Features

Shackled by the rules? Unlock the opportunities

Shackled by the rules? Unlock the opportunities

Increasingly, organizations have to comply with privacy legislation. Stuart Vaeth asks whether this is the key to improved security.
Stuart Vaeth Jan 13 2004 9:45AM Security
Unmasking the authors

Unmasking the authors

Education should play an important part in preventing the next generation of virus writers, says Chris Belthoff.
Chris Belthoff Jan 12 2004 5:10PM Security
Defenses for the ‘click and hack’ age

Defenses for the ‘click and hack’ age

Malicious attacks are evolving and, as Robert Clyde discovers, defenses to these attacks should evolve too
Robert Clyde Jan 12 2004 5:08PM Security
Do you feel the force? Malware can pull you apart

Do you feel the force? Malware can pull you apart

Gerhard Eschelbeck discovers that as malware becomes more sophisticated, your defenses must improve to prevent damage.
Gerhard Eschelbeck Jan 12 2004 5:06PM Security
Putting Information Security into Focus

Putting Information Security into Focus

In the past several months, it has become painfully clear that C-level executives are getting tired of buying information security for its own purposes.
Dan Taylor Jan 12 2004 3:54PM Security
Security? I’ve Got It

Security? I’ve Got It

Even after all the warnings and high profile security breaches we have seen in the last couple of years, it is astonishing to see how many companies are still not adequately assessing the risk associated with doing business within today’s IT infrastructure.
Tony Anscombe Jan 12 2004 3:52PM Security
A Healthy Dose of Security Skepticism

A Healthy Dose of Security Skepticism

No security system is perfect. Never believe that you have solved your security problems or eliminated a specific security threat.
Landon Curt Jan 12 2004 3:48PM Security
An Industry Built on Sand?

An Industry Built on Sand?

Forensic information is of paramount importance to the security professional.
Iain Franklin Jan 12 2004 3:45PM Security
Snapshots For Security

Snapshots For Security

It’s a fact - security risks are increasing.
Ian Tickle Jan 12 2004 3:42PM Security
Security-Spending Winners and Losers for 2003

Security-Spending Winners and Losers for 2003

What do the impending war in Iraq, the Venezuelan oil strike, the threats by North Korea to “go nuclear,” and the Bush Administration economic proposal all have in common?
Robert Lonadier Jan 12 2004 3:40PM Security
Biometrics - Problem or Solution?

Biometrics - Problem or Solution?

Biometrics is a security approach that offers great promise, but also presents users and implementers with a number of practical problems.
Steve Mathews Jan 12 2004 3:32PM Security
New Blends of Email Threats

New Blends of Email Threats

Email-borne threats continue to evolve and have started to combine in new and dangerous ways.
Pete Simpson Jan 12 2004 3:25PM Security
Business Impact Analysis: the Starting Block for Business Continuity

Business Impact Analysis: the Starting Block for Business Continuity

What is a business impact analysis (BIA)?
Phil Carter Jan 12 2004 3:07PM Security
Handheld Computing Power: A Two-Edged Sword

Handheld Computing Power: A Two-Edged Sword

It’s two a.m. Do you know where your corporate data is?
Joan Herbig Jan 12 2004 3:06PM Security
Database security: protecting sensitive and critical information

Database security: protecting sensitive and critical information

Bankers would be considered negligent if they locked a bank’s outer doors and left the vault’s doors open at night.
Scott C. Jan 12 2004 3:03PM Security
Evidence Preservation vs. Business Continuity: An Ongoing Electronic Struggle

Evidence Preservation vs. Business Continuity: An Ongoing Electronic Struggle

On a sunny Tuesday afternoon, a call comes into the help desk notifying a technician that a strange and inflammatory web page is presented whenever someone goes to the corporation’s public web site.
Stephen Scharf Jan 12 2004 3:01PM Security
The Need for Quality Security Policy Enforcers

The Need for Quality Security Policy Enforcers

The need for qualified network and systems security administrators is on the increase.
Anthony T. Jan 12 2004 2:59PM Security
Integration: The Only Way to Manage and Grow a Saturated E-security Industry

Integration: The Only Way to Manage and Grow a Saturated E-security Industry

It was recently reported that the worldwide market for IT security and business continuity products and services is growing twice as fast as overall IT industry. By 2006, this market is expected to surpass $150 billion (IDC, 2002).
Russ Cummings Jan 12 2004 2:55PM Security
Safe E-commerce?

Safe E-commerce?

E-commerce has always striven to be one of the driving forces behind internet use.
Fernando de Jan 12 2004 2:53PM Security
Breaking the Security Logjam

Breaking the Security Logjam

Log files are an important security resource containing a wealth of information.
Mark Searle Jan 12 2004 2:51PM Security

Log In

  |  Forgot your password?