be

Debate» Security researchers should be paid for finding vulnerabilities in code

Debate» Security researchers should be paid for finding vulnerabilities in code

Kip McClanahan Aug 26 2005 3:41PM Security
Can the phishing war be won?

Can the phishing war be won?

"In the struggle for survival, the fittest win out at the expense of their rivals because they succeed in adapting themselves best to their environment." - Charles Darwin
Dr Jonathan Aug 15 2005 12:16PM Security
Debate» Traditional firewalls have outlived their usefulness and should be thrown on the scrapheap

Debate» Traditional firewalls have outlived their usefulness and should be thrown on the scrapheap

Jeff Alsford Jul 29 2005 2:46PM Security
Be aware! Spyware is everywhere

Be aware! Spyware is everywhere

Spyware now accounts for up to eight percent of outbound web traffic, according to a report.
David Quainton Jul 26 2005 4:40PM Security
Be careful who you trust

Be careful who you trust

Joined-up business is a huge boon to organizations. But, warns Nationwide’s privacy chief, your partners need to be just as gung ho about security as you are. Marcia Savage reports
Marcia Savage Jul 1 2005 11:53AM Security
At a pinch, rules will be broken

At a pinch, rules will be broken

Nick Barron Jun 21 2005 11:38AM Security
I would be secure if it weren't for those pesky laptops

I would be secure if it weren't for those pesky laptops

Laptops are the most difficult IT devices to keep secure, a survey has revealed.
David Quainton Jun 15 2005 12:32PM Security
Fessing up should be easier than this

Fessing up should be easier than this

Notification is key to compliance, but you need to know what has been lost, says Kevin Mandia
Kevin Mandia Jun 9 2005 2:39PM Security
Debate: Educating users is a waste of time – firms would be wiser to spend more on technology

Debate: Educating users is a waste of time – firms would be wiser to spend more on technology

Robert Schifreen May 13 2005 5:35PM Security
Failure must be a part of the plan

Failure must be a part of the plan

The trick is to acknowledge the danger and plan for the inevitable, as former White House advisor Richard Clarke tells Illena Armstrong
Illena Armstrong May 12 2005 5:26PM Security
Vulnerabilities to be ranked by NIAC group

Vulnerabilities to be ranked by NIAC group

Representatives from Microsoft, Qualys and Cisco are supporting plans for a National Infrastructure Advisory Council (NIAC) Common Vulnerability Scoring System (CVSS).
David Quainton Apr 29 2005 2:19PM Security
Changing facts of web crime must be faced

Changing facts of web crime must be faced

The internet's no longer dominated by script kiddies looking for bragging rights. So said experts at both the recent RSA Conference in California and the Cyber Security Summit in Florida. Today's attackers want money, not an underground following.
Illena Armstrong Mar 17 2005 3:12PM Security
The industry’s identity crisis must be solved

The industry’s identity crisis must be solved

There was definitely a penitent feel to the RSA Conference in San Francisco. Speakers such as Bill Gates, John Thompson of Symantec and Art Coviello of Computer Associates all tacitly admitted that the industry has failed to deliver what users need.
Ron Condon Mar 17 2005 3:08PM Security
Can the phishing war be won?

Can the phishing war be won?

Phishing is now an accepted fact of life for many Internet users. Most of the emails that they receive are clearly from friends or business contacts, or clearly fraudulent. But there are a few, just a few, that might just be genuine, and there will always be a small percentage of users who will follow the link sent them in the email, and connect to what they think is their bank, and give the phishers their reward.
Dr Jonathan Feb 21 2005 12:41PM Security
Web browsers battling it out to be number one

Web browsers battling it out to be number one

Nick Barron Jan 11 2005 12:22PM Security
Escape the fold: Stop being a sheep and be a dolphin

Escape the fold: Stop being a sheep and be a dolphin

Ron Condon speaks to a woman who trains IT professionals to win friends and influence people, right up to the boardroom
Ron Condon Jan 7 2005 5:28PM Security
The end of the affair - Lycos lets spammers be

The end of the affair - Lycos lets spammers be

Lycos has created so much love that it no longer needs to operate its vigilante website. “Make Love Not Spam” was laid to rest this weekend after a brief but eventful life attacking spamming websites.
David Quainton Dec 6 2004 11:01AM Security
If you fail to prepare, be prepared to fail

If you fail to prepare, be prepared to fail

Many companies are leaving themselves open to attack by failing to follow a few simple security principles. Roy Hills gives us some helpful hints on how to tighten your firewall security in order to protect your network
Roy Hills Nov 12 2004 5:21PM Security
Infosec momentum must not be lost

Infosec momentum must not be lost

The search has begun for the nation’s next infosec leader, and the successor has some big shoes to fill. Illena Armstrong reports
Illena Armstrong Nov 12 2004 5:11PM Security
ATMs might be at risk of another virus attack

ATMs might be at risk of another virus attack

Staff Writers Nov 12 2004 5:02PM Security

Log In

  |  Forgot your password?