Features

Central control: Let’s get it all together

Central control: Let’s get it all together

Chris Pick outlines the pressures that are driving some organisations to integrate security and systems management
Chris Pick Jan 13 2004 5:08PM Security
Readability is vulnerability

Readability is vulnerability

Watermarking is playing a more significant role, but is a far cry from the protection most critical data requires, says Barbara Gengler
Barbara Gengler Jan 13 2004 5:03PM Security
Out of patience with exposed Windows

Out of patience with exposed Windows

How are CSOs coping with the growing burden of software patches? Julie Jervus sought the opinions of four practitioners with strong views on the matter
Julie Jervus Jan 13 2004 5:00PM Security
Blackout blues ...and what you can do to avoid them

Blackout blues ...and what you can do to avoid them

The recent power outage was a powerful reminder of the value of business continuity provisions. Ron Mobed reports.
Ron Mobed Jan 13 2004 4:58PM Security
Dangerous exploitations

Dangerous exploitations

There are many damaging consequences of a poorly planned security assessment, says Gunter Ollmann.
Gunter Ollmann Jan 13 2004 4:55PM Security
Does size really matter?

Does size really matter?

Jonathan Gossels and Dick Mackey believe it does - the smaller the device the more likely the victim on theft
Jonathan Gossels Jan 13 2004 4:51PM Security
Laptop stolen? No need to fret: How to minimize the pain

Laptop stolen? No need to fret: How to minimize the pain

What is the solution to laptop loss? Software tracking, a layered approach to security, or is there another way? Illena Armstrong reports
Illena Armstrong Jan 13 2004 4:49PM Security
Holistic paths to security

Holistic paths to security

Security tools are important for protecting company systems, but, says Adam Lipson, focusing on people can yield better results
Adam Lipson Jan 13 2004 4:36PM Security
Washington gets tough

Washington gets tough

What can the private sector learn from the government’s ramped-up IT security? Plenty, says Jerry Harold
Jerry Harold Jan 13 2004 4:32PM Security
Resist the urge: No more point solutions

Resist the urge: No more point solutions

Buying the latest tools to secure your assets is not the way forward. A structured plan for your infosec is vital, says Illena Armstrong.
Illena Armstrong Jan 13 2004 4:28PM Security
Asking a clear question

Asking a clear question

In his third article, Elton Hay discusses the problems and dangers of storing answers to challenge questions.
Elton Hay Jan 13 2004 4:23PM Security
The fine art of deception

The fine art of deception

Attacks using social engineering techniques can be difficult to defend against, as Gunter Ollmann discovers.
Gunter Ollmann Jan 13 2004 4:10PM Security
Faster and more secure

Faster and more secure

SSL’s potential weaknesses can be overcome says David Hicks, creating flexibility for today’s online needs.
David Hicks Jan 13 2004 4:07PM Security
Making the right connection: Which VPN - SSL, IPsec or both?

Making the right connection: Which VPN - SSL, IPsec or both?

What does the future hold for secure virtual private networks? Illena Armstrong gazes into her crystal ball to look for the answer.
Illena Armstrong Jan 13 2004 4:03PM Security
The masters of disguise: Do you know who your users are?

The masters of disguise: Do you know who your users are?

Illena Armstrong looks at the complex and challenging task of managing identities over today’s distributed company systems.
Illena Armstrong Jan 13 2004 3:57PM Security
The stronger, the better

The stronger, the better

Elton Hay spotlights the problems associated with the challenge question approach to forgotten passwords
Elton Hay Jan 13 2004 3:52PM Security
Skills to tame the Tigers

Skills to tame the Tigers

Illena Armstrong reports on a project that is seeking to develop the infosecurity professionals of tomorrow
Illena Armstrong Jan 13 2004 3:50PM Security
Guarding the spoken word

Guarding the spoken word

Security for voice networks is as vital as for data systems says Tana Scouras, but many lack even the basics
Tana Scouras Jan 13 2004 3:48PM Security
The network detectives

The network detectives

Both forensics and ethical hacking, says Gunter Ollmann, are needed to investigate critical security events
Gunter Ollmann Jan 13 2004 3:44PM Security
A risky business: Insurance in cyberspace

A risky business: Insurance in cyberspace

Illena Armstrong looks at some of the forces driving demand for cyberliability insurance and what companies should be looking for
Illena Armstrong Jan 13 2004 3:32PM Security

Log In

  |  Forgot your password?