is

Why good business is also good security

Why good business is also good security

February is a big month for SC Magazine this year. We'll be having our SC Magazine Awards ceremony and dinner for the first time in the U.S. on February 16 during the RSA Conference at San Francisco's Moscone Center. It is, by far, the biggest and swankiest event by which excellence in all things IT security is acknowledged.
Illena Armstrong Feb 22 2005 5:36PM Security
Firms realize that playing it safe is the riskier option

Firms realize that playing it safe is the riskier option

Nobody wants to be the first to try any new or innovative tool, product or technique. You know the old saw: "Never buy version 1.0 of a product."
Peter Stephenson Feb 22 2005 2:42PM Security
Institute is in with a fighting chance

Institute is in with a fighting chance

The industry is rallying behind a new professional body, finds David Quainton
David Quainton Feb 22 2005 12:52PM Security
CSOs say business approach is essential

CSOs say business approach is essential

CSOs need to put business needs first when going about securing their enterprises, a panel of security executives said at the RSA Conference this week.
Marcia Savage Feb 18 2005 10:15PM Security
90 per cent of email is spam claims new survey

90 per cent of email is spam claims new survey

Spam has risen by 40 percent in the last three months and now averages nearly 90 per cent of all email received.
David Quainton Feb 1 2005 2:53PM Security
International cooperation to catch cybercriminals is up

International cooperation to catch cybercriminals is up

International cooperation in cracking down on cybercrime has increased, said a computer crime specialist with the U.S. Department of Justice.
Marcia Savage Jan 20 2005 12:43AM Security
Fresh MS vulnerability is revealed in Denmark

Fresh MS vulnerability is revealed in Denmark

Staff Writers Jan 14 2005 5:07PM Security
Storage is key to security

Storage is key to security

Ten things to know when selecting a storage security solution.
Steve Wllson Jan 11 2005 1:02PM Security
Spammers are a pain and so is not backing up

Spammers are a pain and so is not backing up

Robert Schifreen Jan 11 2005 12:29PM Security
Living with the threat of warfare is a media myth

Living with the threat of warfare is a media myth

Peter Stephenson Jan 10 2005 5:27PM Security
Is your website an easy target?

Is your website an easy target?

Working to strict deadlines and under financial constraints, website developers are often forced to place security near the bottom of the list of requirements. Marcia Savage looks at the inevitable consequences
Marcia Savage Jan 7 2005 12:38PM Security
What you measure is what you get

What you measure is what you get

Creating Information Security Performance Measures: Five Recommendations for CIOs and CISOs
Edward Schwartz Jan 5 2005 2:07PM Security
Is Benny heading for the Slammer?

Is Benny heading for the Slammer?

Czech virus writer “Benny” has broken his silence over reports he was arrested last week. After having his house raided on Thursday sources claimed the 21 year old had been detained for questioning about the creation of 2003’s Slammer worm.
David Quainton Nov 30 2004 11:08AM Security
Broadband is reliable: ACA

Broadband is reliable: ACA

Broadband users across Australia are receiving reliable high speed internet access, according to a study released by the ACA.
Staff Writers Nov 26 2004 12:00AM Telco/ISP
Spate of new legislation is not welcomed by all

Spate of new legislation is not welcomed by all

David Quainton Nov 12 2004 5:19PM Security
President’s website is hacked

President’s website is hacked

Staff Writers Nov 12 2004 5:05PM Security
Risk analysis is revisited with a fresh approach

Risk analysis is revisited with a fresh approach

Peter Stephenson Nov 12 2004 5:04PM Security
BT’s new boy is ready for action

BT’s new boy is ready for action

Ray Stanton has been set a tough goal – to turn BT into a major force in managed security services. Ron Condon finds out about how he plans to go about it
Ron Condon Oct 15 2004 4:25PM Security
How valuable is your data?

How valuable is your data?

We have seen it in ‘The Thomas Crown Affair’ and ‘Star Wars’ and countless other movies. But could it happen in real life? Could a fraudster posing as somebody else easily get their hands on valuable assets?
Joanna Shields Oct 6 2004 3:36PM Security
When it comes to wireless security, good enough is simply not good

When it comes to wireless security, good enough is simply not good

As security threats increase in quantity and complexity, assuring business continuity means that corporations need to aggressively and proactively protect the entire network infrastructure.
Bethany Mayer Sep 15 2004 10:52AM Security

Log In

  |  Forgot your password?