Features

e-Security Threats aren't Just the Enemy of the Corporate

e-Security Threats aren't Just the Enemy of the Corporate

They may not have as many employees, generate the same size revenues or have the million-plus customer base of the large enterprises, but when it comes to Internet security, small and medium-sized businesses (SMEs) face exactly the same risks as larger organizations when they incorporate e-business and e-commerce into their traditional business models.
Ralph Shaw Jan 14 2004 2:48PM Security
Digital Signatures: What Can Businesses and Consumers Expect?

Digital Signatures: What Can Businesses and Consumers Expect?

Laws giving digital signatures legal legitimacy have been enacted around the world.
Rett Summerville Jan 14 2004 2:47PM Security
Distributed Denial-of-Service Attacks - Hacker Tools of the Trade

Distributed Denial-of-Service Attacks - Hacker Tools of the Trade

The denial-of-service (DoS) attack is a common, recurring problem in networking, and recently, more and more companies are being caught out because of holes in their security infrastructure.
Paul Lawrence Jan 14 2004 2:45PM Security
Optical Network Security Demands a New Performance Threshold

Optical Network Security Demands a New Performance Threshold

The events of September 11 have made security a national priority in the USA.
Peder Jungck Jan 14 2004 2:43PM Security
The Next Virus

The Next Virus

Various iterations of the Nimda virus have slowed its propagation around the world after causing havoc on resource-constrained IT organizations.
Jaime Borrego Jan 14 2004 2:39PM Security
Microsoft XP - Solving Security Concerns or Still a Liability?

Microsoft XP - Solving Security Concerns or Still a Liability?

Microsoft's Windows XP operating system has arrived amid a multi-million dollar worldwide marketing fanfare the like of which we rarely see.
Paul Barker Jan 14 2004 2:37PM Security
Fingerprint Authentication: Shifting the Electronic Security Paradigm

Fingerprint Authentication: Shifting the Electronic Security Paradigm

Interest in security is at an all-time high. How can we best secure our possessions, our information, even ourselves?
S. K. Jan 14 2004 2:36PM Security
Ensure Your Pocket Time-Bomb Doesn't Blow Up In Your Face!

Ensure Your Pocket Time-Bomb Doesn't Blow Up In Your Face!

Companies are under more pressure than ever before to ensure that when it comes to protecting their lifeblood - their critical corporate data - no protection can be too much.
Magnus Ahlberg Jan 14 2004 2:34PM Security
Software Compliance: A Helping Hand in an Economic Downturn

Software Compliance: A Helping Hand in an Economic Downturn

By now, it's obvious that the economy and the technology sector in particular, are in the midst of a significant downturn. But hand-wringing over ever-dropping stock prices, new rounds of lay-offs and lowered earnings do not constitute a strategy.
Richard Willmott Jan 14 2004 2:23PM Security
A Network Security Checklist

A Network Security Checklist

Due to the abundance of Internet security attacks, the news over the past year has been flooded with warnings and reports of numerous network vulnerabilities.
Mark Epstein Jan 14 2004 2:20PM Security
The Most Commonly Overlooked Security Holes

The Most Commonly Overlooked Security Holes

Historically, corporations and solution providers have taken a medieval, provincial approach to keeping data secure.
Todd Lawson Jan 14 2004 2:03PM Security
Evaluating the Security Risk Between Business-to-Business and Business-to-Consumer

Evaluating the Security Risk Between Business-to-Business and Business-to-Consumer

Today's security measures are not keeping up with today's security risks.
John Bernardi Jan 14 2004 1:39PM Security
Designing and Deploying Effective Defenses Against Denial-of-Service Attacks

Designing and Deploying Effective Defenses Against Denial-of-Service Attacks

Vince Liu Jan 14 2004 1:32PM Security
Untangling Security Issues to Enable Web-based Email Access

Untangling Security Issues to Enable Web-based Email Access

Today's users consider email a major component of their business and personal communications, and demand the convenience of email access from any location at any time.
Joseph Steinberg Jan 14 2004 1:29PM Security
Using File Hashes to Reduce Forensic Analysis

Using File Hashes to Reduce Forensic Analysis

The "hashkeeper" paradigm or model was first introduced a number of years ago by Brian Deering of the National Drug Intelligence Center (www.hashkeeper.org).
Dan Mares Jan 14 2004 1:27PM Security
Signature-Based or Anomaly-Based Intrusion Detection: The Practice and Pitfalls

Signature-Based or Anomaly-Based Intrusion Detection: The Practice and Pitfalls

Intrusion detection has become big business on the Internet and, to be honest, it's not surprising.
Arnt Brox Jan 14 2004 1:23PM Security
Hacker Repellent: Deterring Hackers on a Shoestring Budget

Hacker Repellent: Deterring Hackers on a Shoestring Budget

Today, hackers scan and probe sites of all sizes to find those most vulnerable to e-shoplifting, data theft or portals to access broader attacks.
Amit Klein Jan 14 2004 1:21PM Security
Application-Level Defense: The Email Battlefield

Application-Level Defense: The Email Battlefield

The security wars continue.
Jay Chaudhry Jan 14 2004 1:16PM Security
How do you stop the threat from within?

How do you stop the threat from within?

The biggest threat to security is not from outside, it is from the company employee. Julie Jervis asked security experts throughout the U.S. how they are educating these end-users
Julie Jervis Jan 13 2004 5:15PM Security
Infosec is news in the year of the worm

Infosec is news in the year of the worm

This has been a very good year - especially for the hackers. Ben Rothke wonders if we have learned anything from the experience
Ben Rothke Jan 13 2004 5:13PM Security

Log In

  |  Forgot your password?