Features

HIPAA: Now comes the security Challenge

HIPAA: Now comes the security Challenge

As the HIPAA privacy compliance deadline passes, Jon Bogen highlights the top action points for the new security rules
Jon Bogen Jan 13 2004 1:51PM Security
Consultant’s view: It’s only a workstation

Consultant’s view: It’s only a workstation

The humble desktop is often the weakest point in workplace security, as Gunter Ollmann regularly discovers
Gunter Ollmann Jan 13 2004 1:42PM Security
Web services: Useful but dangerous?

Web services: Useful but dangerous?

Web services promise to change the way we build applications but, as Daniel Murton argues, security poses a huge challenge.
Daniel Murton Jan 13 2004 1:27PM Security
Free to roam Tackling WLAN security

Free to roam Tackling WLAN security

When employees of the city of Tallahassee asked for wireless access, finding a secure solution seemed almost impossible, says Curtis Franklin
Curtis Franklin Jan 13 2004 1:23PM Security
Tips for WLAN security

Tips for WLAN security

Don’t overlook the importance of sound policy in your efforts to achieve effective security, says Bob Whelan
Bob Whelan Jan 13 2004 1:20PM Security
Locking down the airwaves

Locking down the airwaves

Defending your wireless LAN may seem an impossible task, says Dave Piscitello, but you can do it more easily than you may think
Dave Piscitello Jan 13 2004 1:16PM Security
Consultant's View: Oh …that security patch

Consultant's View: Oh …that security patch

They are the bane of administrators’ lives, but Gunter Ollmann contends that patching should be a priority.
Gunter Ollmann Jan 13 2004 1:13PM Security
On your marks: Get set for the next IT hurdle

On your marks: Get set for the next IT hurdle

Memories of Y2K may have faded, but, says Steve Gold, another challenge could be just around the corner.
Steve Gold Jan 13 2004 1:03PM Security
Who runs your security?

Who runs your security?

David Foote asks if businesses have got the right idea when it comes to protecting their valuable IT assets
David Foote Jan 13 2004 1:00PM Security
Evolving a role in infosecurity

Evolving a role in infosecurity

People have different perceptions of a chief security officer role, but Illena Armstrong finds that it is a vital one for business today.
Illena Armstrong Jan 13 2004 12:57PM Security
Trusting the big boys

Trusting the big boys

Illena Armstrong asks if the big IT vendors can re-engineer themselves for security in light of today’s pressing business needs
Illena Armstrong Jan 13 2004 12:52PM Security
Danger money: The challenge of risk management

Danger money: The challenge of risk management

There is always a trade-off between security needs and economics. Richard Starnes asks how businesses can strike the right balance.
Richard Starnes Jan 13 2004 12:46PM Security
Analysts forecast a boost for budgets

Analysts forecast a boost for budgets

How is the economy affecting infosec spending? Illena Armstrong discovers 2003 could see more funds allocated to security.
Illena Armstrong Jan 13 2004 12:38PM Security
Vulnerability Testing: Keeping a tight ship

Vulnerability Testing: Keeping a tight ship

Knowing where your network is vulnerable is half the battle. Illena Armstrong looks at the need for penetration test assessments
Illena Armstrong Jan 13 2004 12:28PM Security
Consultant's View: I’m OK, I have a firewall

Consultant's View: I’m OK, I have a firewall

Firewalls are not the be-all and end-all of security, says Gunter Ollmann, and they must be managed properly
Gunter Ollmann Jan 13 2004 12:24PM Security
New tools for the job ahead

New tools for the job ahead

What are the technologies to secure IT in 2003? Illena Armstrong asks security experts for their views
Illena Armstrong Jan 13 2004 12:19PM Security
Hunting out the rogues

Hunting out the rogues

Some security themes keep re-occurring. Gunter Ollmann warns against one of the most common problems
Gunter Ollmann Jan 13 2004 12:14PM Security
Hackers: Are you inviting them in?

Hackers: Are you inviting them in?

Surely by now, organizations should have erected the strongest barriers to hackers. But, as Illena Armstrong and others point out, many holes remain
Illena Armstrong Jan 13 2004 11:55AM Security
Witches’ brew of concerns

Witches’ brew of concerns

The next 12 months could be a crunch time for infosecurity. So Illena Armstrong asked some experts how the cookie might crumble
Illena Armstrong Jan 13 2004 11:52AM Security
Time to act: New challenges in 2004

Time to act: New challenges in 2004

Tighter regulation and higher levels of cyber attacks will increase the role of the CSO in 2004. Marcia Savage reports
Marcia Savage Jan 13 2004 11:44AM Security

Log In

  |  Forgot your password?