can

Organized cyber criminals can 'bring down firms at will'

Organized cyber criminals can 'bring down firms at will'

Executives and corporate boards need to be vigilant about the threats posed by a global organized crime industry that has the capacity to "bring down firms at will," according to IT security industry insiders.
William Eazel Nov 15 2005 10:46AM Security
San Fran man faces can after laptop raid

San Fran man faces can after laptop raid

A San Franciscan has been arrested after selling a laptop containing personal information of nearly 100,000 Berkeley University students.
David Quainton Sep 16 2005 3:33PM Security
Welsh students can turn graduate hackers

Welsh students can turn graduate hackers

The world’s first postgraduate certificate in penetration testing and information security has been set up by a Welsh university.
David Quainton Aug 19 2005 2:30PM Security
Can the phishing war be won?

Can the phishing war be won?

"In the struggle for survival, the fittest win out at the expense of their rivals because they succeed in adapting themselves best to their environment." - Charles Darwin
Dr Jonathan Aug 15 2005 12:16PM Security
Can we Trust our Workforce?

Can we Trust our Workforce?

Traditionally, one of the most important assets of any successful company is its workforce. Competitive edge comes from employing hard-working, law-abiding motivated individuals with a strong company loyalty. Even for the odd employee, with a grudge against the company, the combination of laws and contracts in the past acted as sufficient deterrent to any wrong-doing.
Petri Säkkinen Aug 10 2005 10:09AM Security
Can you keep a secret?

Can you keep a secret?

With increasingly extended and dynamic enterprises, the distinction between insiders and outsiders is becoming blurred and what organizations can expect to control is less clear.
Paul Galwas Jul 25 2005 10:58AM Security
Debate: Everyone knows Linux is the safest OS, and there’s no way that Windows can compete

Debate: Everyone knows Linux is the safest OS, and there’s no way that Windows can compete

Any time one compares Linux and Windows security one risks unleashing a cataract of opinion.
Richard Ford Apr 19 2005 12:42PM Security
$25k Mac virus comp opens can of worms

$25k Mac virus comp opens can of worms

Following yesterday’s news that a competition to infect two G5 PowerMac computers running Mac OS X with a virus had been shelved, the Mac community has reacted angrily to what it sees as a publicity stunt.
David Quainton Mar 30 2005 11:22AM Security
Can we trust our workforce?

Can we trust our workforce?

Traditionally, one of the most important assets of any successful company is its workforce. Competitive edge comes from employing hard-working, law-abiding motivated individuals with a strong company loyalty. Even for the odd employee, with a grudge against the company, the combination of laws and contracts in the past acted as sufficient deterrent to any wrong-doing.
Petri Säkkinen Feb 23 2005 4:55PM Security
New spam spin: Can-spam can can spim too

New spam spin: Can-spam can can spim too

A New Yorker has been arrested and charged with sending spam over instant messaging platforms (known as spim).
David Quainton Feb 23 2005 12:03PM Security
CMA needs teeth so that it can bite email fraudsters

CMA needs teeth so that it can bite email fraudsters

As we well know, the provenance of an email message can't be trusted. Sadly, the general internet-hooked public had only been made aware of this recently, as a result of two developments.
Robert Schifreen Feb 22 2005 5:00PM Security
Can the phishing war be won?

Can the phishing war be won?

Phishing is now an accepted fact of life for many Internet users. Most of the emails that they receive are clearly from friends or business contacts, or clearly fraudulent. But there are a few, just a few, that might just be genuine, and there will always be a small percentage of users who will follow the link sent them in the email, and connect to what they think is their bank, and give the phishers their reward.
Dr Jonathan Feb 21 2005 12:41PM Security
Complexity can damage your system defences

Complexity can damage your system defences

Staff Writers Jan 14 2005 5:07PM Security
Your passwords can either break you or save you

Your passwords can either break you or save you

Calum Macleod Jan 11 2005 11:10AM Security
Can-Spam can't can AOL spammer

Can-Spam can't can AOL spammer

The saga of the 24 year old West Virginian AOL staffer who stole over 30 million email addresses has taken another exciting twist.
David Quainton Dec 22 2004 11:51AM Security
Can you trust poachers who turn gamekeeper?

Can you trust poachers who turn gamekeeper?

David Quainton reports on two firms that are taking the risk of having a virus writer on their staff
David Quainton Dec 3 2004 4:28PM Security
Make endpoint security do what it claims it can do

Make endpoint security do what it claims it can do

Staff Writers Nov 12 2004 5:03PM Security
What can software asset management do for me?

What can software asset management do for me?

‘It is an irony of modern business that directors pay more attention to the control of assets such as company cars than they do to the management of business critical investments such as IT.’ So says George Cox, director of the IOD. An irony that deepens further still when you realize that many organizations spend more each year on software than they do on their vehicle fleets.
Matt Fisher Sep 29 2004 11:18AM Security
Open source. Love it or hate it, but can you trust it?

Open source. Love it or hate it, but can you trust it?

Open source software (OSS) is firmly entrenched in the infrastructure of the Internet, and is now making inroads into the security market too. But although the darling of techies everywhere, OSS has its doubters. In particular, many corporate managers have concerns about support, accountability, and longevity.
Jon Tullett Jul 28 2004 11:15AM Security
Can MSSPs help you stay legal?

Can MSSPs help you stay legal?

As organizations adapt to compliance requirements, John Sterlicchi explores the value of having a managed security service provider
John May 13 2004 9:21AM Security

Log In

  |  Forgot your password?