Features

All For One and One For All

All For One and One For All

In the classic tale of French chivalry, The Three Musketeers, the intrepid heroes more often than not find themselves in predicaments that one of them-in a drunken stupor-has precipitated.
Throop Wilder Jan 9 2004 1:38PM Security
Applying The Art of Forensics to Network Security

Applying The Art of Forensics to Network Security

Knowing when to call in a professional can be the most important decision an organization can make when it comes to security breaches – you can’t take chances if there’s a known breach or overwhelming evidence that one has occurred.
A. Bryan Jan 9 2004 1:33PM Security
“Cradle-to-Grave”: Career Path Support Needed for Information Security Professionals

“Cradle-to-Grave”: Career Path Support Needed for Information Security Professionals

Over the past few years, Information Security has emerged as a separate and distinct profession from traditional systems and physical security career fields.
Dow A. Jan 9 2004 1:30PM Security
Human + documents = security threat

Human + documents = security threat

Picture this - you are the CIO at Fort Knox plc (a large financial services organization) and you reckon you’ve got this security thing sussed.
Mark Wheeler Jan 9 2004 1:29PM Security
Making protection pay - The business benefits of IT security

Making protection pay - The business benefits of IT security

Traditionally many organisations were of the opinion that security breaches were something that only affected ‘other’ companies and would never happen to them.
Jackie Groves Jan 9 2004 1:09PM Security
Email Encryption in the Financial Sector

Email Encryption in the Financial Sector

Historically, encryption technology has been seen as too cumbersome, complicated and expensive for organisation to invest in, with too little return.
Staff Writers Jan 9 2004 1:06PM Security
Biometric security: more bottom-line benefits, less James Bond

Biometric security: more bottom-line benefits, less James Bond

Bond movies will always be associated with state-of-the-art technology, but few of the products he uses or encounters ever make it into the real world.
Carl Gohringer Jan 9 2004 1:04PM Security
“When spammers attack!”

“When spammers attack!”

In the summer of 2003 a new email virus hit the front pages of the newspapers worldwide.
Mark Sunner Jan 9 2004 12:58PM Security
The Person-to-Person Problem

The Person-to-Person Problem

With the growth of Instant Messaging and peer-to-peer (P2P) technologies, businesses are increasingly facing security and management challenges.
Glyn Baker Jan 9 2004 12:54PM Security
Giving a "worm" welcome: the financial sector's move to open source security products

Giving a "worm" welcome: the financial sector's move to open source security products

In January 2003, "Bank of America" was the most prominent victim of the aggressive "Slammer" computer virus that Richard Clarke, the former top adviser to President George W. Bush on cybersecurity, simply called "a dumb worm".
Jan Hichert Jan 9 2004 12:49PM Security
Managing Passwords Without Compromising Security

Managing Passwords Without Compromising Security

Picture the scene: The 5,000 strong workforce of a multinational company are returning to work after a long and very enjoyable Christmas break and they're thinking about easing themselves back into the routine of work once more.
David Kavanagh Jan 9 2004 12:47PM Security
Phishers target Bank of England

Phishers target Bank of England

The Bank of England has been targeted by scammers seeking to con users into executing Trojan software.
Jon Tullett Jan 9 2004 12:40PM Security
Crackers, Hackers and Thieves - don’t make their Christmas - leave your Handhelds at home!

Crackers, Hackers and Thieves - don’t make their Christmas - leave your Handhelds at home!

Leave your laptop or personal handheld at home when you join the Christmas rush and revelry, or risk losing your mobile device and all the information which resides on it.
Magnus Ahlberg Jan 9 2004 12:39PM Security
The rise of the malicious spammer

The rise of the malicious spammer

One of the most noteworthy IT security developments of 2003 is the convergence between spamming and viral techniques, leading to a much more dangerous threat for email users.
Mark Sunner Jan 9 2004 12:35PM Security
Review: Datafort

Review: Datafort

Ever since the first days of the PC two decades ago, storage systems have crashed, resulting in the potential for lost data or, if you're lucky, a large bill for the recovery of your data. Major companies, of course, have turned to a variety of backup mechanisms, including tape-based systems, to ensure their data is backed up reliably, but, apart from backing up to CD-ROM, small to medium-sized businesses have been limited in terms of cost-effective backup.

Steve Gold Jan 9 2004 12:00AM Security
BindView adds patching to its products

BindView adds patching to its products

BindView reaches OEM agreement with Shavlik Technologies over patching
Rene Millman Jan 6 2004 1:26PM Security
Main Line choose RSA for securing patient records

Main Line choose RSA for securing patient records

One of the largest healthcare providers in South-eastern Pennsylvania has rolled out new measures to increase the security of patient records.
Rene Millman Jan 6 2004 1:22PM Security
Tory leader in hot water over spam

Tory leader in hot water over spam

The leader of the UK's Conservative party could be in trouble with the law after urging party member to forward his email to ten "neighbours, friends and other contacts".
Rene Millman Jan 6 2004 10:28AM Security
Sun sets on Cobalt

Sun sets on Cobalt

Sun is quietly discontinuing its Cobalt series of appliance products despite analyst predictions of strong growth in the appliance market in general, and the security appliance market in particular.
Jon Tullett Jan 5 2004 4:33PM Security
Review: GateDefender 7100

Review: GateDefender 7100

For some time now, the problem for security professionals has not been "do I need AV protection" but more specifically "which one is best for my corporate needs." But with so many other danger areas for security administrators to concentrate on, leading to the provision of intrusion detection systems, intrusion prevention systems, firewalls and virtual private networks, to name but a few, it is crucial to make the right decision when they have a large array of other security solutions already running.
Providing all you need for network screening and stability can be a tall order, so whichever anti-virus solution is relied upon - software- or hardware-based, or a mix of both - it has to be dependable, be able to fully integrate with everything else running on the network, and provide 100 per cent system integrity.

Jayne Parkhouse Jan 1 2004 12:00AM Security

Log In

  |  Forgot your password?