information security.
Interpol European Jan 15 2004 10:51AM Security
For Your Eyes Only - Maximizing Security in a Closed Environment

For Your Eyes Only - Maximizing Security in a Closed Environment

Fingerprint, retinal or even voice identification have traditionally existed only in James Bond-style blockbuster movies.
Jackie Groves Jan 15 2004 10:48AM Security
PKI - Why Go Through the Hassle?

PKI - Why Go Through the Hassle?

As email increasingly substitutes for the use of letters and faxes, even in government departments, and as commercial transactions on the web get more and more important, the need for secure communications grows.
Guy Vancollie Jan 15 2004 10:46AM Security
Businesses Should Not Fear Teleworking Security Issues

Businesses Should Not Fear Teleworking Security Issues

In November 2002 SonicWALL published the results of an independent survey into the attitudes of British businesses towards teleworking and the steps most commonly taken to ensure home workers connect to the office securely.
Harry Gostling Jan 15 2004 10:42AM Security
Networks Risk Grounding Without Airport-Level Security

Networks Risk Grounding Without Airport-Level Security

It is one of the old security adages that the nature of the threats to networks are ever-changing.
Nigel Hawthorn Jan 15 2004 10:40AM Security
Network vulnerabilities

Network vulnerabilities

Basic network security issues have changed very little over the past decade.
Peter Crowcombe Jan 15 2004 10:23AM Security
Security Issues for Remote IT Delivery

Security Issues for Remote IT Delivery

Colin Wells, chairman of JBS Computer Services, examines what SMEs should look for from suppliers when choosing the remote route for software delivery
Colin Wells Jan 15 2004 10:17AM Security

Log In

  |  Forgot your password?