is

Is your SAN or NAS an Achilles heel?

Is your SAN or NAS an Achilles heel?

IT security has long been the focus of corporate attention, while storage security has been — perhaps unnoticeably — absent from the limelight. So it perhaps comes as a surprise to find that the data held in storage environments is frequently left vulnerable, simply because security in this area is so often overlooked.
James Middleton Dec 15 2005 10:36PM Security
Why is your network firewall falling short?

Why is your network firewall falling short?

Your network is secure, your servers are safe, and you’ve done everything to protect your network, corporate assets and intellectual property. You have a network firewall, so your perimeter is secure. Your network devices and servers are only accessible through your corporate VPN via two-factor authentication, and all external ports are blocked to non-authenticated traffic.
Alan Murphy Dec 15 2005 11:54AM Security
Debate: IP telephony is insecure and cannot be used in an organisation’s infrastructure just yet

Debate: IP telephony is insecure and cannot be used in an organisation’s infrastructure just yet

Tim Keanini Dec 9 2005 5:21PM Security
Debate: Internet Explorer has many flaws. Is it time to ditch Microsoft’s web browser?

Debate: Internet Explorer has many flaws. Is it time to ditch Microsoft’s web browser?

Jon S Nov 15 2005 12:46PM Security
Why technology is a risky business

Why technology is a risky business

Lloyd Hession Nov 11 2005 10:53AM Security
Automation is the answer

Automation is the answer

The shift to automated enforcement will make the problem of security manageable
Dr Gerhard Nov 10 2005 4:26PM Security
DKIM authentication is a good start at fixing email

DKIM authentication is a good start at fixing email

The Yahoo-Cisco technology is expected to combat phishing and spoofing, but it's not a magic bullet that can kill spam.
Craig Carpenter Nov 9 2005 4:35PM Security
Risk is all about keeping control

Risk is all about keeping control

Stuart Okin Oct 21 2005 4:48PM Security
Vulnerability is our business

Vulnerability is our business

It might seem like a cosy, family-run business, but as David Quainton discovers, Next Generation Software has earned a global reputation
David Quainton Oct 21 2005 3:27PM Security
Messaging - is it an instant threat?

Messaging - is it an instant threat?

Instant messaging (IM) has triumphed in the past 2-3 years among personal internet users as well as within companies.
Dr. Horst Oct 3 2005 11:19AM Security
Pentesting is not the only route

Pentesting is not the only route

“Almost all security breaches are completely unrelated to penetration issues"
Lee Farman Sep 5 2005 3:39PM Security
Wireless security is broken and it doesn’t matter.

Wireless security is broken and it doesn’t matter.

It’s hard to pick up an industry magazine or a newspaper without finding an article about the latest security flaw in one of the wireless protocols. Companies are scrambling to fix the problem by throwing money and resources at new standards and products. Organizations everywhere are wasting financial resources on technologies that prevent their users from taking advantage of wireless networks because of perceived security reasons.
Thomas Gilbert Aug 31 2005 11:14AM Security
ID is key in phishing battle

ID is key in phishing battle

Don’t lower your guard – criminals will always find new ways to perpetrate fraud
David Zumwalt Aug 26 2005 2:33PM Security
Forensics is not just a word for cops

Forensics is not just a word for cops

Thieves will always steal business ideas, but you can catch them red-handed, says John Patzakis
John Patzakis Aug 24 2005 5:06PM Security
Google storm over Sea of Japan (or is it East Sea?)

Google storm over Sea of Japan (or is it East Sea?)

Korean and Japanese hacking groups have targeted each other again in an argument over the name of a stretch of water.
David Quainton Aug 22 2005 11:16AM Security
That's why the lady is a scam

That's why the lady is a scam

Phishers trying to find new ways to extort users are tugging on the heart strings with the story of a wheelchair-bound senior citizen.
David Quainton Aug 12 2005 2:31PM Security
Darkmail growth is hidden bandwidth menace

Darkmail growth is hidden bandwidth menace

Malevolent mailers are increasingly hitting systems with email flooding attacks never designed to appear in inboxes.
David Quainton Aug 1 2005 11:39AM Security
Move by the DHS is the first right step

Move by the DHS is the first right step

We've all heard the saying, life's not a destination but a journey. The same holds true for security, according to the Federal Trade Commission's Orson Swindle, who talked at a CSO Summit last month in D.C., organized in part by the Information Systems Security Association (ISSA).
Illena Armstrong Jul 27 2005 3:53PM Security
Be aware! Spyware is everywhere

Be aware! Spyware is everywhere

Spyware now accounts for up to eight percent of outbound web traffic, according to a report.
David Quainton Jul 26 2005 4:40PM Security
The next generation is here

The next generation is here

I recently attended the graduation of the latest class of Norwich University's Master of Science in Information Assurance program. It was one of the high points of my lengthy career. In the spirit of full disclosure, I've been teaching in this program, for mid-career adults, since its inception. This was the second graduation in the 18-month program.
Peter Stephenson,CeRNS, Jul 22 2005 2:32PM Security

Log In

  |  Forgot your password?