for

Self Help for the Invincible

Self Help for the Invincible

I was listening to a lively debate the other day on the radio.
Adam Holder Jan 16 2004 9:54AM Security
ROI Strategies for Reducing Risk

ROI Strategies for Reducing Risk

The current state of application security practice is grim.
Bob Ayers Jan 15 2004 3:04PM Security
Planning for a disaster is half the work - Can you recover?

Planning for a disaster is half the work - Can you recover?

Increasingly, companies are implementing business continuity plans to ensure the constant availability and support of the company infrastructure and business processes.
Phil Carter Jan 15 2004 1:43PM Security
Battle for the Cards: Signatures versus PINs

Battle for the Cards: Signatures versus PINs

Regular readers of SC's Opinionwire will recall me wibbling on about how credit and debit card issuers are moving steadily towards PIN-based authorization of transactions.
Steve Gold Jan 15 2004 1:16PM Security
Incentives for Avoiding a Cyber Pearl Harbor

Incentives for Avoiding a Cyber Pearl Harbor

The Internet Law and Public Policy Forum held a conference in Seattle this fall.
Ed Hearst Jan 15 2004 11:55AM Security
3Com includes security for switches

3Com includes security for switches

Networking firm 3Com is putting security into its switches.
Dan Ilett Jan 15 2004 11:36AM Security
Trusted Information Awareness - Another Name for Domestic Spying?

Trusted Information Awareness - Another Name for Domestic Spying?

Co-incident with the news about the formation of the U.S. Department of Homeland Defense is the breaking of a story about a Defense Advanced Research Projects Agency (DARPA) ‘research project’ exploring the viability of sifting through huge amounts of transaction data looking for possible terrorist activities.
Bob Lonadier Jan 15 2004 10:57AM Security
For Your Eyes Only - Maximizing Security in a Closed Environment

For Your Eyes Only - Maximizing Security in a Closed Environment

Fingerprint, retinal or even voice identification have traditionally existed only in James Bond-style blockbuster movies.
Jackie Groves Jan 15 2004 10:48AM Security
Security Issues for Remote IT Delivery

Security Issues for Remote IT Delivery

Colin Wells, chairman of JBS Computer Services, examines what SMEs should look for from suppliers when choosing the remote route for software delivery
Colin Wells Jan 15 2004 10:17AM Security
Scalable Encryption Solutions for Today’s Environment

Scalable Encryption Solutions for Today’s Environment

The scope and character of today’s computing environment is changing dramatically.
David Cullinane Jan 14 2004 3:56PM Security
What to Look for in a Web Application Protection System

What to Look for in a Web Application Protection System

The number of technology pundits decrying the state of Internet security has reached an unbearable level.
Abishek Chauhan Jan 14 2004 3:44PM Security
Perimeter Defense Model for Security

Perimeter Defense Model for Security

There has to be a better way!
Adam Lipson Jan 14 2004 3:38PM Security
A Practical and Realistic Approach for Testing the Performance of Firewalls: What Your Security Vendors Don't Want You to Know

A Practical and Realistic Approach for Testing the Performance of Firewalls: What Your Security Vendors Don't Want You to Know

While Internet security has always been important, only recently has it emerged as an important issue for almost all who use the Internet.
Johnson Wu, Jan 14 2004 3:01PM Security
Buffer Overflow Vulnerabilities, a Challenge for Everyone

Buffer Overflow Vulnerabilities, a Challenge for Everyone

In May 1998, Panda Software published a press release in which I made my first public statement.
Carlos Ardanza Jan 14 2004 2:54PM Security
Online security training for employees

Online security training for employees

A US company has launched an online IT security-training programme.
Dan Ilett Jan 13 2004 2:34PM Security
Timing security practices for web application success

Timing security practices for web application success

Last year, says Caleb Sima, many organizations began using web application security assessment tools and discovered that many vulnerabilities could not be corrected because they resulted from insecure application development practices.
Caleb Sima Jan 13 2004 2:28PM Security
Issues for SAN security

Issues for SAN security

SANs have some inbuilt security says Stewart Buchanan, but this does not mean you should relax your guard
Stewart Buchanan Jan 13 2004 2:21PM Security
Tips for WLAN security

Tips for WLAN security

Don’t overlook the importance of sound policy in your efforts to achieve effective security, says Bob Whelan
Bob Whelan Jan 13 2004 1:20PM Security
On your marks: Get set for the next IT hurdle

On your marks: Get set for the next IT hurdle

Memories of Y2K may have faded, but, says Steve Gold, another challenge could be just around the corner.
Steve Gold Jan 13 2004 1:03PM Security
Analysts forecast a boost for budgets

Analysts forecast a boost for budgets

How is the economy affecting infosec spending? Illena Armstrong discovers 2003 could see more funds allocated to security.
Illena Armstrong Jan 13 2004 12:38PM Security

Log In

  |  Forgot your password?