in

SECURITY CAMERA: Storage, Where's the SANs in That?

SECURITY CAMERA: Storage, Where's the SANs in That?

Maybe it's the current global climate that has made many aware of the need for better storage, backup and disaster recovery capabilities.
Jayne Parkhouse Jan 16 2004 2:55PM Security
Guerrillas in Our Midst

Guerrillas in Our Midst

A little over a year has passed since the publication of the University of Maryland's paper "Your 802.11 Wireless Network Has No Clothes" (www.cs.umd.edu/~waa/wireless.pdf) which detailed a number of holes in wired equivalent privacy (WEP), the encryption protocol used to secure 802.11b wireless LANs.
Perry Norton Jan 16 2004 2:49PM Security
Playing Defense in Information Warfare

Playing Defense in Information Warfare

The September 11 attacks on the World Trade Center illustrate that in a free market economy, attacks against privately owned facilities can be even more damaging than those against government targets such as the Pentagon.
Edward Hearst Jan 16 2004 1:27PM Security
Authentication - Was That Really You Who Just Logged In?

Authentication - Was That Really You Who Just Logged In?

For this month’s article, I felt a need to address one of my most frequent concerns - authentication.
Jack Wiles Jan 16 2004 1:08PM Security
Hiding in Plain Sight

Hiding in Plain Sight

Hidden in this column is a secret message.
Jon Tullett Jan 16 2004 12:45PM Security
Putting Spam Back in the Can

Putting Spam Back in the Can

Earlier this year, the Australian division of the Coalition Against Unsolicited Bulk Email (CAUBE) revealed that the volume of spam in 2001 increased six-fold over that for 2000.
Pete Simpson Jan 16 2004 10:39AM Security
Survival in the Security Space: Taking a Closer Look at the Ingredients for Longevity

Survival in the Security Space: Taking a Closer Look at the Ingredients for Longevity

Today I was thinking about one-hit wonders.
Melisa LaBancz-Bleasdale Jan 16 2004 10:34AM Security
Communications Security in the 21st Century

Communications Security in the 21st Century

We are all aware that the ‘electronic age’ in which we exist is in reality an increasingly complex combination of interacting applications.
Staff Writers Jan 16 2004 10:14AM Security
The Privacy of Data in Motion

The Privacy of Data in Motion

The recent draft on employee monitoring, released earlier this year by the U.K. Information Commissioner, has caused a stir among employees and employers.
Staff Writers Jan 16 2004 10:00AM Security
Fire and Brimstone in 21st Century Security

Fire and Brimstone in 21st Century Security

It is increasingly disturbing to me that individuals of a certain prominence use their vexing ability to understand complex computations to scare the living heck out of the rest of us humble folks.
Melisa LaBancz-Bleasdale Jan 15 2004 3:07PM Security
Lessons Learned in Global IDS Deployment

Lessons Learned in Global IDS Deployment

Intrusion detection systems (IDS) have been the subject of endless articles, conferences, and discussions.
Jason Reed Jan 15 2004 2:38PM Security
Where In the World Did I Put That File?

Where In the World Did I Put That File?

As I get older each minute, my short-term memory doesn't seem to remember a lot about yesterday, much less last month.
Jack Wiles Jan 15 2004 2:14PM Security
Computer Security - What's Hiding In Your Closet?

Computer Security - What's Hiding In Your Closet?

How's that for a catchy title?
Jack Wiles Jan 15 2004 12:03PM Security
Antivirus firms in a frenzy

Antivirus firms in a frenzy

A German research company has found a gaping hole in leading antivirus software, putting security firms in a panic.
Dan Ilett Jan 15 2004 12:02PM Security
e-Security in the Public Sector

e-Security in the Public Sector

The public sector IT market is enjoying healthy growth in many developed countries.
Staff Writers Jan 15 2004 12:00PM Security
Secure Computing - Blended Viruses: A New Era in Anti-Virus Protection

Secure Computing - Blended Viruses: A New Era in Anti-Virus Protection

We live in a new era of blended threats, worm viruses and a host of new breeds of malicious mobile code that are more dangerous than ever.
Dean Coza Jan 15 2004 11:22AM Security
Securing and Managing Electronic Messaging in the Enterprise

Securing and Managing Electronic Messaging in the Enterprise

The threats and problems posed by email in large and complex organizations are of a different type and scale of magnitude from the email problems that such organizations first solved with an email ‘point product’ some years previously.
Staff Writers Jan 15 2004 10:53AM Security
For Your Eyes Only - Maximizing Security in a Closed Environment

For Your Eyes Only - Maximizing Security in a Closed Environment

Fingerprint, retinal or even voice identification have traditionally existed only in James Bond-style blockbuster movies.
Jackie Groves Jan 15 2004 10:48AM Security
Costs Versus Benefits in Securing Your Applications

Costs Versus Benefits in Securing Your Applications

The current state of application security practice is grim.
Bob Ayers Jan 15 2004 10:04AM Security
Securing Image Content in Email

Securing Image Content in Email

What arrives in our in-boxes these days is becoming progressively richer and fatter. The content includes HTML formatted rich text, hyperlinks and attachments of various types, including Office documents, databases, images, videos, etc. It is now estimated that more than 5 per cent of emails contain images.
Staff Writers Jan 14 2004 5:00PM Security

Log In

  |  Forgot your password?