Features

The network detectives

The network detectives

Both forensics and ethical hacking, says Gunter Ollmann, are needed to investigate critical security events
Gunter Ollmann Jan 13 2004 3:44PM Security
A risky business: Insurance in cyberspace

A risky business: Insurance in cyberspace

Illena Armstrong looks at some of the forces driving demand for cyberliability insurance and what companies should be looking for
Illena Armstrong Jan 13 2004 3:32PM Security
Infosec accountability

Infosec accountability

Compliance with the Sarbanes-Oxley Act is forcing companies to impose stricter policies, says Chris Mullins
Chris Mullins Jan 13 2004 3:27PM Security
C-level sponsors: Factoring in the business bottom line

C-level sponsors: Factoring in the business bottom line

Unless C-level executives are thoroughly involved in security matters your business strategy will suffer, says James L. Bindseil
James L. Jan 13 2004 3:25PM Security
Policy that lives: Enforcing security in spite of the users

Policy that lives: Enforcing security in spite of the users

Creating a security policy may be hard, says Illena Armstrong, but making sure that users comply is always the biggest problem
Illena Armstrong Jan 13 2004 3:22PM Security
Sinking in a sea of spam

Sinking in a sea of spam

Tired of email porn and body enhancement offers? John Young suggests using secure content management to halt the tidal wave.
John Young Jan 13 2004 3:19PM Security
Spyware: Invading user privacy

Spyware: Invading user privacy

Applications that wait to steal your personal information are legion, so Carlos Valiente recommends constant vigilence
Carlos Valiente Jan 13 2004 3:15PM Security
Putting the pieces in place

Putting the pieces in place

Even the best of security policies will be ineffectual without proper implementation, says Gunter Ollmann
Gunter Ollmann Jan 13 2004 3:11PM Security
Rethinking PKI

Rethinking PKI

Early public key infrastructure projects failed because they were too complex. But Stephen Wilson argues that PKI is ideal for managing closed communities.
Staff Writers Jan 13 2004 2:56PM Security
Owning up to cyberattack

Owning up to cyberattack

A new law in California means you need comprehensive incident and forensics planning says John Patzakis.
John Patzakis Jan 13 2004 2:51PM Security
Tracking down cybercriminals

Tracking down cybercriminals

Tari Schreider describes a real-life investigation into a scam that threatened to undermine a large organization.
Tari Schreider Jan 13 2004 2:49PM Security
Laptop lockdown: Tracking down the thief

Laptop lockdown: Tracking down the thief

Recovering your laptop after it has been stolen is not as quite imposible as it might seem, as Louise Murray finds out
Louise Murray Jan 13 2004 2:44PM Security
Reducing the stream of false positives

Reducing the stream of false positives

Ray Zadjmool explores a solution to the number of false positives specifically created by the use of Windows Media Player
Ray Zadjmool Jan 13 2004 2:40PM Security
The language of the market

The language of the market

Customers and partners need access to your systems. Roger Sullivan says XML can provide the security to make it happen.
Roger Sullivan Jan 13 2004 2:36PM Security
Talk time: Instant messaging and the enterprise

Talk time: Instant messaging and the enterprise

Instant messaging can bring both great business benefit and far greater risks to your network systems, says John Korsak
John Korsak Jan 13 2004 2:32PM Security
Consultant's view: Testing with open eyes

Consultant's view: Testing with open eyes

You can wander round in the dark says Gunter Ollmann, but full knowledge penetration tests are much better
Gunter Ollmann Jan 13 2004 2:30PM Security
Timing security practices for web application success

Timing security practices for web application success

Last year, says Caleb Sima, many organizations began using web application security assessment tools and discovered that many vulnerabilities could not be corrected because they resulted from insecure application development practices.
Caleb Sima Jan 13 2004 2:28PM Security
Blocking attacks on applications

Blocking attacks on applications

Web services may be critical for business but leave you wide open to attack. Abhishek Chauhan looks at protection techniques
Abhishek Chauhan Jan 13 2004 2:25PM Security
Issues for SAN security

Issues for SAN security

SANs have some inbuilt security says Stewart Buchanan, but this does not mean you should relax your guard
Stewart Buchanan Jan 13 2004 2:21PM Security
Guarding the keep: Storage security

Guarding the keep: Storage security

Vital business information should be carefully stored but, Jon Tullett asks, can you be sure it really is locked away safely?
Jon Tullett Jan 13 2004 2:18PM Security

Log In

  |  Forgot your password?