Features

Cyberliability: Turning the Spotlight to Internal IT Security

Cyberliability: Turning the Spotlight to Internal IT Security

Is your company data an asset or a threat?
Staff Writers Jan 14 2004 4:05PM Security
A Next-Generation DoS Attack: ‘Distributed Reflection’

A Next-Generation DoS Attack: ‘Distributed Reflection’

Denial-of-service (DoS) attacks just got worse - and easier! DoS is actually a grab bag of a great many techniques (such as worms and SYN flooding), all with the objective of denying legitimate clients access to services running on Internet based servers.
Rodney Denno Jan 14 2004 4:00PM Security
Scalable Encryption Solutions for Today’s Environment

Scalable Encryption Solutions for Today’s Environment

The scope and character of today’s computing environment is changing dramatically.
David Cullinane Jan 14 2004 3:56PM Security
The Six Honest Men of Business Continuity Planning

The Six Honest Men of Business Continuity Planning

"I keep six honest serving men (They taught me all I knew); Their names are What and Why and When And How and Where and Who" (Rudyard Kipling, from ‘The Elephant’s Child’ in Just So Stories).
Keith Tilley Jan 14 2004 3:53PM Security
Companies Look to Long-Time Networkers to Combat Cyberthreats

Companies Look to Long-Time Networkers to Combat Cyberthreats

While it makes perfect sense that the United States FBI needs a comprehensive security strategy, many companies and organizations initially did not see the need for securing their intellectual assets.
Robert Blakley Jan 14 2004 3:51PM Security
Smashing The Millstone

Smashing The Millstone

Information security has risen dramatically on corporate agendas since this time last year, fuelled by a combination of the terrorist activities of September 2001, the growing sophistication of malicious online attacks on businesses, and the increasing realization that unbroken network surveillance, instant intrusion detection and immediate response strategies are boardroom responsibilities.
Lisa Dargan Jan 14 2004 3:49PM Security
The Threat of Internet Worms

The Threat of Internet Worms

2001 was without any doubt the year of vulnerabilities.
Yona Hollander Jan 14 2004 3:47PM Security
What to Look for in a Web Application Protection System

What to Look for in a Web Application Protection System

The number of technology pundits decrying the state of Internet security has reached an unbearable level.
Abishek Chauhan Jan 14 2004 3:44PM Security
From Business Policy to Network Policy

From Business Policy to Network Policy

At the core of decisions about Internet access, monitoring and content filtering are business policies that specify where, when and how users will access web content.
Steve House Jan 14 2004 3:40PM Security
Perimeter Defense Model for Security

Perimeter Defense Model for Security

There has to be a better way!
Adam Lipson Jan 14 2004 3:38PM Security
PKI Policy in the Business Environment

PKI Policy in the Business Environment

In the traditional world, the individual moves through differing process and policy environments in which varying policies govern their interactions with others.
John T. Jan 14 2004 3:29PM Security
What’s In a Name?

What’s In a Name?

In this article, issues of virus naming as they impact users will be discussed, and some of the ways that naming might affect the reviewing of products will be examined.
Sarah Gordon Jan 14 2004 3:26PM Security
Would You Please Swear in the Chief Security Officer?

Would You Please Swear in the Chief Security Officer?

As defense counsel to a corporation or as the chief security officer, hearing such words should send immeasurable fear through the hearts of each participant at any time you are sworn in.
Michael P. Jan 14 2004 3:22PM Security
Web Site Availability

Web Site Availability

Best practice (ISO 17799) advocates the development of information security policies to ensure the confidentiality, integrity and availability of information.
Staff Writers Jan 14 2004 3:07PM Security
Simplifying Network Security

Simplifying Network Security

Network security can be complex.
Dan MacDonald Jan 14 2004 3:03PM Security
A Practical and Realistic Approach for Testing the Performance of Firewalls: What Your Security Vendors Don't Want You to Know

A Practical and Realistic Approach for Testing the Performance of Firewalls: What Your Security Vendors Don't Want You to Know

While Internet security has always been important, only recently has it emerged as an important issue for almost all who use the Internet.
Johnson Wu, Jan 14 2004 3:01PM Security
Maximizing Network Performance with Quality-of-Service Solutions

Maximizing Network Performance with Quality-of-Service Solutions

Today's content-heavy networks are transmitting richer, more critical data - and as a result, more and more enterprises are demanding quality-of-service (QoS) agreements for a higher level of network service, one that assures reliable delivery of content along with consistent availability of bandwidth.
Neil Gehani Jan 14 2004 2:57PM Security
Buffer Overflow Vulnerabilities, a Challenge for Everyone

Buffer Overflow Vulnerabilities, a Challenge for Everyone

In May 1998, Panda Software published a press release in which I made my first public statement.
Carlos Ardanza Jan 14 2004 2:54PM Security
The Politics of Vulnerabilities

The Politics of Vulnerabilities

In the last few months, debate over the ethics of disclosing details of vulnerabilities has been rekindled.
Scott S. Jan 14 2004 2:52PM Security
Information Security on The Internet

Information Security on The Internet

In the aftermath of the September 11 terrorist events in the United States, the fear that malevolent hackers and other criminal perpetrators might unleash a cyberattack on the Internet is becoming an increasing concern.
Jason B. Jan 14 2004 2:49PM Security

Log In

  |  Forgot your password?