is

Law is nothing without enforcement

Law is nothing without enforcement

There is a great deal of legislation being proposed that could have a big impact on information security, most of it the result of concerns over ID theft.
Dave Cullinane Jul 21 2005 5:27PM Security
The male of the species is more deadly than the female

The male of the species is more deadly than the female

Male workers are irresponsible spreaders of spyware and viruses, a new report claims.
David Quainton Jun 29 2005 11:20AM Security
Debate» IPS promises much in terms of extra security for networks, but the promise is a false one

Debate» IPS promises much in terms of extra security for networks, but the promise is a false one

Ron Smith Jun 21 2005 12:39PM Security
Debate» For remote access, IPsec’s time is up. In fact, it’s end should have come some time ago

Debate» For remote access, IPsec’s time is up. In fact, it’s end should have come some time ago

Gary Tomlinson Jun 21 2005 12:30PM Security
Is risk an overused buzzword?

Is risk an overused buzzword?

Peter Stephenson,CeRNS, Jun 21 2005 11:10AM Security
U.S. is biggest source of online fraud

U.S. is biggest source of online fraud

More than four-fifths of fraudulent online transactions originate in the U.S. according to a new study.
René Millman Jun 16 2005 5:06PM Security
Obsession is not a dirty word

Obsession is not a dirty word

Information security manager of the year Tony Ritson talks to Ron Condon about how he made his firm the industry standard
Ron Condon Jun 16 2005 4:01PM Security
Another cold war is about to start

Another cold war is about to start

It’s becoming clear that spyware will be one of the biggest problems facing users and companies. But, writes René Millman, you can fight back
René Millman Jun 16 2005 12:26PM Security
Debate: Educating users is a waste of time – firms would be wiser to spend more on technology

Debate: Educating users is a waste of time – firms would be wiser to spend more on technology

Robert Schifreen May 13 2005 5:35PM Security
An institute is the next step

An institute is the next step

The industry needs a body to set and monitor standards and ensure the fitness of its practitioners
Prof. Fred May 13 2005 5:18PM Security
Risk is the one constant

Risk is the one constant

Peter Stephenson,CeRNS, May 13 2005 11:56AM Security
This is your early warning system

This is your early warning system

Pen testing and vulnerability assessments are essentials. But how often and when these checks are made varies from one company to the next, as Marcia Savage found out
Marcia Savage May 12 2005 4:56PM Security
Firefox is vulnerable too

Firefox is vulnerable too

An “extremely critical” flaw has been found in Mozilla’s Firefox browser. According to some reports exploit code is already in the wild.
David Quainton May 9 2005 12:08PM Security
Is your security event management tool credible?

Is your security event management tool credible?

Security Event Management (SEM) vendors often talk about scalability when addressing the degree to which their products can accommodate growth in a customer's increasing network and/or security requirements.
Roberto Angelino, Apr 20 2005 12:32PM Security
Debate: Everyone knows Linux is the safest OS, and there’s no way that Windows can compete

Debate: Everyone knows Linux is the safest OS, and there’s no way that Windows can compete

Any time one compares Linux and Windows security one risks unleashing a cataract of opinion.
Richard Ford Apr 19 2005 12:42PM Security
What it comes down to is risk

What it comes down to is risk

Any good information security program should always relate to the business case and its tolerance for risk. The risk tolerance of an organization is the baseline that the program should address, including any additional legal requirements.
Kevin Dickey, Apr 18 2005 12:45PM Security
Infosec is complex. Get over it

Infosec is complex. Get over it

When does theory become practice? Should information security practitioners be concerned about theory?
Peter Stephenson, Apr 18 2005 12:42PM Security
China is full of phish

China is full of phish

Chinese phishing websites have rocketed in the last year, with 223 reported in 2004 according to a new report.
David Quainton Mar 29 2005 11:19AM Security
Don’t do it Bill. All this will achieve is more hacking

Don’t do it Bill. All this will achieve is more hacking

In an interview last month for the BBC, Bill Gates once again stressed how seriously Microsoft is now taking security. He spoke proudly, for example, of the 100 million downloads of Service Pack 2 for Windows XP. "Users don't achieve full potential," he said, "if they're having to worry about something like security."
Robert Schifreen Mar 17 2005 3:03PM Security
Collaboration is key to infosecurity future says Symantec’s Thompson

Collaboration is key to infosecurity future says Symantec’s Thompson

Symantec CEO John Thompson used his keynote speech at the San Francisco RSA conference to demand radical reform in the security market, and dismissed Microsoft's efforts as insufficient.
Staff Writers Mar 17 2005 2:00PM Security

Log In

  |  Forgot your password?