of

A virus to suit all of your tastes

A virus to suit all of your tastes

Staff Writers Jan 14 2005 5:01PM Security
We’ve had a fair share of over-hyped technology

We’ve had a fair share of over-hyped technology

Illena Armstrong Jan 11 2005 11:36AM Security
Living with the threat of warfare is a media myth

Living with the threat of warfare is a media myth

Peter Stephenson Jan 10 2005 5:27PM Security
Statistics point up lack of progress

Statistics point up lack of progress

Last year saw new threats but some old problems too, as Ron Condon reports
Ron Condon Jan 10 2005 3:45PM Security
The dangers of zero-day

The dangers of zero-day

We hear a lot about new vulnerabilities, but as Gunter Ollmann explains, there are still plenty waiting for a patch
Gunter Ollmann Jan 7 2005 11:22AM Security
Storage islands in a sea of risks

Storage islands in a sea of risks

More efficient networks have opened up your data to a host of new dangers. Scott Gordon outlines how best to protect it.
Scott Gordon Jan 6 2005 2:46PM Security
The challenge of securing VoIP

The challenge of securing VoIP

Voice over IP (VoIP) is rapidly becoming a pervasive technology as businesses embrace cost savings on calls whilst enjoying advanced communications applications sitting within the network.
John Porter Dec 21 2004 12:01PM Security
Days in the life of a pen-tester

Days in the life of a pen-tester

Foreign hackers, weak passwords, backdoors and buffer overflows – just another day at the office for Network Defence’s penetration testers. Here’s a look at sample pages from the head tester’s diary– and what companies can learn from the results.
David Beesley Dec 21 2004 11:34AM Security
End of year survey: SC readers have their say

End of year survey: SC readers have their say

The end-of-year survey of attitudes among the SC readership provides a fascinating snapshot of our industry’s state of health. Ron Condon goes through the responses
Ron Condon Dec 18 2004 9:55PM Security
The seven sins of copier security are revealed…

The seven sins of copier security are revealed…

Wayne Foster Dec 18 2004 9:41PM Security
The myth of clientless VPNs

The myth of clientless VPNs

Providing remote access to business critical applications and information is no longer optional – it’s a ‘must have’ for today’s extended enterprise. Employees are more mobile, telecommuting continues to escalate, and partners play an increasingly important role in business processes. More so than ever before, companies require secure, anywhere access to internal applications, real-time information distribution and interactive collaboration.
Staff Writers Dec 15 2004 12:27PM Security
Over half of IT security staff have no idea about corporate law

Over half of IT security staff have no idea about corporate law

Confusion reigns in the compliance world as UK board members know what the Companies Bill is but IT security professionals have absolutely no idea.
David Quainton Dec 14 2004 4:55PM Security
Industry bemoans legislation's lack of cybersecurity post

Industry bemoans legislation's lack of cybersecurity post

Industry leaders were disappointed that lawmakers stripped out language from a national intelligence reform bill that would have created an assistant secretary for cybersecurity in the Department of Homeland Security.
Marcia Savage Dec 9 2004 11:37PM Security
The financial risks of uncontrolled user access

The financial risks of uncontrolled user access

Dangers are posed by ineffective provisioning of user access rights. A secure enterprise provisioning system can address specific risk areas highlighted by the FSA’s Financial Crime Sector Report.
Michael Burling Dec 8 2004 1:13PM Security
Best of 2004

Best of 2004

Infosec arrives on corporate radar screens
René Millman Dec 8 2004 10:16AM Security
So are these first signs of an IT user fightback?

So are these first signs of an IT user fightback?

Jon Tullett Dec 7 2004 10:36AM Security
Hackers start to feel long arm of law

Hackers start to feel long arm of law

Global collaboration is paying off. David Quainton reports on the legal success
David Quainton Dec 6 2004 3:44PM Security
The end of the affair - Lycos lets spammers be

The end of the affair - Lycos lets spammers be

Lycos has created so much love that it no longer needs to operate its vigilante website. “Make Love Not Spam” was laid to rest this weekend after a brief but eventful life attacking spamming websites.
David Quainton Dec 6 2004 11:01AM Security
Implications of first HIPAA court case

Implications of first HIPAA court case

With the first successful prosecution under HIPAA, will there now be a greater crackdown on ID theft? John Sterlicchi reports
John Sterlicchi Dec 3 2004 4:58PM Security
How time flies: A round up of the year's cyber events

How time flies: A round up of the year's cyber events

Worms, phishing, patching holes… sound all too familiar? Ben Rothke takes a look back at the big threats that hit the industry in 2004
Ben Rothke Dec 2 2004 12:22PM Security

Log In

  |  Forgot your password?