and

Lessons of the Honeypot I: Aggressive and Careless

Lessons of the Honeypot I: Aggressive and Careless

The amazing book of Lance Spitzner "Know Your Enemy" seems to have opened the floodgates of honeypot deployment.
Anton Chuvakin Jan 16 2004 12:51PM Security
When Worlds Collide: Physical and Information Security

When Worlds Collide: Physical and Information Security

Information security and physical security are frequently viewed as either conflicting or as far removed from one another as the sun is from the moon.
Thresa Lang Jan 16 2004 11:34AM Security
Close the Door on Unwanted Guests: Keys to a Safe and Secure Wireless Network

Close the Door on Unwanted Guests: Keys to a Safe and Secure Wireless Network

As the benefits of a wireless local area network (WLAN) become more apparent, an increasing number of businesses are quick to adopt this technology.
Chris O’Ferrell Jan 16 2004 11:12AM Security
802.11b Security Needs Beefing Up - And Then Some

802.11b Security Needs Beefing Up - And Then Some

It wasn't until BT Mobility (www.groupbt.com), the recently-created public wireless LAN division of British Telecom, announced its plans earlier this year to open several thousand 802.11b public access hot spots across the U.K., that this writer truly considered the benefits of WLAN access on the go.
Steve Gold Jan 16 2004 10:28AM Security
Cookies and Web Bugs and Spyware, Oh My!

Cookies and Web Bugs and Spyware, Oh My!

A couple of years ago privacy advocates were bringing cookies, and the privacy issues related to them, to the attention of the general public.
Thresa Lang Jan 16 2004 10:26AM Security
Wake Up and Smell the Coffee

Wake Up and Smell the Coffee

Over the last several years a number of threats to information security have received more than their share of debate - starting with profiles on the distributed denial-of-service attacks of early 2000 and, alongside these stories, recurring news on a long list of high-profile web defacements.
Andrew Christensen Jan 16 2004 10:25AM Security
(ISC)²’s Common Body of Knowledge and the HIPAA Security and Privacy Rules

(ISC)²’s Common Body of Knowledge and the HIPAA Security and Privacy Rules

It is no surprise that the security rules of the U.S. 1996 Health Portability and Accountability Act (HIPAA) appear closely modeled after existing generally accepted information security best practices.
Micki Krause Jan 16 2004 10:13AM Security
Chasing Infosec Budgets and the Loch Ness Monster

Chasing Infosec Budgets and the Loch Ness Monster

Trying to get an accurate, unbiased reading of today’s Internet security arena is like trying to get a non-fuzzy, close-up and genuine photograph of the Loch Ness Monster.
Illena Armstrong Jan 16 2004 10:07AM Security
Fire and Brimstone in 21st Century Security

Fire and Brimstone in 21st Century Security

It is increasingly disturbing to me that individuals of a certain prominence use their vexing ability to understand complex computations to scare the living heck out of the rest of us humble folks.
Melisa LaBancz-Bleasdale Jan 15 2004 3:07PM Security
Interpol Tracks Information and Communication Technology Crime

Interpol Tracks Information and Communication Technology Crime

“IT crime constitutes an ‘enormous’ threat to our society!”
Interpol European Jan 15 2004 2:42PM Security
PINs, Signatures and Countering Fraud

PINs, Signatures and Countering Fraud

Trotting through the shiny new airport terminal in Brussels recently, I was surprised to be asked to verify my credit card purchases in the duty-free shop with a PIN instead of a signature.
Steve Gold Jan 15 2004 2:25PM Security
Protecting Documents and Data Shouldn’t Stop at the Server

Protecting Documents and Data Shouldn’t Stop at the Server

There are two types of companies.
Bob Brennan Jan 15 2004 1:38PM Security
There’s no escaping the dentist and cyber planning

There’s no escaping the dentist and cyber planning

Infosecurity is kind of like visiting the dentist: we all know we have to do it, but we seem to put it off for as long as humanly possible.
Illena Armstrong Jan 15 2004 1:36PM Security
The Accomplice, Protector and Informer

The Accomplice, Protector and Informer

When you think of computer crime, you immediately think of Internet fraud, hacking, viruses or other external threats to an organization.
Martin. W. Jan 15 2004 12:26PM Security
New Technology and Security Déjà Vu

New Technology and Security Déjà Vu

Last May, USA Today reported on the Jacobs family getting implanted with computer chips containing their medical record information.
Ben Rothke Jan 15 2004 11:58AM Security
Of Votes and Cyberspace

Of Votes and Cyberspace

With the mid-term elections come and gone, it’s time for the Bush Administration to re-focus its attention on protecting cyberspace.
Bob Lonadier Jan 15 2004 11:41AM Security
Securing and Managing Electronic Messaging in the Enterprise

Securing and Managing Electronic Messaging in the Enterprise

The threats and problems posed by email in large and complex organizations are of a different type and scale of magnitude from the email problems that such organizations first solved with an email ‘point product’ some years previously.
Staff Writers Jan 15 2004 10:53AM Security
Security and Web Services

Security and Web Services

What is in essence a framework for designing, developing and building a new generation of applications around web standards and protocols, web services promises to make it far easier to integrate applications across disparate hardware and software platforms - a constant gripe with existing technology. Backed by all of the major IT vendors (Microsoft, IBM, Sun, Oracle, etc.), web services certainly will not suffer from a lack of effort or exposure, but will it take off and what are the issues?
Peter Doyle Jan 14 2004 5:02PM Security
The Best Free (and Cheap) Security Software Part 1: Hashes and Encryption

The Best Free (and Cheap) Security Software Part 1: Hashes and Encryption

This is the first article in a series that will look at some of the best free (and cheap) security software.
Ric Steinberger Jan 14 2004 4:38PM Security
Do Firewalls and IDS Create a False Sense of Internal Security?

Do Firewalls and IDS Create a False Sense of Internal Security?

In an effort to boost sales and generate revenue, one U.S. multinational energy company recently embraced the Internet to bolster external communication and internal collaboration.
Abishek Chauhan Jan 14 2004 4:36PM Security

Log In

  |  Forgot your password?