approach

Risk analysis is revisited with a fresh approach

Risk analysis is revisited with a fresh approach

Peter Stephenson Nov 12 2004 5:04PM Security
Virus writers approach zero day exploits

Virus writers approach zero day exploits

Four days was all virus writers needed to take advantage of the latest Internet Explorer vulnerability. Mydoom AG, which sends links to a website unwittingly hosted by an infected PC, has capitalised on a weakness only announced on Friday.
David Quainton Nov 9 2004 12:43PM Security
An orchestrated approach

An orchestrated approach

Concerto Software has acquired Rockwell First Point Contact, claiming the move will expand its global reach in the contact centre solution space.
Claire Doble Sep 16 2004 12:00AM Strategy
The holistic approach

The holistic approach

Rajesh Patel explains why devices, policies and people are all elements of optimal and total network security
Rajesh Patel Jul 15 2004 11:43AM Security
In search of a better approach to secure e-mail

In search of a better approach to secure e-mail

The volume of internet traffic generated by an ever-increasing number of applications, including e-mail, Instant Messaging (IM), web services, Voice over IP (VoIP), and other network transactions is growing unabated. Together with these applications has come an associated proliferation in the number of user identities within enterprises – e-mail addresses, IM handles, VoIP telephone numbers, all of which need to be managed. Concurrently, companies are under increasing scrutiny to adhere to government regulations and other compliance requirements to protect the privacy of customers, employees, and their personal data.
Dan Nadir Jun 15 2004 12:13PM Security
Managing Information Security in Modern Commercial Environments, Part 2 – A Pro-Active Approach

Managing Information Security in Modern Commercial Environments, Part 2 – A Pro-Active Approach

In the first article of this series, we identified and provided examples of the types of issues that need to be resolved if organisations are to correctly manage risk in the area of information security. If we combine the impact of these trends and issues with the fact that most enterprises are being forced to cut costs in order to remain competitive the true magnitude of the problem becomes apparent. Simply put, information security managers have to secure more complex environments, faster and using less resources.
Steve Purser May 24 2004 5:37PM Security
Taking a Realistic Approach to Remote Authentication

Taking a Realistic Approach to Remote Authentication

Just under a decade ago, I was asked to write a white paper on the future of telecommunications and networking for a major telecom company who shall remain nameless.
Steve Gold Jan 16 2004 9:53AM Security
A Practical and Realistic Approach for Testing the Performance of Firewalls: What Your Security Vendors Don't Want You to Know

A Practical and Realistic Approach for Testing the Performance of Firewalls: What Your Security Vendors Don't Want You to Know

While Internet security has always been important, only recently has it emerged as an important issue for almost all who use the Internet.
Johnson Wu, Jan 14 2004 3:01PM Security
A Balanced Approach to Performing a Security Assessment

A Balanced Approach to Performing a Security Assessment

Fundamentally, there exist just two basic approaches to performing security assessments: vulnerability priority and asset priority.
Adam Lipson Jan 9 2004 4:38PM Security
Taking a Proactive Approach to System Security Policy Compliance

Taking a Proactive Approach to System Security Policy Compliance

Information security is a reactive world.
Fred Pinkett Jan 9 2004 3:13PM Security
Security Training: An Holistic Approach

Security Training: An Holistic Approach

Security is a serious issue for every organization today.
Thomas Lee Jan 9 2004 2:24PM Security
SSL VPN Gateways: A New Approach to Secure Remote Access

SSL VPN Gateways: A New Approach to Secure Remote Access

Secure Sockets Layer (SSL) Virtual Private Networks (VPNs) are quickly gaining popularity as serious contenders in the remote-access marketplace.
Ken Araujo Jan 9 2004 2:12PM Security
Avaya direct approach miffs channel

Avaya direct approach miffs channel

Fleur Doidge Jan 1 2000 12:00AM Networking

Log In

  |  Forgot your password?