of

Review: Hacking: The Art of Exploitation

Review: Hacking: The Art of Exploitation

This book is truly meaty stuff. It explains in detail what every hacker should know, but more importantly, what every security expert should be aware of so they can take action to avoid being hacked.  

Dan Ilett Jan 22 2004 12:00AM Security
Screens of delight

Screens of delight

John Gillooly Jan 21 2004 12:00AM Hardware
Critical infrastructure companies must be mindful of infosec

Critical infrastructure companies must be mindful of infosec

Critical infrastructure companies in telecommunications, financial services, transportation and utility markets will need to heed the impact the adoption of new technologies will have on their IT security deployments and practices if they want to keep up with the vulnerabilities such upgrades often cause.
Illena Armstrong Jan 20 2004 9:16PM Security
Worries of Wireless

Worries of Wireless

Most infosecurity experts have their ideas about what to expect over the course of 2002.
Illena Armstrong Jan 19 2004 11:18AM Security
Leveraging a Super-View of the Individual User

Leveraging a Super-View of the Individual User

Traditionally, security administration has focused on enforcement products.
Mark Becker Jan 19 2004 11:12AM Security
Network IDS Shortcomings: Has NIDS Reached the End of the Road?

Network IDS Shortcomings: Has NIDS Reached the End of the Road?

The intrusion detection system (IDS) jumped from research labs and universities into being a standard information security safeguard in just several years.
Anton Chuvakin Jan 19 2004 10:48AM Security
Security: State of the Enterprise

Security: State of the Enterprise

Last month's column, "IDS: Alarms, not Walls," incited some interesting responses.
Bart Taylor Jan 19 2004 10:43AM Security
Put the Plug on those Productivity Drains and Turn On the Taps of Efficiency

Put the Plug on those Productivity Drains and Turn On the Taps of Efficiency

While companies understand that they need to protect themselves and their employees against content security threats (such as the circulation of inappropriate material, litigation, spam, loss or corruption of data, viruses and malicious code), they also need to consider how email and web security can boost productivity.
Alyn Hockey Jan 19 2004 10:40AM Security
In Contemplation of Our Small World

In Contemplation of Our Small World

Even Mickey Mouse is buying into it.
Illena Armstrong Jan 19 2004 10:02AM Security
Identity Theft Highlights the Importance of Data Responsibility

Identity Theft Highlights the Importance of Data Responsibility

In this article, the concept of 'data responsibility' is proposed, a concept which requires the realization that - in the modern electronic age - owners and users of information which may be regarded as private (credit card details and other personally identifiable information) must take some responsibility for the guardianship of this information.
Neil Robinson Jan 19 2004 9:43AM Security
Security Threats of Pervasive Computing

Security Threats of Pervasive Computing

Remember when we had telephone booths on every street corner?
Dave Lang Jan 19 2004 9:41AM Security
Of 'Zombie' Computers and DDoS Attacks: The Security Liability

Of 'Zombie' Computers and DDoS Attacks: The Security Liability

Two years ago, Internet security in the United States changed dramatically when Amazon.com, CNN, Yahoo, E*TRADE, ZDNet and others fell victim to what has come to be known as a distributed denial-of-service (DDoS) attack.
Dorsey Morrow Jan 16 2004 5:13PM Security
Twenty Years of Smartcards and Smartcard Attacks

Twenty Years of Smartcards and Smartcard Attacks

Take another look at that replacement credit card from your bank.
Allen Chilver Jan 16 2004 4:47PM Security
Taking the 'N' Out of VPN

Taking the 'N' Out of VPN

Recently, we've been listening to security managers reminisce about the 'good old days' of mainframe computing in which the physical security of the computer room was pretty much all that was needed in order to secure the data on the computer.
Dan Taylor Jan 16 2004 3:00PM Security
A Real Form of “CyberLiability” Emerges

A Real Form of “CyberLiability” Emerges

When Arthur Andersen partner David Duncan met with his colleagues in their Houston office last fall, just before the onset of their now infamous computer file delete-fest, they did not couch their planned mission as a purposeful endeavor to destroy evidence relevant to an impending Securities and Exchange Commission (SEC) investigation.
John Patzakis Jan 16 2004 1:37PM Security
Lessons of the Honeypot I: Aggressive and Careless

Lessons of the Honeypot I: Aggressive and Careless

The amazing book of Lance Spitzner "Know Your Enemy" seems to have opened the floodgates of honeypot deployment.
Anton Chuvakin Jan 16 2004 12:51PM Security
Information Availability - the Future of Business Continuity

Information Availability - the Future of Business Continuity

It’s on a “need to know” basis, and I need to know!
Keith Tilley Jan 16 2004 11:36AM Security
Secure Mobile Data Comes of Age

Secure Mobile Data Comes of Age

I've just spent the day with O2 (www.o2.com), the new name for what used to be known as BT Cellnet in the U.K., Viag Interkom in Germany, Esat Digifone in Ireland and Telfort in the Netherlands.
Steve Gold Jan 16 2004 11:32AM Security
The Changing Face of Security Penetration Testing

The Changing Face of Security Penetration Testing

The growing importance of adequately protecting computer resources is constantly highlighted by an ever-increasing number of high profile IT security incidents appearing in the media.
Simon Waring Jan 16 2004 10:32AM Security
(ISC)²’s Common Body of Knowledge and the HIPAA Security and Privacy Rules

(ISC)²’s Common Body of Knowledge and the HIPAA Security and Privacy Rules

It is no surprise that the security rules of the U.S. 1996 Health Portability and Accountability Act (HIPAA) appear closely modeled after existing generally accepted information security best practices.
Micki Krause Jan 16 2004 10:13AM Security

Log In

  |  Forgot your password?