Features

Cyberwarriors Doing Battle with Themselves

Cyberwarriors Doing Battle with Themselves

All too often, we shoot ourselves in the foot as information security professionals by the language we use with executives.
Dan Houser Jan 9 2004 4:10PM Security
Placing Strategic Security on the Front Burner

Placing Strategic Security on the Front Burner

Given a choice between spending money on enterprise resource planning (ERP) or information security, organizations typically choose the former.
Adam Lipson Jan 9 2004 4:09PM Security
The Art of War: Part 3

The Art of War: Part 3

"If you know the enemy and know yourself, you need not fear the result of a hundred battles." Sun Tzu, The Art of War
Darren Thomas Jan 9 2004 4:02PM Security
Intrusion Prevention and Detection: Are They Just Missing the Point?

Intrusion Prevention and Detection: Are They Just Missing the Point?

Organizations know they must protect themselves from the mysterious enemy that is a ‘hacker’ and viruses such as LoveLetter, but often there is a misguided belief that these external threats are the main risks to businesses.
Jean-Charles Barbou Jan 9 2004 3:59PM Security
Expert vs. Expertise: Computer Forensics and the Alternative OS

Expert vs. Expertise: Computer Forensics and the Alternative OS

No longer a dark and mysterious process, computer forensics has been significantly on the scene for more than five years now.
Melisa LaBancz-Bleasdale Jan 9 2004 3:56PM Security
The Art of War: Part 4

The Art of War: Part 4

"Success in warfare is gained by carefully accommodating ourselves to the enemy's purpose. If the enemy shows an inclination to advance, lure him on to do so; if he is anxious to retreat, delay on purpose that he may carry out his intentions." Sun Tzu, The Art of War
Darren Thomas Jan 9 2004 3:55PM Security
Changing the Game

Changing the Game

The internet age has heralded unprecedented opportunities.
Geoff Haggart Jan 9 2004 3:51PM Security
The Art of War: Part 5

The Art of War: Part 5

"Though the enemy be stronger in numbers, we may prevent him from fighting. Scheme so as to discover his plans and the likelihood of their success. Rouse him, and learn the principle of his activity or inactivity. Force him to reveal himself, so as to find out his vulnerable spots." Sun Tzu, The Art of War
Darren Thomas Jan 9 2004 3:50PM Security
Is Patch Management a Failing Strategy?

Is Patch Management a Failing Strategy?

If recent headlines about the Blaster worm sounded familiar, it was with good reason. Earlier this year, another worm was wreaking havoc on the internet, targeting a well-known Microsoft vulnerability.
Phil Hollows Jan 9 2004 3:46PM Security
The Art of War: Part 6

The Art of War: Part 6

"Though the enemy be stronger in numbers, we may prevent him from fighting. Scheme so as to discover his plans and the likelihood of their success. Rouse him, and learn the principle of his activity or inactivity. Force him to reveal himself, so as to find out his vulnerable spots." Sun Tzu, The Art of War
Darren Thomas Jan 9 2004 3:37PM Security
The lunatics have taken over the asylum

The lunatics have taken over the asylum

The truth is, the lunatics were always in charge. Despite the internet being one of the biggest revolutions in business and personal communications since the telegraph, it is the technologists who still formulate how we use it.
Nick Scales Jan 9 2004 3:34PM Security
Securing your business - a never ending story

Securing your business - a never ending story

Despite remaining a core issue for IT managers, a recent study by the United Kingdom’s Department of Trade and Industry indicates that as many as 78 percent of the U.K. companies surveyed have experienced at least one malicious security incident, with 44 percent experiencing them within the last year (2002/2001).
Matt Newman Jan 9 2004 3:32PM Security
The Myth of ROI: Not every expense is an investment

The Myth of ROI: Not every expense is an investment

Information security teams are under increasing pressure to demonstrate financial return on investment (ROI) for security projects.
Tom Scholtz Jan 9 2004 3:30PM Security
The growth of eBusiness Security

The growth of eBusiness Security

Ebusiness security has never been bigger business and industry experts agree that the best growth is yet to come.
Jane Murphy Jan 9 2004 3:27PM Security
The future’s bright, the future is SSL VPNs

The future’s bright, the future is SSL VPNs

SSL VPNs are quickly gaining popularity as serious contenders in the remote-access marketplace.
Calum Macleod Jan 9 2004 3:26PM Security
Freeing the Shackles with Secure Remote Working

Freeing the Shackles with Secure Remote Working

We all hanker for the opportunity to work fewer hours and avoid wasting time traveling to and from work.
Calum Macleod Jan 9 2004 3:25PM Security
The Art of War: Part 7

The Art of War: Part 7

Last month, we looked at just how easy it is for a hacker to gain entrance to an unprotected network.
Darren Thomas Jan 9 2004 3:22PM Security
Are your Web servers haemorrhaging cash?

Are your Web servers haemorrhaging cash?

Hackers manage to successfully break into systems much more often than you might realise.
Yuval Ben-Itzhak Jan 9 2004 3:19PM Security
Digital Evidence Accreditation Has Arrived

Digital Evidence Accreditation Has Arrived

I read with great interest Mr. Stephenson’s article “Advancing to a mature state of digital forensics’ in the September issue of SC Magazine.
John J. Jan 9 2004 3:17PM Security
Taking a Proactive Approach to System Security Policy Compliance

Taking a Proactive Approach to System Security Policy Compliance

Information security is a reactive world.
Fred Pinkett Jan 9 2004 3:13PM Security

Log In

  |  Forgot your password?