Features

Information Security: Regulation and Legislation

Information Security: Regulation and Legislation

It’s not so many years ago that organizations (misguidedly) held the view that security was the province of the IT department.
Alan Lycett Jan 12 2004 1:23PM Security
Memorized Passwords: The Gateway to Identity Theft

Memorized Passwords: The Gateway to Identity Theft

Identity theft is one of the fastest growing crimes worldwide.
Paul Ardoin Jan 12 2004 1:20PM Security
Who’s Reading Your Email?

Who’s Reading Your Email?

From its early beginnings to the present day, insecure emails have consistently caused trouble for their senders and recipients in a variety of ways.
Vanessa Chandrasekaran Jan 12 2004 1:18PM Security
SSL is the ‘Industry Standard’ - But Is ‘The Industry’ Good Enough?

SSL is the ‘Industry Standard’ - But Is ‘The Industry’ Good Enough?

SSL is the backbone of the way we secure connections between internet users and web servers.
Steve Mathews Jan 12 2004 1:15PM Security
The Economic Return of Security

The Economic Return of Security

Security, physical, cyber, and otherwise, is on everyone’s mind these days.
Robert Lonadier Jan 12 2004 1:06PM Security
White-hat Hacking 101

White-hat Hacking 101

These days I spend my time breaking into networks and web servers for a living.
Peter Wood Jan 12 2004 1:04PM Security
Legal Denial-of-Service Attacks

Legal Denial-of-Service Attacks

With the recent glut of snow in the mid-Atlantic and north-eastern region of the United States, I found myself in front of the computer screen for even longer periods of time than usual.
Ron Baklarz Jan 12 2004 1:03PM Security
Open Source Security: Better Protection at a Lower Cost

Open Source Security: Better Protection at a Lower Cost

At first glance, the idea of using open source software for a firewall or other security application seems counterintuitive, even absurd.
Steve Schlesinger Jan 12 2004 1:02PM Security
Managing Your Network’s Security

Managing Your Network’s Security

Network and data security is evolving.
Richard Lowe Jan 12 2004 1:00PM Security
Biomarvel, biohazard?

Biomarvel, biohazard?

There’s been a lot of discussion about biometrics.
Martin Sutherland Jan 12 2004 12:56PM Security
Security Qualifications - Are They Worth It?

Security Qualifications - Are They Worth It?

IT qualifications and security certifications are becoming more and more important to both individuals and companies alike, especially important in this current politically turbulent climate.
Robert Chapman Jan 12 2004 12:54PM Security
Reaction Remedies - The Way it Should Work: A CA Guide to Effective Network Security

Reaction Remedies - The Way it Should Work: A CA Guide to Effective Network Security

With the internet and mobile working playing an increasingly important roles in business, connecting to internal systems is becoming far easier.
Mike Small Jan 12 2004 12:51PM Security
Patch Management - The Foundation of IT Security

Patch Management - The Foundation of IT Security

The widespread impact of the SQL Slammer worm in January 2003 highlighted an issue that most security professionals see as a basic fact - IT system security is not based on a single installation, but on an ongoing management of risks and vulnerabilities.
Paul Collins Jan 12 2004 12:48PM Security
Has There Ever Been a Better Time to Talk Up Vulnerability Assessment?

Has There Ever Been a Better Time to Talk Up Vulnerability Assessment?

We often hear of prevention being better than cure.
Richard Walters Jan 12 2004 12:45PM Security
Protecting Your Privacy and Identity

Protecting Your Privacy and Identity

The ability to maintain a healthy balance between personal privacy and stringent enterprise security standards has been a sensitive and long-lasting struggle among security vendors and privacy advocate groups.
Oliver Tattan Jan 12 2004 12:43PM Security
Content Security - DIY or ISP?

Content Security - DIY or ISP?

As the market for content security products and services continues to grow, it is interesting to compare and contrast the delivery of content security via ‘insourcing’ and outsourcing.
Staff Writers Jan 12 2004 12:41PM Security
PKI is Dead - Long Live Certificates!

PKI is Dead - Long Live Certificates!

Trust has always been one of the key elements in any business relationship.
Guy Vancollie Jan 12 2004 12:39PM Security
Making Your Security Policy Work

Making Your Security Policy Work

This question was raised at a recent shareholders meeting: “Can the Board of Directors assure us that this organization’s information security program is deployed fairly and legally in every jurisdiction in which we operate?”
William J Jan 12 2004 12:38PM Security
Will Wireless Ever Be Secure?

Will Wireless Ever Be Secure?

If wireless were simply a matter of business expedience, and we ignored security concerns, it would be as ubiquitous today as laptops and cell phones – especially for the growing number of workers who depend on mobility to do their jobs and can’t afford to be tethered to a desk, office or single location.
Arvind Krishna Jan 12 2004 12:36PM Security
Intellectual Property - Stopping the Thief!

Intellectual Property - Stopping the Thief!

As I write this article I note that Infosecurity Europe is currently conducting an online survey, asking participants to consider if they would download their list of contacts or competitive information, to take with them when they leave their current employment.
Adrian Reid Jan 12 2004 12:35PM Security

Log In

  |  Forgot your password?