how

Knowing how to react is everything

Knowing how to react is everything

I have always emphasised the importance of visibility and forward thinking in enterprise security. However, in my experience, incident management is the most important, yet least well-executed, skill in all organisations.
David Lacey, Apr 7 2006 12:44PM Security
How strong is the Kama Sutra Worm?

How strong is the Kama Sutra Worm?

Security experts are unsure how widespread the Nyxem.E worm actually is, saying the webcounter associated with the virus may overestimate the number of infected PCs.
Frank Washkuch Jan 30 2006 9:34PM Security
Large enterprise: How the big boys cover their assets

Large enterprise: How the big boys cover their assets

Just one lone publicly disclosed identity theft incident can make even the largest enterprise beef up information security and privacy practices fast.
Illena Armstrong Jan 13 2006 8:27PM Security
How to be a survivor

How to be a survivor

Using the information supplied through your IDS and IPS in the right way could dramatically improve your incident response plans, discovers Jim Carr
Jim Carr Dec 9 2005 3:24PM Security
How business learned to love open source

How business learned to love open source

More and more proprietary security tools use some open-source code. What are the advantages for companies?
Jim Carr Nov 9 2005 4:23PM Security
How visa made a safer internet

How visa made a safer internet

The Payment Card Industry Data Security Standard is making online payments safer for everyone. Marcia Savage talks to Visa’s risk guru
Marcia Savage Oct 21 2005 3:05PM Security
How to make your database secure

How to make your database secure

Data security experts are raising the alarm: viruses are getting increasingly more specialized and have lately attacked SQL Server installations that did not install the latest Microsoft security patches.
Martin Teetz Aug 1 2005 11:10AM Security
How to locate intruders

How to locate intruders

Tracking down unwanted wireless access points can be a tricky task. Matthew Gray suggests that RF fingerprinting is the best way to go
Matthew Gray Jul 29 2005 1:52PM Security
How to make clueless users ‘clueful’

How to make clueless users ‘clueful’

Little green men? Aliens from another world? Nope, it’s just Winn Schwartau’s latest obsession
Winn Schwartau Jul 21 2005 11:46AM Security
How to clean up after Sumitomo Mitsui

How to clean up after Sumitomo Mitsui

When the truth finally comes out about the attempted theft of £220 million from Sumitomo Mitsui Bank in March, it's likely to have all the hallmarks of an inside job – certainly that the crime relied on having people on the inside to carry it out.
Ron Condon May 13 2005 5:39PM Security
How do you measure risk? - Tell SC Magazine

How do you measure risk? - Tell SC Magazine

What's your company's approach to risk? How do you measure it? We'd like to hear from you.
Ron Condon Apr 28 2005 1:18PM Security
Reluctant hero: How the NISCC came in from the cold

Reluctant hero: How the NISCC came in from the cold

Only the NISCC would launch a public website without telling anyone. Ron Condon meets the man who runs Britain’s IT defence unit
Ron Condon Mar 16 2005 4:21PM Security
How to stay open and secure

How to stay open and secure

It’s a maxim that applies as much to network security as it does to protecting physical assets because there are many ways for a determined individual to penetrate a perimeter defense. Some threats like the Sobig virus instantly threatened networks through email attachments while T-Mobile’s customer data was hacked over a period of many months as reported in SC Magazine here.
Graham Welch Mar 7 2005 11:31AM Security
How to delve into the hacker’s mind

How to delve into the hacker’s mind

The first person to hold a PhD in forensics, Emlyn Everitt tells David Quainton that the battle for security begins in the boardroom
David Quainton Feb 22 2005 12:24PM Security
How to cut patchwork… and save a cool $100m

How to cut patchwork… and save a cool $100m

The Air Force was spending more on system patches than on software. Something had to change, as John Gilligan tells Marcia Savage .
Marcia Savage Feb 22 2005 11:56AM Security
How time flies: A round up of the year's cyber events

How time flies: A round up of the year's cyber events

Worms, phishing, patching holes… sound all too familiar? Ben Rothke takes a look back at the big threats that hit the industry in 2004
Ben Rothke Dec 2 2004 12:22PM Security
Biometrics: How to plan your very own project

Biometrics: How to plan your very own project

Good planning before you implement biometrics is key if you want to reap the benefits of this technology, Martin Jacobs explains why
Martin Jacobs Oct 15 2004 4:22PM Security
How valuable is your data?

How valuable is your data?

We have seen it in ‘The Thomas Crown Affair’ and ‘Star Wars’ and countless other movies. But could it happen in real life? Could a fraudster posing as somebody else easily get their hands on valuable assets?
Joanna Shields Oct 6 2004 3:36PM Security
How to prevent the unknown attack - proactive filtering

How to prevent the unknown attack - proactive filtering

If you’re in corporate IT, it can be a difficult world keeping on top of security to keep your business systems running.
Dr. Horst Sep 7 2004 10:54AM Security
How to curb those dispersed users

How to curb those dispersed users

What can you do if a careless user brings a worm into your network? Marcia Savage outlines how companies can control their mobile users
Marcia Savage Aug 5 2004 3:29PM Security

Log In

  |  Forgot your password?