Features

Nameless in Cyberspace: Protecting Online Privacy

Nameless in Cyberspace: Protecting Online Privacy

Generally, that well-practiced tango between anonymity and disclosure goes on smoothly in the real world.
Arvind Krishna Jan 12 2004 11:13AM Security
Identity Management Case Example

Identity Management Case Example

A large food and general merchandise wholesaler in the United States had a strategic vision based on strengthening its relationships with the market’s largest retailers, and increasing its vertical penetration through the acquisition of niche channel wholesalers.
Jim Burns Jan 12 2004 11:10AM Security
How to Buy Security

How to Buy Security

Reviewing a security strategy is a major undertaking that will test a wide range of skills far beyond IT competencies.
Iain Franklin Jan 12 2004 11:06AM Security
Managing the Security of Data Flow

Managing the Security of Data Flow

Customer relationship management (CRM) systems are cited as one of the major technology successes of the last decade.
Diane Seddon Jan 12 2004 11:04AM Security
Data-Secure Hard Drives?

Data-Secure Hard Drives?

All of a company’s technical assets will hold some amount of proprietary data, and it is a legal requirement that companies dispose of that data permanently before the asset is sold on from the company.
Kevin Riches Jan 12 2004 11:02AM Security
Web-Based Games: Playing to Lose

Web-Based Games: Playing to Lose

One common way of attracting visitors to a web site is to make it look attractive by incorporating animated graphics and interactive features written in Java, Flash and other common browser plug-in programs.
Steve Lord Jan 12 2004 10:47AM Security
The New Age of e-Commerce

The New Age of e-Commerce

Three billion dollars.
Bob Lonadier Jan 12 2004 10:43AM Security
Time to Own Up to Email Management

Time to Own Up to Email Management

Here’s a question: how many non-work related emails do you send and receive every day from your office email address?
Staff Writers Jan 12 2004 10:41AM Security
Protecting Wireless LAN Access with Smartcard SIMs

Protecting Wireless LAN Access with Smartcard SIMs

The wireless LAN market is a niche market set to gain greater momentum.
Jerome Nadel Jan 12 2004 10:39AM Security
Are Remote Users Your Security Blind Spot?

Are Remote Users Your Security Blind Spot?

More people than ever before are working from home - and it is no wonder.
Carole Theriault Jan 12 2004 10:32AM Security
Consolidation in the Security Solution Marketplace - How to be a Winner

Consolidation in the Security Solution Marketplace - How to be a Winner

Many industry experts say that the e-security market is heading towards consolidation, and that ultimately only a few dozen big vendors and niche players could remain worldwide.
Martin Gagen Jan 12 2004 10:30AM Security
Lock Up Your Data

Lock Up Your Data

With the growth in volume and sophistication of internal and external threats, information security is one of the most critical issues facing companies today.
Stu Vaeth Jan 12 2004 10:27AM Security
Touching a Raw Nerve: Medical Privacy Policy

Touching a Raw Nerve: Medical Privacy Policy

Not surprisingly, the Bush Administration’s recent ‘final ruling’ on medical information privacy did not satisfy everyone.
Elizabeth J. Jan 12 2004 10:26AM Security
Selecting the Right PKI - Know What to Ask For

Selecting the Right PKI - Know What to Ask For

When companies search for a public key infrastructure (PKI) solution, most develop and distribute a ‘request for proposal’ to evaluate and select a particular vendor and product.
Kevin LeBlanc Jan 12 2004 10:23AM Security
For Your Eyes Only: Securing Sensitive Data from Rogue Staff

For Your Eyes Only: Securing Sensitive Data from Rogue Staff

Defining what constitutes intellectual property can lead to differences of opinion.
Vanessa Chandrasekaran Jan 12 2004 10:21AM Security
Business Continuity: Planning for Many Levels

Business Continuity: Planning for Many Levels

For a business continuity plan to be truly effective at the time of interruption or disaster, everyone within the company needs to pull together to make the plan work and turn interruption into continuation.
Robin Gaddum Jan 12 2004 10:19AM Security
Certification, Education and Experience

Certification, Education and Experience

How well does certification demonstrate ability? As an information security instructor, I am often asked this question, particularly when it is raised in the media.
Lee Imrey Jan 12 2004 10:17AM Security
Business Continuity and Risk Management: Distant Cousins or Partners in Crime?

Business Continuity and Risk Management: Distant Cousins or Partners in Crime?

In a post 9/11 environment, the terms business continuity and risk management are becoming common parlance within a wide range organizations.
Dave Birch Jan 12 2004 10:13AM Security
Simple, Efficient Security Products are the Key to Successful Policy Enforcement

Simple, Efficient Security Products are the Key to Successful Policy Enforcement

Whether the problems lie with the end-user or at the board-level, with reticence or apathy, policy enforcement is one of the greatest challenges in securing the corporate network.
Jon Callas Jan 12 2004 10:11AM Security
Powerful Security Benefits for the Big Picture

Powerful Security Benefits for the Big Picture

Every day more and more critical services migrate to the network.
Tim Keanini Jan 12 2004 10:08AM Security

Log In

  |  Forgot your password?