from

Authentication: From Passwords to Public Keys

Authentication: From Passwords to Public Keys

An exciting book on authentication, of all things?
Anton Chuvakin Jan 16 2004 11:01AM Security
New Security Perspectives: What U.S. Firms Can Learn From Overseas

New Security Perspectives: What U.S. Firms Can Learn From Overseas

In today's climate of increasing security concerns, companies are seeking out new policy and practice concepts in addition to new technology upgrades to address vulnerabilities.
Steve Crutchley Jan 16 2004 10:44AM Security
Summer’s Long Days: Bouncing from Thought to Thought

Summer’s Long Days: Bouncing from Thought to Thought

Good old reliable time, not the Internet kind, does some flying.
Illena Armstrong Jan 16 2004 10:36AM Security
Monitoring Security from the Inside Out: Intrusion Detection at the Configuration Level

Monitoring Security from the Inside Out: Intrusion Detection at the Configuration Level

Today’s intrusion detection (ID) technology is, for the most part, network-centric.
Andy Evans Jan 15 2004 11:45AM Security
From Business Policy to Network Policy

From Business Policy to Network Policy

At the core of decisions about Internet access, monitoring and content filtering are business policies that specify where, when and how users will access web content.
Steve House Jan 14 2004 3:40PM Security
How do you stop the threat from within?

How do you stop the threat from within?

The biggest threat to security is not from outside, it is from the company employee. Julie Jervis asked security experts throughout the U.S. how they are educating these end-users
Julie Jervis Jan 13 2004 5:15PM Security
For Your Eyes Only: Securing Sensitive Data from Rogue Staff

For Your Eyes Only: Securing Sensitive Data from Rogue Staff

Defining what constitutes intellectual property can lead to differences of opinion.
Vanessa Chandrasekaran Jan 12 2004 10:21AM Security
Coping with security risks from all angles

Coping with security risks from all angles

Because of our increased reliance on IT, the effects of downtime, security breaches or deliberate attacks on a company’s IT system can cause serious, sometimes irreparable, damage.
Keith Tilley Jan 12 2004 9:58AM Security
Security Devices Don’t Always Save Companies from Hackers

Security Devices Don’t Always Save Companies from Hackers

On May 29, 2003, the Computer Security Institute (CSI) and the FBI published the results of their most recent Computer Crime and Security Survey, now in its eighth year.
Staff Writers Jan 9 2004 4:16PM Security
Questions from the security zone: Are all VPNs created equal?

Questions from the security zone: Are all VPNs created equal?

Given today’s ever tighter IT budgets and emphasis on cost savings, many organizations are planning to replace their wide area network (WAN) connections, looking for a reliable and more cost effective alternative that doesn’t compromise security.
Staff Writers Jan 9 2004 3:06PM Security
Get Dutch data from Anyware

Get Dutch data from Anyware

Melbourne-based peripherals distributor Anyware Computer Accessories has signed an exclusive deal to distribute a Dutch range of data gear to resellers in Australia and New Zealand.
Staff Writers Oct 20 2003 12:00AM Hardware
ERG ejects from ECard

ERG ejects from ECard

Staff Writers Nov 14 2002 12:00AM Hardware
De Castro decamps from AOL

De Castro decamps from AOL

Staff Writers Nov 13 2002 12:00AM Software
From Zip to NAS

From Zip to NAS

Rob Irwin Jun 18 2002 12:00AM Storage

Log In

  |  Forgot your password?