Features

Will Wireless Ever Be Secure?

Will Wireless Ever Be Secure?

If wireless were simply a matter of business expedience, and we ignored security concerns, it would be as ubiquitous today as laptops and cell phones – especially for the growing number of workers who depend on mobility to do their jobs and can’t afford to be tethered to a desk, office or single location.
Arvind Krishna Jan 12 2004 12:36PM Security
Intellectual Property - Stopping the Thief!

Intellectual Property - Stopping the Thief!

As I write this article I note that Infosecurity Europe is currently conducting an online survey, asking participants to consider if they would download their list of contacts or competitive information, to take with them when they leave their current employment.
Adrian Reid Jan 12 2004 12:35PM Security
Security Policy Management: Email Risk Controls

Security Policy Management: Email Risk Controls

E-policy is a corporate statement and set of rules to protect the organization from casual or intentional abuse that could result in the release of sensitive information, IT system failures or litigation against the organization by employees or other parties.
Ann James Jan 12 2004 12:32PM Security
Are You Safe On the Web?

Are You Safe On the Web?

Proper use of the internet is becoming vital for corporations and public organizations.
Kevin Thiele Jan 12 2004 12:26PM Security
Security holds its value despite offshore trend

Security holds its value despite offshore trend

It's still worth having an infosec certification, according to US research.
Ron Condon Jan 12 2004 12:25PM Security
Meeting the Challenge of Identity Management: The Role of VPNs and Biometric Authentication

Meeting the Challenge of Identity Management: The Role of VPNs and Biometric Authentication

Organizations are increasingly being asked to provide staff with remote access to corporate systems.
Ken Douglas Jan 12 2004 12:25PM Security
Security Patches and Negative ROI Equal Corporate Stupidity

Security Patches and Negative ROI Equal Corporate Stupidity

ROI (return on investment) is a key concept in IT spending today.
Staff Writers Jan 12 2004 12:22PM Security
Jurassic Park, the Insurance Model and the Economic Return of Security

Jurassic Park, the Insurance Model and the Economic Return of Security

Remember Jurassic Park? In both the novel and the movie versions, the dinosaurs quickly adapted to their new surroundings, thwarting all attempts by the humans at controlling their evolutionary destiny.
Robert Lonadier Jan 12 2004 11:45AM Security
Electronic Identity: On the internet nobody knows you are a citizen

Electronic Identity: On the internet nobody knows you are a citizen

The emergence of the internet is a comparatively recent phenomenon.
Jack Nagle Jan 12 2004 11:43AM Security
Protecting Your Business in the Right Places - Securing Applications

Protecting Your Business in the Right Places - Securing Applications

Many companies are spending on corporate security in a fragmented and often directionless way, partly because of the bewildering complexity of security solutions.
Mike Lee Jan 12 2004 11:41AM Security
Technology is Not the Only Solution to Wireless Security?

Technology is Not the Only Solution to Wireless Security?

Despite the uncertainty regarding the best security practices for wireless networking, many organizations are interested in or are already deploying wireless LAN technology.
Dennis Seymour Jan 12 2004 11:39AM Security
Putting the ‘I’ Back in ID

Putting the ‘I’ Back in ID

Three years ago, a News of the World reporter posed as a freelance pilot, paid £150 for a British Airways uniform and used a fictitious company name and false date of birth to obtain a security pass.
Olivier Chavrier Jan 12 2004 11:34AM Security
Identity Theft

Identity Theft

As the information security market matures, and we rely more and more on traditional access-control based technology, organizations are becoming increasingly exposed to double risks.
Simon Foster Jan 12 2004 11:33AM Security
Business Leaders and IT Security – Will the Two Ever Have a Meeting of Minds?

Business Leaders and IT Security – Will the Two Ever Have a Meeting of Minds?

Those responsible for IT security are constantly complaining that they can’t get the budget they need, but are they going about it the wrong way?
Andre Armstrong Jan 12 2004 11:30AM Security
Decisive Decade

Decisive Decade

Everyone probably has their own 9/11 story.
Kerry Davies Jan 12 2004 11:29AM Security
The Role of the Corporate Information Security Steering Committee

The Role of the Corporate Information Security Steering Committee

Organizations are becoming increasingly aware that if they fail to implement successful security management processes, it could expose them to untenable risk.
Tom Scholtz Jan 12 2004 11:27AM Security
Trusted Digital Identities - Not Just For People Anymore

Trusted Digital Identities - Not Just For People Anymore

Authentication using digital identities has been a hot topic recently, and its importance does not appear to be waning.
David Hicks Jan 12 2004 11:24AM Security
Curbing Internet Content Piracy

Curbing Internet Content Piracy

Piracy on the high seas has been a flourishing business for many centuries.
Staff Writers Jan 12 2004 11:23AM Security
Cracking Down On Laptop Security

Cracking Down On Laptop Security

Mobile computing has revolutionized the working practices of workers in all sectors and industries.
Staff Writers Jan 12 2004 11:20AM Security
Combating Enterprise Vulnerability

Combating Enterprise Vulnerability

The technological revolution has occurred gradually and relatively quietly, meaning many top managers don’t realize how dependent their organizations have become on electronic information.
Jim Simmons Jan 12 2004 11:19AM Security

Log In

  |  Forgot your password?