Features

Is Cyberterrorism a Serious Threat to Commercial Organizations?

Is Cyberterrorism a Serious Threat to Commercial Organizations?

This article appeared in a very abbreviated form in SC Magazine’s January 2003 issue and is presented here in full.
David Love Jan 12 2004 2:46PM Security
Communicating the Language of Information Security

Communicating the Language of Information Security

“When I use a word,” Humpty Dumpty said, in a rather scornful tone, “it means just what I choose it to mean - neither more nor less.” Lewis Carroll, Through the Looking Glass
Dan Houser Jan 12 2004 2:43PM Security
Securing Online Payments

Securing Online Payments

From the early days of the internet, credit and charge card companies recognized the enormous opportunities presented to them - but they also saw challenges ahead.
Richard Moulds Jan 12 2004 2:38PM Security
Crying Wolf on Cyberterrorism?

Crying Wolf on Cyberterrorism?

Terrorism (n): the systematic use of violence as a means to intimidate or coerce societies or governments.
Jon Tullett Jan 12 2004 2:35PM Security
Making Life Easier: Top 12 Things CSOs Need to Keep in Mind

Making Life Easier: Top 12 Things CSOs Need to Keep in Mind

1. Keep up with the latest technology -- the bad guys do!
Philip Conrod Jan 12 2004 2:26PM Security
Aligning IT Security with Business Needs

Aligning IT Security with Business Needs

In any technology decision, having the IT and business aspects of the organization on the same side is critical to identifying the best solutions and addressing key needs.
Linda Hughes Jan 12 2004 2:24PM Security
Microsoft and the Return of PKI

Microsoft and the Return of PKI

Many businesses have written off public key infrastructure (PKI) as a dead technology.
Robert Lonadier Jan 12 2004 2:21PM Security
The Good and the Bad for Selecting Security Measures

The Good and the Bad for Selecting Security Measures

The most important function IT security managers perform is the selection of IT security measures.
Robert V. Jan 12 2004 2:20PM Security
The Danger Inside Your Firewall

The Danger Inside Your Firewall

Who cares if British Gas customers can see each other’s invoice details?
Mark Altman Jan 12 2004 2:17PM Security
Unrealistic Pricing Degrades U.K. Business Security

Unrealistic Pricing Degrades U.K. Business Security

U.K. business security is under attack.
Matt Tomlinson Jan 12 2004 2:12PM Security
Automated Vulnerability Assessment: How to Underpin Your Security Investment

Automated Vulnerability Assessment: How to Underpin Your Security Investment

Many organizations are now relying upon the vital support that vulnerability assessment can offer as the fourth pillar of security.
Amer Deeba Jan 12 2004 2:10PM Security
Highly Evolved?

Highly Evolved?

The Organization for Economic Co-Operation and Development (OECD) notes in its 2002 guidelines for the security of information systems and networks that the technology environment has undergone dramatic change over the last decade.
Jack Clark Jan 12 2004 2:08PM Security
Waking Up to Reality: Security and Handheld Computing Devices

Waking Up to Reality: Security and Handheld Computing Devices

Handheld computing devices, like Palms and Pocket PCs, play an essential role in many people’s lives.
Dick Mackey Jan 12 2004 2:04PM Security
Securing a Complex Communications Environment: Ten Top Tips

Securing a Complex Communications Environment: Ten Top Tips

The growth of e-security products and services is creating an administrative headache for enterprises.
Staff Writers Jan 12 2004 2:00PM Security
Change Management: What If it All Goes Wrong?

Change Management: What If it All Goes Wrong?

The U.K.’s Swanwick Air Traffic Control center is an unfortunate example of the problems that can occur with the continuity of a business while undergoing a period of change.
Staff Writers Jan 12 2004 1:54PM Security
The Five Critical Stages of Policy Management

The Five Critical Stages of Policy Management

A series of recent bloody court battles, well-documented in the press, have highlighted the importance of clear policies governing the use of an organization’s information systems.
Nathan Millard Jan 12 2004 1:43PM Security
Future Challenges in Pervasive Computing Environments

Future Challenges in Pervasive Computing Environments

What is the pervasive computing paradigm?
Sadie Creese Jan 12 2004 1:37PM Security
Preventing Fraud Online: Digital Fingerprinting of PCs

Preventing Fraud Online: Digital Fingerprinting of PCs

Fraud is a serious problem in today’s online world.
Diana Kelley Jan 12 2004 1:33PM Security
Hints and Tips on Securing your Mobile Workforce

Hints and Tips on Securing your Mobile Workforce

So you have a mobile workforce, you have invested in laptops, PDAs, mobiles and smartphones and your staff are out there chasing and winning business.
Kurt Lennartsson Jan 12 2004 1:30PM Security
On the Offensive over Identity Theft

On the Offensive over Identity Theft

Catch Me If You Can isn’t just a hit at the movies this winter.
Jeff Drake Jan 12 2004 1:28PM Security

Log In

  |  Forgot your password?