Features

Tackling the Growing Problem of Online Identity Theft

Tackling the Growing Problem of Online Identity Theft

Catch Me If You Can isn’t just a fun film that hit the jackpot this spring.
Peter Jopling Jan 12 2004 10:05AM Security
Mobile insecurities

Mobile insecurities

Every day, millions of dollars worth of proprietary enterprise data escapes the safe confines of corporate data centers and walks right out the front doors of the company.
Chris Burchett Jan 12 2004 10:03AM Security
Coping with security risks from all angles

Coping with security risks from all angles

Because of our increased reliance on IT, the effects of downtime, security breaches or deliberate attacks on a company’s IT system can cause serious, sometimes irreparable, damage.
Keith Tilley Jan 12 2004 9:58AM Security
Call center security

Call center security

As a former police officer, it was driven into me during my formative years as an investigator that every facet of every case had to be prepared with the utmost diligence.
Neal Ysart Jan 12 2004 9:55AM Security
Security policies - the constantly moving goalposts

Security policies - the constantly moving goalposts

Far from being the ‘nice to have’ it was once thought to be, IT security has finally reached the level where it is viewed as an essential consideration for businesses today.
Jackie Groves Jan 12 2004 9:50AM Security
Evaluating the return on security investment (ROSI): Where’s the problem?

Evaluating the return on security investment (ROSI): Where’s the problem?

I have read so many articles that have tried to advise the industry on ways to analyze an organizations return on security investment (ROSI), with the majority championing the difficulties associated with it and sadly concluding that in fact there is no effective way.
Jane Frankland Jan 9 2004 5:00PM Security
Biometrics that turn cons into pros

Biometrics that turn cons into pros

Anytime a new product is coined as ‘high-tech’, it also bears the weight of being ‘high-maintenance’.
Brooke Brown Jan 9 2004 4:58PM Security
Building the pillars of success for a security career

Building the pillars of success for a security career

There is a clear need today for experienced information systems security professionals, and increasing numbers of IT professionals are rushing into to fill the gap.
Jack Krichen Jan 9 2004 4:55PM Security
Evaluating the return on security investment: Where’s the problem?

Evaluating the return on security investment: Where’s the problem?

I’ve read so many articles that have tried to advise the industry on ways to analyze an organization’s return on security investment (ROSI).
Jane Frankland Jan 9 2004 4:51PM Security
Control System Security in the Age of Cyberterrorism

Control System Security in the Age of Cyberterrorism

Power producers and utilities today face an unprecedented quantity of constraints upon their business operations.
Brian M. Jan 9 2004 4:49PM Security
Why Can’t Our Guys Do This?

Why Can’t Our Guys Do This?

When computer forensics is an essential component of an internal investigation, lack of familiarity with the legal and technical issues involved can prompt management to assign that component to its management information security staff.
Stevens R. Jan 9 2004 4:46PM Security
Privacy Falls Through the Web

Privacy Falls Through the Web

You wouldn’t walk around the King of Prussia Mall with your social security number tattooed on your forehead.
Lou D’Ambrosio Jan 9 2004 4:42PM Security
Out-of-Band Management for Windows Server 2003

Out-of-Band Management for Windows Server 2003

Many networked devices, such as UNIX servers, routers and switches, are accessible through local serial console ports, for initial configuration and emergency management.
Burk Murray Jan 9 2004 4:40PM Security
A Balanced Approach to Performing a Security Assessment

A Balanced Approach to Performing a Security Assessment

Fundamentally, there exist just two basic approaches to performing security assessments: vulnerability priority and asset priority.
Adam Lipson Jan 9 2004 4:38PM Security
Solving the Security Concerns of Flexible Working

Solving the Security Concerns of Flexible Working

IT security is the main barrier to the adoption of flexible working practices, according to a recent survey commissioned by Microsoft.
Bob Stream Jan 9 2004 4:33PM Security
Thinking Outside the Box About Operating System Security

Thinking Outside the Box About Operating System Security

Today’s operating systems are more sophisticated and feature-rich than ever before, which makes them substantially more useful to the enterprise, but also adds to security vulnerability - unless the operating systems are configured, administered and monitored correctly.
Arvind Krishna Jan 9 2004 4:30PM Security
The Art of War: Part 1

The Art of War: Part 1

"The art of war teaches us to rely not on the likelihood of the enemy’s not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable." Sun Tzu, The Art of War
Darren Thomas Jan 9 2004 4:25PM Security
Wardialing - The Forgotten Front in the War against Hackers

Wardialing - The Forgotten Front in the War against Hackers

Hackers have thousands of different ways to access or exploit computing environments.
Jonathan Gossels, Jan 9 2004 4:21PM Security
Security Devices Don’t Always Save Companies from Hackers

Security Devices Don’t Always Save Companies from Hackers

On May 29, 2003, the Computer Security Institute (CSI) and the FBI published the results of their most recent Computer Crime and Security Survey, now in its eighth year.
Staff Writers Jan 9 2004 4:16PM Security
The Art of War: Part 2

The Art of War: Part 2

"If you know the enemy and know yourself, you need not fear the result of a hundred battles." Sun Tzu, The Art of War
Darren Thomas Jan 9 2004 4:13PM Security

Log In

  |  Forgot your password?