of

The Privacy of Data in Motion

The Privacy of Data in Motion

The recent draft on employee monitoring, released earlier this year by the U.K. Information Commissioner, has caused a stir among employees and employers.
Staff Writers Jan 16 2004 10:00AM Security
The Art of War

The Art of War

It’s not uncommon to hear wisdom such as “if an attacker has physical access to a PC, you’ve lost the battle,” or, “if a Trojan makes it past the defenses, it’s all over.”
Jon Tullett Jan 16 2004 9:44AM Security
Lessons of the Honeypot II: Expect the Unexpected

Lessons of the Honeypot II: Expect the Unexpected

Observation and monitoring of computer intruders have long been performed in a haphazard fashion, if at all.
Anton Chuvakin Jan 15 2004 2:31PM Security
The Anatomy of a Security Incident Response Team

The Anatomy of a Security Incident Response Team

As organizations continue to invest in dedicated information security resources, it is imperative that they also develop the capability to respond to security incidents.
Tom Scholtz Jan 15 2004 1:20PM Security
A Proper Diet of Information Security

A Proper Diet of Information Security

Earlier this year, researchers in Sweden announced that during a research study, they discovered that bread, potato chips, French fries and even cereal contain high levels of the carcinogen acrylamide.
Dan Taylor Jan 15 2004 12:05PM Security
Of Votes and Cyberspace

Of Votes and Cyberspace

With the mid-term elections come and gone, it’s time for the Bush Administration to re-focus its attention on protecting cyberspace.
Bob Lonadier Jan 15 2004 11:41AM Security
Making Sense of “Homeland Security”

Making Sense of “Homeland Security”

As the Homeland Security Act makes its way through the United States Congress, the topic of homeland security has become a relevant discussion in the information security marketplace.
Dan Taylor Jan 15 2004 11:27AM Security
Real-World IT Security - The Social Engineering Perils of Commuting

Real-World IT Security - The Social Engineering Perils of Commuting

The morning commute from my suburban town of residence to London, where I presently work, and back is an opportunity to catch up on some reading and the news.
Stuart King Jan 15 2004 11:16AM Security
Securing the Last Unprotected Area of the Network

Securing the Last Unprotected Area of the Network

Just how secure is your network?
James Teel Jan 15 2004 9:57AM Security
Do Firewalls and IDS Create a False Sense of Internal Security?

Do Firewalls and IDS Create a False Sense of Internal Security?

In an effort to boost sales and generate revenue, one U.S. multinational energy company recently embraced the Internet to bolster external communication and internal collaboration.
Abishek Chauhan Jan 14 2004 4:36PM Security
The Secret of Agents

The Secret of Agents

A generation ago, the world of espionage and counter-intelligence was populated by agents who operated in the shadows of eavesdropping, codes and hollowed-out books to collect and transmit important information.
Larry Lunetta Jan 14 2004 4:31PM Security
The Six Honest Men of Business Continuity Planning

The Six Honest Men of Business Continuity Planning

"I keep six honest serving men (They taught me all I knew); Their names are What and Why and When And How and Where and Who" (Rudyard Kipling, from ‘The Elephant’s Child’ in Just So Stories).
Keith Tilley Jan 14 2004 3:53PM Security
The Threat of Internet Worms

The Threat of Internet Worms

2001 was without any doubt the year of vulnerabilities.
Yona Hollander Jan 14 2004 3:47PM Security
A Practical and Realistic Approach for Testing the Performance of Firewalls: What Your Security Vendors Don't Want You to Know

A Practical and Realistic Approach for Testing the Performance of Firewalls: What Your Security Vendors Don't Want You to Know

While Internet security has always been important, only recently has it emerged as an important issue for almost all who use the Internet.
Johnson Wu, Jan 14 2004 3:01PM Security
The Politics of Vulnerabilities

The Politics of Vulnerabilities

In the last few months, debate over the ethics of disclosing details of vulnerabilities has been rekindled.
Scott S. Jan 14 2004 2:52PM Security
e-Security Threats aren't Just the Enemy of the Corporate

e-Security Threats aren't Just the Enemy of the Corporate

They may not have as many employees, generate the same size revenues or have the million-plus customer base of the large enterprises, but when it comes to Internet security, small and medium-sized businesses (SMEs) face exactly the same risks as larger organizations when they incorporate e-business and e-commerce into their traditional business models.
Ralph Shaw Jan 14 2004 2:48PM Security
Distributed Denial-of-Service Attacks - Hacker Tools of the Trade

Distributed Denial-of-Service Attacks - Hacker Tools of the Trade

The denial-of-service (DoS) attack is a common, recurring problem in networking, and recently, more and more companies are being caught out because of holes in their security infrastructure.
Paul Lawrence Jan 14 2004 2:45PM Security
Infosec is news in the year of the worm

Infosec is news in the year of the worm

This has been a very good year - especially for the hackers. Ben Rothke wonders if we have learned anything from the experience
Ben Rothke Jan 13 2004 5:13PM Security
Out of patience with exposed Windows

Out of patience with exposed Windows

How are CSOs coping with the growing burden of software patches? Julie Jervus sought the opinions of four practitioners with strong views on the matter
Julie Jervus Jan 13 2004 5:00PM Security
The fine art of deception

The fine art of deception

Attacks using social engineering techniques can be difficult to defend against, as Gunter Ollmann discovers.
Gunter Ollmann Jan 13 2004 4:10PM Security

Log In

  |  Forgot your password?