information

Information Anarchy? One Simple Solution

Information Anarchy? One Simple Solution

Microsoft calls it "information anarchy."
Bryan Davies Jan 19 2004 10:12AM Security
Regulating Security: Telecoms Regulation and Information Security

Regulating Security: Telecoms Regulation and Information Security

With the recent submission to Parliament of the Communications Bill that will give rise to the new Office of Communications (OFCOM), the U.K. is undergoing a dramatic change in the regulation of its communications industries.
Andrew Rathmell Jan 16 2004 1:55PM Security
Playing Defense in Information Warfare

Playing Defense in Information Warfare

The September 11 attacks on the World Trade Center illustrate that in a free market economy, attacks against privately owned facilities can be even more damaging than those against government targets such as the Pentagon.
Edward Hearst Jan 16 2004 1:27PM Security
Information Security: Addressing the Human Factor

Information Security: Addressing the Human Factor

Interest in information security is at unprecedented levels.
Steve Crutchley Jan 16 2004 12:47PM Security
Is Information Security Crossing the Proverbial You Know What?

Is Information Security Crossing the Proverbial You Know What?

Information security is a hot topic these days, something that often gets credited to an increased awareness of terrorism.
Dan Taylor Jan 16 2004 11:37AM Security
Information Availability - the Future of Business Continuity

Information Availability - the Future of Business Continuity

It’s on a “need to know” basis, and I need to know!
Keith Tilley Jan 16 2004 11:36AM Security
When Worlds Collide: Physical and Information Security

When Worlds Collide: Physical and Information Security

Information security and physical security are frequently viewed as either conflicting or as far removed from one another as the sun is from the moon.
Thresa Lang Jan 16 2004 11:34AM Security
Information Insecurity

Information Insecurity

What is information security?
Bob Lonadier Jan 16 2004 11:10AM Security
Economic Models for Information Security

Economic Models for Information Security

Security managers are under increasing pressure from corporate management to justify investments in information security technologies.
Dan Taylor Jan 16 2004 10:23AM Security
Interpol Tracks Information and Communication Technology Crime

Interpol Tracks Information and Communication Technology Crime

“IT crime constitutes an ‘enormous’ threat to our society!”
Interpol European Jan 15 2004 2:42PM Security
A Proper Diet of Information Security

A Proper Diet of Information Security

Earlier this year, researchers in Sweden announced that during a research study, they discovered that bread, potato chips, French fries and even cereal contain high levels of the carcinogen acrylamide.
Dan Taylor Jan 15 2004 12:05PM Security
Trusted Information Awareness - Another Name for Domestic Spying?

Trusted Information Awareness - Another Name for Domestic Spying?

Co-incident with the news about the formation of the U.S. Department of Homeland Defense is the breaking of a story about a Defense Advanced Research Projects Agency (DARPA) ‘research project’ exploring the viability of sifting through huge amounts of transaction data looking for possible terrorist activities.
Bob Lonadier Jan 15 2004 10:57AM Security
Information Security on The Internet

Information Security on The Internet

In the aftermath of the September 11 terrorist events in the United States, the fear that malevolent hackers and other criminal perpetrators might unleash a cyberattack on the Internet is becoming an increasing concern.
Jason B. Jan 14 2004 2:49PM Security
Putting Information Security into Focus

Putting Information Security into Focus

In the past several months, it has become painfully clear that C-level executives are getting tired of buying information security for its own purposes.
Dan Taylor Jan 12 2004 3:54PM Security
Database security: protecting sensitive and critical information

Database security: protecting sensitive and critical information

Bankers would be considered negligent if they locked a bank’s outer doors and left the vault’s doors open at night.
Scott C. Jan 12 2004 3:03PM Security
Communicating the Language of Information Security

Communicating the Language of Information Security

“When I use a word,” Humpty Dumpty said, in a rather scornful tone, “it means just what I choose it to mean - neither more nor less.” Lewis Carroll, Through the Looking Glass
Dan Houser Jan 12 2004 2:43PM Security
Information Security: Regulation and Legislation

Information Security: Regulation and Legislation

It’s not so many years ago that organizations (misguidedly) held the view that security was the province of the IT department.
Alan Lycett Jan 12 2004 1:23PM Security
The Role of the Corporate Information Security Steering Committee

The Role of the Corporate Information Security Steering Committee

Organizations are becoming increasingly aware that if they fail to implement successful security management processes, it could expose them to untenable risk.
Tom Scholtz Jan 12 2004 11:27AM Security
The Myth of Information Security ROI: Not Every Expense Is an "Investment"

The Myth of Information Security ROI: Not Every Expense Is an "Investment"

Information security teams are under increasing pressure to demonstrate financial return on investment (ROI) for security projects.
Tom Scholtz Jan 9 2004 2:46PM Security
“Cradle-to-Grave”: Career Path Support Needed for Information Security Professionals

“Cradle-to-Grave”: Career Path Support Needed for Information Security Professionals

Over the past few years, Information Security has emerged as a separate and distinct profession from traditional systems and physical security career fields.
Dow A. Jan 9 2004 1:30PM Security

Log In

  |  Forgot your password?