Features

Questions from the security zone: Are all VPNs created equal?

Questions from the security zone: Are all VPNs created equal?

Given today’s ever tighter IT budgets and emphasis on cost savings, many organizations are planning to replace their wide area network (WAN) connections, looking for a reliable and more cost effective alternative that doesn’t compromise security.
Staff Writers Jan 9 2004 3:06PM Security
Business continuity in the supply chain

Business continuity in the supply chain

Business continuity (BC) is now well recognised as a critical business requirement by most companies, even if they themselves do not adopt comprehensive BC plans.
Phil Carter Jan 9 2004 2:58PM Security
Trojans = Double Trouble

Trojans = Double Trouble

Trojan Horse applications (Trojans for short) are not new, having been around for over ten years now, but amazingly no-one has found a way to manage the threat.
Gunter Ollmann Jan 9 2004 2:55PM Security
Workplace Recovery - ensure your technical requirements are met

Workplace Recovery - ensure your technical requirements are met

The issues facing many firms considering subscribing to Workplace Recovery facilities go further than merely the location, number of seats available or subscription cost.
Andrew Waterston Jan 9 2004 2:50PM Security
Security as part of the strategic gameplan

Security as part of the strategic gameplan

A heightened awareness of security issues and the need to safeguard mission-critical, highly confidential data has catapulted security to the top of organisations’ agendas.
Jon Haynes Jan 9 2004 2:48PM Security
The Myth of Information Security ROI: Not Every Expense Is an "Investment"

The Myth of Information Security ROI: Not Every Expense Is an "Investment"

Information security teams are under increasing pressure to demonstrate financial return on investment (ROI) for security projects.
Tom Scholtz Jan 9 2004 2:46PM Security
Ebusiness Security

Ebusiness Security

Ebusiness security has never been bigger business and industry experts agree that the best growth is yet to come.
Jane Murphy Jan 9 2004 2:33PM Security
Shutting The Stable Door After The Horse Has Bolted?

Shutting The Stable Door After The Horse Has Bolted?

Business continuity is no longer just an issue for IT the department as regulators both in the US and Europe are getting tougher on operational risk.
Peter Hough Jan 9 2004 2:31PM Security
Freeing the Shackles with Secure Remote Working

Freeing the Shackles with Secure Remote Working

We all hanker for the opportunity to work less hours and avoid wasting time traveling to and from work.
Calum Macleod Jan 9 2004 2:28PM Security
Security Training: An Holistic Approach

Security Training: An Holistic Approach

Security is a serious issue for every organization today.
Thomas Lee Jan 9 2004 2:24PM Security
Security Awareness for Software Developers

Security Awareness for Software Developers

“An Ounce of Prevention” or “A Pound of Cure?”
Adam Lipson Jan 9 2004 2:19PM Security
Are You Indulging In Unprotected Wireless?

Are You Indulging In Unprotected Wireless?

Wireless PCs and wireless laptops are being increasingly used in both business and the home.
Staff Writers Jan 9 2004 2:16PM Security
SSL VPN Gateways: A New Approach to Secure Remote Access

SSL VPN Gateways: A New Approach to Secure Remote Access

Secure Sockets Layer (SSL) Virtual Private Networks (VPNs) are quickly gaining popularity as serious contenders in the remote-access marketplace.
Ken Araujo Jan 9 2004 2:12PM Security
The challenge of making enterprise management secure

The challenge of making enterprise management secure

There is a computer security mantra which says that the basic issues to manage are “ports, passwords and patches”.
John Alcock Jan 9 2004 2:00PM Security
Not me Guv!

Not me Guv!

In the wake of the Caffrey trial verdict in the UK I felt compelled to write an opinion piece on what this verdict and, in particular the style of defence, means for the information security community.
Richard Starnes Jan 9 2004 1:54PM Security
The Need for Secure Project Management

The Need for Secure Project Management

Secure project management is a concept that blends the needs of project management and security.
Dan Emory Jan 9 2004 1:52PM Security
A new generation of security solutions

A new generation of security solutions

Over the last few years, the nature of security solutions has been evolving to meet the growing and increasing nature of the IT security threat.
Staff Writers Jan 9 2004 1:49PM Security
The Different Faces of Policy Enforcement

The Different Faces of Policy Enforcement

The traditional “triple A’s” of access security, Authentication, Authorization, and Accounting, have been joined by a newcomer - Auditing. Like its predecessors, auditing is most effective when enforced, rather than being voluntary.
Stacey Lum Jan 9 2004 1:46PM Security
Bridging the Digital Divide in Security

Bridging the Digital Divide in Security

A technology gap exists in businesses today between the "haves"--deep-pocket enterprises--and the "have nots"--businesses on a budget.
Shane O’Donnell Jan 9 2004 1:44PM Security
Embracing Mobility: Three Steps to an Effective Mobile Security Policy

Embracing Mobility: Three Steps to an Effective Mobile Security Policy

Mobile technology has arrived.
Tom Goodman Jan 9 2004 1:42PM Security

Log In

  |  Forgot your password?