and

A Practical and Realistic Approach for Testing the Performance of Firewalls: What Your Security Vendors Don't Want You to Know

A Practical and Realistic Approach for Testing the Performance of Firewalls: What Your Security Vendors Don't Want You to Know

While Internet security has always been important, only recently has it emerged as an important issue for almost all who use the Internet.
Johnson Wu, Jan 14 2004 3:01PM Security
Digital Signatures: What Can Businesses and Consumers Expect?

Digital Signatures: What Can Businesses and Consumers Expect?

Laws giving digital signatures legal legitimacy have been enacted around the world.
Rett Summerville Jan 14 2004 2:47PM Security
Evaluating the Security Risk Between Business-to-Business and Business-to-Consumer

Evaluating the Security Risk Between Business-to-Business and Business-to-Consumer

Today's security measures are not keeping up with today's security risks.
John Bernardi Jan 14 2004 1:39PM Security
Designing and Deploying Effective Defenses Against Denial-of-Service Attacks

Designing and Deploying Effective Defenses Against Denial-of-Service Attacks

Vince Liu Jan 14 2004 1:32PM Security
Signature-Based or Anomaly-Based Intrusion Detection: The Practice and Pitfalls

Signature-Based or Anomaly-Based Intrusion Detection: The Practice and Pitfalls

Intrusion detection has become big business on the Internet and, to be honest, it's not surprising.
Arnt Brox Jan 14 2004 1:23PM Security
Blackout blues ...and what you can do to avoid them

Blackout blues ...and what you can do to avoid them

The recent power outage was a powerful reminder of the value of business continuity provisions. Ron Mobed reports.
Ron Mobed Jan 13 2004 4:58PM Security
Faster and more secure

Faster and more secure

SSL’s potential weaknesses can be overcome says David Hicks, creating flexibility for today’s online needs.
David Hicks Jan 13 2004 4:07PM Security
Talk time: Instant messaging and the enterprise

Talk time: Instant messaging and the enterprise

Instant messaging can bring both great business benefit and far greater risks to your network systems, says John Korsak
John Korsak Jan 13 2004 2:32PM Security
Protect the road warrior ...and deter the black hats

Protect the road warrior ...and deter the black hats

Security has become paramount on mobile devices as more employees work away from the office. Ron Condon investigates.
Ron Condon Jan 13 2004 11:01AM Security
Keeping out the intruders: Detecting and preventing

Keeping out the intruders: Detecting and preventing

What is the future for intrusion detection and intrusion prevention systems? Illena Armstrong examines the conflicting claims.
Illena Armstrong Jan 13 2004 10:52AM Security
Defenses for the ‘click and hack’ age

Defenses for the ‘click and hack’ age

Malicious attacks are evolving and, as Robert Clyde discovers, defenses to these attacks should evolve too
Robert Clyde Jan 12 2004 5:08PM Security
Security-Spending Winners and Losers for 2003

Security-Spending Winners and Losers for 2003

What do the impending war in Iraq, the Venezuelan oil strike, the threats by North Korea to “go nuclear,” and the Bush Administration economic proposal all have in common?
Robert Lonadier Jan 12 2004 3:40PM Security
Database security: protecting sensitive and critical information

Database security: protecting sensitive and critical information

Bankers would be considered negligent if they locked a bank’s outer doors and left the vault’s doors open at night.
Scott C. Jan 12 2004 3:03PM Security
Integration: The Only Way to Manage and Grow a Saturated E-security Industry

Integration: The Only Way to Manage and Grow a Saturated E-security Industry

It was recently reported that the worldwide market for IT security and business continuity products and services is growing twice as fast as overall IT industry. By 2006, this market is expected to surpass $150 billion (IDC, 2002).
Russ Cummings Jan 12 2004 2:55PM Security
Microsoft and the Return of PKI

Microsoft and the Return of PKI

Many businesses have written off public key infrastructure (PKI) as a dead technology.
Robert Lonadier Jan 12 2004 2:21PM Security
The Good and the Bad for Selecting Security Measures

The Good and the Bad for Selecting Security Measures

The most important function IT security managers perform is the selection of IT security measures.
Robert V. Jan 12 2004 2:20PM Security
Waking Up to Reality: Security and Handheld Computing Devices

Waking Up to Reality: Security and Handheld Computing Devices

Handheld computing devices, like Palms and Pocket PCs, play an essential role in many people’s lives.
Dick Mackey Jan 12 2004 2:04PM Security
Hints and Tips on Securing your Mobile Workforce

Hints and Tips on Securing your Mobile Workforce

So you have a mobile workforce, you have invested in laptops, PDAs, mobiles and smartphones and your staff are out there chasing and winning business.
Kurt Lennartsson Jan 12 2004 1:30PM Security
Information Security: Regulation and Legislation

Information Security: Regulation and Legislation

It’s not so many years ago that organizations (misguidedly) held the view that security was the province of the IT department.
Alan Lycett Jan 12 2004 1:23PM Security
Protecting Your Privacy and Identity

Protecting Your Privacy and Identity

The ability to maintain a healthy balance between personal privacy and stringent enterprise security standards has been a sensitive and long-lasting struggle among security vendors and privacy advocate groups.
Oliver Tattan Jan 12 2004 12:43PM Security

Log In

  |  Forgot your password?