are

The terrorists are coming... In ten years!

The terrorists are coming... In ten years!

A panel of technology experts is warning that the fabled electronic pearl harbor will occur within the next ten years.
David Quainton Jan 17 2005 5:23PM Security
Spammers are a pain and so is not backing up

Spammers are a pain and so is not backing up

Robert Schifreen Jan 11 2005 12:29PM Security
Are you sitting next to a criminal?

Are you sitting next to a criminal?

Computer criminals could be working next to you every day, yet be stealing from your business.
Kathleen O'Connor Jan 11 2005 12:10PM Security
The seven sins of copier security are revealed…

The seven sins of copier security are revealed…

Wayne Foster Dec 18 2004 9:41PM Security
So are these first signs of an IT user fightback?

So are these first signs of an IT user fightback?

Jon Tullett Dec 7 2004 10:36AM Security
The zombies are ready to attack your networks

The zombies are ready to attack your networks

Nick Barron Dec 6 2004 4:34PM Security
Gates: Security concerns are hampering technology adoption

Gates: Security concerns are hampering technology adoption

Security fears are actively hampering the adoption of new technologies in businesses, Bill Gates said in his opening keynote at the Microsoft IT Forum '04 in Copenhagen, Denmark.
Jon Tullett Nov 16 2004 3:44PM Security
IPsec and SSL VPNs are able to co-exist

IPsec and SSL VPNs are able to co-exist

The combined weight of many marketing machines is trying to persuade us that SSL VPNs will soon replace the old methods of encrypting data, but Mike Smart believes there is still an argument for traditional IPsec VPNs
Mike Smart Nov 12 2004 5:20PM Security
These laws are not the answer

These laws are not the answer

Jennifer Granick is not one to beat around the bush. She believes that as technology progresses, the laws that protect us should progress with it – and, so far, they have not. She tells Marcia Savage what needs to be done
Marcia Savage Nov 12 2004 5:15PM Security
Remote users are a challenge

Remote users are a challenge

Staff Writers Nov 12 2004 5:06PM Security
Email: Are we all too reliant on our new best friend?

Email: Are we all too reliant on our new best friend?

Robert Schifreen Nov 12 2004 4:55PM Security
Privacy laws will work when they are enforced

Privacy laws will work when they are enforced

Illena Armstrong Nov 12 2004 4:53PM Security
We are all doomed – if you believe the hype

We are all doomed – if you believe the hype

Jon Tullett Oct 15 2004 4:24PM Security
Balancing security products with management time: are you stretching yourself too thin?

Balancing security products with management time: are you stretching yourself too thin?

With new threats emerging by the second, enterprise security has become paramount. IT managers, however, are faced with the daunting task of coordinating numerous elements from VPNs and e-mail scanning systems to content filters and anti-virus software.
John Edwards Oct 6 2004 3:36PM Security
Balancing security products with management time. Are you stretching yourself too thin?

Balancing security products with management time. Are you stretching yourself too thin?

With new threats emerging by the second, enterprise security has become paramount. IT managers, however, are faced with the daunting task of coordinating numerous elements from VPNs and e-mail scanning systems to content filters and anti-virus software.
John Edwards Aug 31 2004 5:21PM Security
Why strong walls are not enough

Why strong walls are not enough

The crucial job of guarding your enterprise’s network used to boil down to keeping the bad guys out. But as Marcia Savage explains, with wireless, web and remote access, protecting the perimeter is just the start of it
Marcia Savage Aug 5 2004 2:26PM Security
Smartphones are great tools, but at what risk?

Smartphones are great tools, but at what risk?

Hands up if you own a smartphone and feel secure. If so, maybe you haven’t been following the upward trends in Bluetooth vulnerabilities, Symbian worms and ordinary theft.
Jon Tullett Jul 8 2004 4:15PM Security
Spam and patents are issues to resolve now

Spam and patents are issues to resolve now

This month we are tackling the issue of junk mail and spam. While unsolicited advertising is annoying, it has become the CSO’s problem as HR departments face off with users who receive offensive messages, business services grind to a halt, and outright scams grow in number.
Jon Tullett Jun 23 2004 3:08PM Security
Why are people ignoring the danger posed by blended threats?

Why are people ignoring the danger posed by blended threats?

Cisco’s recent announcement that it will incorporate Trend Micro virus and worm technologies with its intrusion-detection system software used on its routers and switches, is excellent news for anyone concerned with IT security. With the rise of more sophisticated attacks – blended threats - a more proactive approach to security is not just necessary, but vital. This is an approach we've been taking for two years now, so it’s always pleasing to see Cisco validating our market by adopting it in such a way.
Bruce Hendrix Jun 21 2004 4:40PM Security
Why pink and fluffy are the new watchwords

Why pink and fluffy are the new watchwords

When the speaker at the front of the room announced that security was really about “pink, fluffy stuff,” I started looking for the exit. And I am sure I was not the only one.
Ron Condon Apr 13 2004 4:27PM Security

Log In

  |  Forgot your password?