Features

Security Policy Management: Email Risk Controls

Security Policy Management: Email Risk Controls

E-policy is a corporate statement and set of rules to protect the organization from casual or intentional abuse that could result in the release of sensitive information, IT system failures or litigation against the organization by employees or other parties.
Ann James Jan 12 2004 12:32PM Security
Are You Safe On the Web?

Are You Safe On the Web?

Proper use of the internet is becoming vital for corporations and public organizations.
Kevin Thiele Jan 12 2004 12:26PM Security
Security holds its value despite offshore trend

Security holds its value despite offshore trend

It's still worth having an infosec certification, according to US research.
Ron Condon Jan 12 2004 12:25PM Security
Meeting the Challenge of Identity Management: The Role of VPNs and Biometric Authentication

Meeting the Challenge of Identity Management: The Role of VPNs and Biometric Authentication

Organizations are increasingly being asked to provide staff with remote access to corporate systems.
Ken Douglas Jan 12 2004 12:25PM Security
Security Patches and Negative ROI Equal Corporate Stupidity

Security Patches and Negative ROI Equal Corporate Stupidity

ROI (return on investment) is a key concept in IT spending today.
Staff Writers Jan 12 2004 12:22PM Security
Jurassic Park, the Insurance Model and the Economic Return of Security

Jurassic Park, the Insurance Model and the Economic Return of Security

Remember Jurassic Park? In both the novel and the movie versions, the dinosaurs quickly adapted to their new surroundings, thwarting all attempts by the humans at controlling their evolutionary destiny.
Robert Lonadier Jan 12 2004 11:45AM Security
Electronic Identity: On the internet nobody knows you are a citizen

Electronic Identity: On the internet nobody knows you are a citizen

The emergence of the internet is a comparatively recent phenomenon.
Jack Nagle Jan 12 2004 11:43AM Security
Protecting Your Business in the Right Places - Securing Applications

Protecting Your Business in the Right Places - Securing Applications

Many companies are spending on corporate security in a fragmented and often directionless way, partly because of the bewildering complexity of security solutions.
Mike Lee Jan 12 2004 11:41AM Security
Technology is Not the Only Solution to Wireless Security?

Technology is Not the Only Solution to Wireless Security?

Despite the uncertainty regarding the best security practices for wireless networking, many organizations are interested in or are already deploying wireless LAN technology.
Dennis Seymour Jan 12 2004 11:39AM Security
Putting the ‘I’ Back in ID

Putting the ‘I’ Back in ID

Three years ago, a News of the World reporter posed as a freelance pilot, paid £150 for a British Airways uniform and used a fictitious company name and false date of birth to obtain a security pass.
Olivier Chavrier Jan 12 2004 11:34AM Security
Identity Theft

Identity Theft

As the information security market matures, and we rely more and more on traditional access-control based technology, organizations are becoming increasingly exposed to double risks.
Simon Foster Jan 12 2004 11:33AM Security
Business Leaders and IT Security – Will the Two Ever Have a Meeting of Minds?

Business Leaders and IT Security – Will the Two Ever Have a Meeting of Minds?

Those responsible for IT security are constantly complaining that they can’t get the budget they need, but are they going about it the wrong way?
Andre Armstrong Jan 12 2004 11:30AM Security
Decisive Decade

Decisive Decade

Everyone probably has their own 9/11 story.
Kerry Davies Jan 12 2004 11:29AM Security
The Role of the Corporate Information Security Steering Committee

The Role of the Corporate Information Security Steering Committee

Organizations are becoming increasingly aware that if they fail to implement successful security management processes, it could expose them to untenable risk.
Tom Scholtz Jan 12 2004 11:27AM Security
Trusted Digital Identities - Not Just For People Anymore

Trusted Digital Identities - Not Just For People Anymore

Authentication using digital identities has been a hot topic recently, and its importance does not appear to be waning.
David Hicks Jan 12 2004 11:24AM Security
Curbing Internet Content Piracy

Curbing Internet Content Piracy

Piracy on the high seas has been a flourishing business for many centuries.
Staff Writers Jan 12 2004 11:23AM Security
Cracking Down On Laptop Security

Cracking Down On Laptop Security

Mobile computing has revolutionized the working practices of workers in all sectors and industries.
Staff Writers Jan 12 2004 11:20AM Security
Combating Enterprise Vulnerability

Combating Enterprise Vulnerability

The technological revolution has occurred gradually and relatively quietly, meaning many top managers don’t realize how dependent their organizations have become on electronic information.
Jim Simmons Jan 12 2004 11:19AM Security
How to Ensure Complete Web Transaction Privacy - Even After Your Data is Stored

How to Ensure Complete Web Transaction Privacy - Even After Your Data is Stored

Most forward-looking companies today leverage the internet as their primary business communications tool linking employees, customers, partners, and suppliers.
Franklyn Jones Jan 12 2004 11:18AM Security
Times Get Tough

Times Get Tough

How often have you played the ‘scruples game’ amongst your friends, to question how much they would they rob a bank for - £5 million, £10 million, £25 million?
Magnus Ahlberg Jan 12 2004 11:16AM Security

Log In

  |  Forgot your password?