do

SNMP Apathy - How Much Time Do We Have?

SNMP Apathy - How Much Time Do We Have?

Following on the heels of applying the patch Fred Rica style (see www.infosecnews.com/opinion/2002/04/17_04.htm), the SNMP vulnerability has loomed into view as the next procrastinating administrator’s nightmare.
Melisa LaBancz-Bleasdale Jan 16 2004 2:09PM Security
Do It Yourself Security: Cutting Our Umbilical Dependence on the Consultant Community

Do It Yourself Security: Cutting Our Umbilical Dependence on the Consultant Community

A long while ago I had a business card identity that branded me as a Security Export Consultant.
Melisa LaBancz-Bleasdale Jan 15 2004 1:26PM Security
Do Firewalls and IDS Create a False Sense of Internal Security?

Do Firewalls and IDS Create a False Sense of Internal Security?

In an effort to boost sales and generate revenue, one U.S. multinational energy company recently embraced the Internet to bolster external communication and internal collaboration.
Abishek Chauhan Jan 14 2004 4:36PM Security
How do you stop the threat from within?

How do you stop the threat from within?

The biggest threat to security is not from outside, it is from the company employee. Julie Jervis asked security experts throughout the U.S. how they are educating these end-users
Julie Jervis Jan 13 2004 5:15PM Security
Blackout blues ...and what you can do to avoid them

Blackout blues ...and what you can do to avoid them

The recent power outage was a powerful reminder of the value of business continuity provisions. Ron Mobed reports.
Ron Mobed Jan 13 2004 4:58PM Security
The masters of disguise: Do you know who your users are?

The masters of disguise: Do you know who your users are?

Illena Armstrong looks at the complex and challenging task of managing identities over today’s distributed company systems.
Illena Armstrong Jan 13 2004 3:57PM Security
Do you feel the force? Malware can pull you apart

Do you feel the force? Malware can pull you apart

Gerhard Eschelbeck discovers that as malware becomes more sophisticated, your defenses must improve to prevent damage.
Gerhard Eschelbeck Jan 12 2004 5:06PM Security
Why Can’t Our Guys Do This?

Why Can’t Our Guys Do This?

When computer forensics is an essential component of an internal investigation, lack of familiarity with the legal and technical issues involved can prompt management to assign that component to its management information security staff.
Stevens R. Jan 9 2004 4:46PM Security
Thanks, we’ll do that now: Captaris

Thanks, we’ll do that now: Captaris

Document management software vendor Captaris has bought the distribution arm of business partner Axient for an undisclosed sum, citing dissatisfaction with that company’s performance in the channel.
Fleur Doidge Oct 28 2003 12:00AM Software
Forrester: users do not trust Microsoft

Forrester: users do not trust Microsoft

Paul Thurrott Jan 1 2000 12:00AM Software

Log In

  |  Forgot your password?