is

Perimeter security is changing fast

Perimeter security is changing fast

Most security solutions today are built around attempting to protect the vulnerability of the PC and, or the server, by attempting to keep “bad” things outside of the network security perimeter. But, with the changing and disappearing perimeter - security now needs to be intrinsic in every system and for every user.
Bob Johnson Sep 7 2004 12:49PM Security
Verykios is back, takes share in Firewall Systems

Verykios is back, takes share in Firewall Systems

After a four month sabbatical, former LAN Systems GM Nick Verykios is back in the distribution channel, securing a 14 percent stake in niche security player Firewall Systems joining LAN founder Scott Frew in the process.
Byron Connolly Sep 6 2004 12:00AM Networking
Email is a victim of its own success

Email is a victim of its own success

What began as a communication tool for the academic community is now rated as the most critical form of business communication.
Steve Ronksley Aug 17 2004 3:36PM Security
Who is in control of Sarbanes Oxley?

Who is in control of Sarbanes Oxley?

The deadline for compliance with Section 404 of the Sarbanes-Oxley requirements (SOX) will come into force at the close of this fiscal year. Companies disclosing their results must implement an internal control structure to assure the accuracy of financial reports, evaluate the control structure periodically and make sure that controls are tested at least annually by an independent audit firm.
Luke Brown Aug 10 2004 4:52PM Security
Windows XP Service Pack 2 is available

Windows XP Service Pack 2 is available

The long awaited Service Pack 2 for Windows XP was released to PC manufacturers late last Friday but business users will have to wait until the end of the month to get their hands on the update.
Rene Millman Aug 9 2004 2:04PM Security
Divide and rule is the new way of working

Divide and rule is the new way of working

In a connected world, companies need to supplement the security perimeter with other technologies and techniques. Jonathan Gossels and Dick Mackey suggest that zoning could make a significant difference
Jonathan Gossels Aug 5 2004 2:37PM Security
Downtime is now a matter of choice

Downtime is now a matter of choice

The current perception of IT management and users alike is that downtime of critical servers and their associated applications is just an unfortunate fact of life.
Neil Robertson Jul 20 2004 4:38PM Security
Security is no.1 priority, say executives

Security is no.1 priority, say executives

Research from AT&T and the Economist Intelligence Unit has shown that 78 per cent of executives think that computer security is the most important area for their networks.
Dan Ilett Jul 15 2004 3:28PM Security
Is reactive patching the answer to protecting against known vulnerabilities?

Is reactive patching the answer to protecting against known vulnerabilities?

The time in which it takes hackers to write malicious code to exploit a known vulnerability is rapidly shrinking. The appearance of the Sasser worm in the shortest time ever, just 18 days between the revealing of a Microsoft vulnerability and the beginning of an attack, marks a new low point in the fight against cyber crime. With the protective window of opportunity getting ever smaller, the task of patching vulnerable software is becoming an increasingly endless one.
David Williamson Jun 29 2004 2:58PM Security
Security is more than tools – it is a total plan

Security is more than tools – it is a total plan

Spam is more than a simple time and bandwidth drain. It is a problem that many organizations are having a tough time eradicating.
Illena Armstrong Jun 1 2004 3:17PM Security
Together is much better

Together is much better

Gunter Ollmann explains how clients and consultants can work side by side for maximum assessment results
Gunter Ollmann Jun 1 2004 2:47PM Security
When the root is the problem

When the root is the problem

As Linux grows in popularity with both users and hackers, Richard Williams contemplates precisely how risky all or nothing security is
Richard Williams Apr 15 2004 11:11AM Security
Antivirus is the most common security technology [NB Awaiting more info]

Antivirus is the most common security technology [NB Awaiting more info]

Antivirus applications are the most commonly used security technology.
Dan Ilett Apr 13 2004 4:58PM Security
Linux or Windows: Which is more vulnerable?

Linux or Windows: Which is more vulnerable?

After examining security vulnerability data over the last year, Forrester Research has determined that both Windows and Linux can be deployed securely, but vendors need to ensure they address several criteria to make this process easier.
Illena Armstrong Apr 6 2004 10:05PM Security
Consultants view: This intrusion is no test

Consultants view: This intrusion is no test

Gunter Ollmann explains why test environments are a security weakness in need of some serious attention
Gunter Ollmann Apr 5 2004 4:36PM Security
Why improved security is well worth waiting for

Why improved security is well worth waiting for

What would you prefer, smart new software now, or error-free software later? Think hard before answering.
Ron Condon Mar 12 2004 12:34PM Security
Love is a text message?

Love is a text message?

Vivienne Fisher Feb 11 2004 12:00AM Telco/ISP
VoIP Security: Is Anyone Listening?

VoIP Security: Is Anyone Listening?

There is every indication that 2002 will be the year of voice over Internet protocol (VoIP).
R. Subha Jan 19 2004 11:16AM Security
Hacking: The Cyberworld's Oldest Profession is Indispensable R&D

Hacking: The Cyberworld's Oldest Profession is Indispensable R&D

To label the genre that is a combination of pure digital finesse and old fashioned guile as something so artless and blunt as 'hacking' seems unfortunate.
Bryan Davies Jan 19 2004 11:05AM Security
Is Microsoft at Odds with Best Security Practices?

Is Microsoft at Odds with Best Security Practices?

Microsoft has announced the release of a new security tool aimed at improving the security of home and enterprise systems.
David Thomason Jan 19 2004 9:52AM Security

Log In

  |  Forgot your password?