in

What to Look for in a Web Application Protection System

What to Look for in a Web Application Protection System

The number of technology pundits decrying the state of Internet security has reached an unbearable level.
Abishek Chauhan Jan 14 2004 3:44PM Security
PKI Policy in the Business Environment

PKI Policy in the Business Environment

In the traditional world, the individual moves through differing process and policy environments in which varying policies govern their interactions with others.
John T. Jan 14 2004 3:29PM Security
What’s In a Name?

What’s In a Name?

In this article, issues of virus naming as they impact users will be discussed, and some of the ways that naming might affect the reviewing of products will be examined.
Sarah Gordon Jan 14 2004 3:26PM Security
Would You Please Swear in the Chief Security Officer?

Would You Please Swear in the Chief Security Officer?

As defense counsel to a corporation or as the chief security officer, hearing such words should send immeasurable fear through the hearts of each participant at any time you are sworn in.
Michael P. Jan 14 2004 3:22PM Security
Researchers find vulnerabilities in anti-virus software

Researchers find vulnerabilities in anti-virus software

Anti-virus software can be exploited to corrupt IT systems, according to a report by a group of researchers.
Dan Ilett Jan 14 2004 3:18PM Security
Ensure Your Pocket Time-Bomb Doesn't Blow Up In Your Face!

Ensure Your Pocket Time-Bomb Doesn't Blow Up In Your Face!

Companies are under more pressure than ever before to ensure that when it comes to protecting their lifeblood - their critical corporate data - no protection can be too much.
Magnus Ahlberg Jan 14 2004 2:34PM Security
Software Compliance: A Helping Hand in an Economic Downturn

Software Compliance: A Helping Hand in an Economic Downturn

By now, it's obvious that the economy and the technology sector in particular, are in the midst of a significant downturn. But hand-wringing over ever-dropping stock prices, new rounds of lay-offs and lowered earnings do not constitute a strategy.
Richard Willmott Jan 14 2004 2:23PM Security
Infosec is news in the year of the worm

Infosec is news in the year of the worm

This has been a very good year - especially for the hackers. Ben Rothke wonders if we have learned anything from the experience
Ben Rothke Jan 13 2004 5:13PM Security
A risky business: Insurance in cyberspace

A risky business: Insurance in cyberspace

Illena Armstrong looks at some of the forces driving demand for cyberliability insurance and what companies should be looking for
Illena Armstrong Jan 13 2004 3:32PM Security
C-level sponsors: Factoring in the business bottom line

C-level sponsors: Factoring in the business bottom line

Unless C-level executives are thoroughly involved in security matters your business strategy will suffer, says James L. Bindseil
James L. Jan 13 2004 3:25PM Security
Policy that lives: Enforcing security in spite of the users

Policy that lives: Enforcing security in spite of the users

Creating a security policy may be hard, says Illena Armstrong, but making sure that users comply is always the biggest problem
Illena Armstrong Jan 13 2004 3:22PM Security
Sinking in a sea of spam

Sinking in a sea of spam

Tired of email porn and body enhancement offers? John Young suggests using secure content management to halt the tidal wave.
John Young Jan 13 2004 3:19PM Security
Putting the pieces in place

Putting the pieces in place

Even the best of security policies will be ineffectual without proper implementation, says Gunter Ollmann
Gunter Ollmann Jan 13 2004 3:11PM Security
Evolving a role in infosecurity

Evolving a role in infosecurity

People have different perceptions of a chief security officer role, but Illena Armstrong finds that it is a vital one for business today.
Illena Armstrong Jan 13 2004 12:57PM Security
Hackers: Are you inviting them in?

Hackers: Are you inviting them in?

Surely by now, organizations should have erected the strongest barriers to hackers. But, as Illena Armstrong and others point out, many holes remain
Illena Armstrong Jan 13 2004 11:55AM Security
Time to act: New challenges in 2004

Time to act: New challenges in 2004

Tighter regulation and higher levels of cyber attacks will increase the role of the CSO in 2004. Marcia Savage reports
Marcia Savage Jan 13 2004 11:44AM Security
Facing disaster in Britain

Facing disaster in Britain

Terrorism gave an impetus to DR planning, says Ron Condon, but other factors have kept its importance alive
Ron Condon Jan 13 2004 10:10AM Security
Making Life Easier: Top 12 Things CSOs Need to Keep in Mind

Making Life Easier: Top 12 Things CSOs Need to Keep in Mind

1. Keep up with the latest technology -- the bad guys do!
Philip Conrod Jan 12 2004 2:26PM Security
Future Challenges in Pervasive Computing Environments

Future Challenges in Pervasive Computing Environments

What is the pervasive computing paradigm?
Sadie Creese Jan 12 2004 1:37PM Security
Protecting Your Business in the Right Places - Securing Applications

Protecting Your Business in the Right Places - Securing Applications

Many companies are spending on corporate security in a fragmented and often directionless way, partly because of the bewildering complexity of security solutions.
Mike Lee Jan 12 2004 11:41AM Security

Log In

  |  Forgot your password?