Features

Not Everything You Always Wanted to Know About Web Services Security

Not Everything You Always Wanted to Know About Web Services Security

Woody Allen, that famous web services guru and comedian on the side, once described James Joyce as “the most incomprehensible and hence the finest poet of his time.”
Throop Wilder Jan 15 2004 10:13AM Security
Securing Online Payments

Securing Online Payments

From the early days of the Internet, credit and charge card companies recognized the enormous opportunities presented to them - but they also saw challenges ahead.
Richard Moulds Jan 15 2004 10:11AM Security
How to Get Boardroom Buy-in on Business Continuity

How to Get Boardroom Buy-in on Business Continuity

For the person responsible for business continuity (BC), getting board-level commitment can be the biggest obstacle to creating a process to manage an ongoing program of business continuity activities.
Staff Writers Jan 15 2004 10:09AM Security
Data Complacency

Data Complacency

According to a report by Jupiter Research (July 2001 Jupiter Executive Survey), 49.5 per cent of CIOs considered the sensitivity of their company's data as 'low.’
Humphrey Browning Jan 15 2004 10:08AM Security
Cooperation More Important Than Competition

Cooperation More Important Than Competition

The term ‘blended threats’ has become synonymous with viruses in the last year.
Sal Viveros Jan 15 2004 10:06AM Security
Costs Versus Benefits in Securing Your Applications

Costs Versus Benefits in Securing Your Applications

The current state of application security practice is grim.
Bob Ayers Jan 15 2004 10:04AM Security
Cyberterrorism: Are We Leaving the Keys Out?

Cyberterrorism: Are We Leaving the Keys Out?

In a post-Sept. 11 world, the security community is being asked to address a growing list of sobering scenarios that range from the newly plausible to the truly frightening.
Kevin Cunningham Jan 15 2004 10:01AM Security
Securing the Last Unprotected Area of the Network

Securing the Last Unprotected Area of the Network

Just how secure is your network?
James Teel Jan 15 2004 9:57AM Security
Security Tools within the Common Criteria Framework: Part 2

Security Tools within the Common Criteria Framework: Part 2

This is the second part of a two-part article. The first part discussed security tools used to protect data integrity and the related business processes within an organization: (www.scmagazine.com/scmagazine/sc-online/2002/article/48/article.html).
Fredric Greene Jan 15 2004 9:56AM Security
Novell updates identity management software

Novell updates identity management software

Novell released the latest version of its identity management product, Nsure Identity Manager 2 heralding tighter integration between its web services and identity management software.
Rene Millman Jan 14 2004 5:09PM Security
Application security - the weakest link

Application security - the weakest link

You wouldn't walk into a bank and find money or valuables laid out in plain view and easy to reach.
Itay Haber Jan 14 2004 5:07PM Security
Don’t Blame the Pigeons

Don’t Blame the Pigeons

It’s the 15th century, and wireless communications are flourishing. The Cardinal, Sir Dickcheney, sensing imminent invasion from the enemy, has instructed his trusted servant Walker (for centuries known only as “W”) to deliver a message to a military outpost on the remote frontiers of the kingdom, 500 miles away. “Prepare to attack.” reads the message. W’s problem: he has to get it there in 24 hours. His only option: wireless. He runs up to the tower where the master pigeon trainer, Rummy, awaits. They exchange a secret password and W hands Rummy the message. Rummy affixes the message to one of the prize pigeons and off it flies.
Throop Wilder Jan 14 2004 5:04PM Security
Security and Web Services

Security and Web Services

What is in essence a framework for designing, developing and building a new generation of applications around web standards and protocols, web services promises to make it far easier to integrate applications across disparate hardware and software platforms - a constant gripe with existing technology. Backed by all of the major IT vendors (Microsoft, IBM, Sun, Oracle, etc.), web services certainly will not suffer from a lack of effort or exposure, but will it take off and what are the issues?
Peter Doyle Jan 14 2004 5:02PM Security
Securing Image Content in Email

Securing Image Content in Email

What arrives in our in-boxes these days is becoming progressively richer and fatter. The content includes HTML formatted rich text, hyperlinks and attachments of various types, including Office documents, databases, images, videos, etc. It is now estimated that more than 5 per cent of emails contain images.
Staff Writers Jan 14 2004 5:00PM Security
Security Tools within the Common Criteria framework

Security Tools within the Common Criteria framework

This is the first part of a two-part article. The second part will discuss specific topics in more detail, including specific system and network security tools such as network port scanners, OS detection, configuration tools and vulnerability assessment.
Fredric Greene Jan 14 2004 4:58PM Security
Aircracked!

Aircracked!

It may not be illegal.
Throop Wilder Jan 14 2004 4:42PM Security
The Best Free (and Cheap) Security Software Part 1: Hashes and Encryption

The Best Free (and Cheap) Security Software Part 1: Hashes and Encryption

This is the first article in a series that will look at some of the best free (and cheap) security software.
Ric Steinberger Jan 14 2004 4:38PM Security
Do Firewalls and IDS Create a False Sense of Internal Security?

Do Firewalls and IDS Create a False Sense of Internal Security?

In an effort to boost sales and generate revenue, one U.S. multinational energy company recently embraced the Internet to bolster external communication and internal collaboration.
Abishek Chauhan Jan 14 2004 4:36PM Security
New Technology Cracks Down on ID Theft?

New Technology Cracks Down on ID Theft?

For the second time in four years, the U.S. General Accounting Office reported identity theft as the fastest growing crime in America, with businesses and consumers losing billions of dollars to identity thieves.
Larry Gilbert Jan 14 2004 4:33PM Security
The Secret of Agents

The Secret of Agents

A generation ago, the world of espionage and counter-intelligence was populated by agents who operated in the shadows of eavesdropping, codes and hollowed-out books to collect and transmit important information.
Larry Lunetta Jan 14 2004 4:31PM Security

Log In

  |  Forgot your password?