of

The masters of disguise: Do you know who your users are?

The masters of disguise: Do you know who your users are?

Illena Armstrong looks at the complex and challenging task of managing identities over today’s distributed company systems.
Illena Armstrong Jan 13 2004 3:57PM Security
Policy that lives: Enforcing security in spite of the users

Policy that lives: Enforcing security in spite of the users

Creating a security policy may be hard, says Illena Armstrong, but making sure that users comply is always the biggest problem
Illena Armstrong Jan 13 2004 3:22PM Security
Sinking in a sea of spam

Sinking in a sea of spam

Tired of email porn and body enhancement offers? John Young suggests using secure content management to halt the tidal wave.
John Young Jan 13 2004 3:19PM Security
Reducing the stream of false positives

Reducing the stream of false positives

Ray Zadjmool explores a solution to the number of false positives specifically created by the use of Windows Media Player
Ray Zadjmool Jan 13 2004 2:40PM Security
The language of the market

The language of the market

Customers and partners need access to your systems. Roger Sullivan says XML can provide the security to make it happen.
Roger Sullivan Jan 13 2004 2:36PM Security
Danger money: The challenge of risk management

Danger money: The challenge of risk management

There is always a trade-off between security needs and economics. Richard Starnes asks how businesses can strike the right balance.
Richard Starnes Jan 13 2004 12:46PM Security
Witches’ brew of concerns

Witches’ brew of concerns

The next 12 months could be a crunch time for infosecurity. So Illena Armstrong asked some experts how the cookie might crumble
Illena Armstrong Jan 13 2004 11:52AM Security
Get qualified: Certification - that’s the name of the game

Get qualified: Certification - that’s the name of the game

There is an increasing range of valuable qualifications that an information security expert can gain, says Marcia Savage
Marcia Savage Jan 13 2004 11:28AM Security
Real risk or shadow? The threat of cyberterrorism

Real risk or shadow? The threat of cyberterrorism

Digital attacks often mirror attacks in the real world. Illena Armstrong asks if they are inevitable and how to respond.
Illena Armstrong Jan 13 2004 10:38AM Security
A Healthy Dose of Security Skepticism

A Healthy Dose of Security Skepticism

No security system is perfect. Never believe that you have solved your security problems or eliminated a specific security threat.
Landon Curt Jan 12 2004 3:48PM Security
New Blends of Email Threats

New Blends of Email Threats

Email-borne threats continue to evolve and have started to combine in new and dangerous ways.
Pete Simpson Jan 12 2004 3:25PM Security
Communicating the Language of Information Security

Communicating the Language of Information Security

“When I use a word,” Humpty Dumpty said, in a rather scornful tone, “it means just what I choose it to mean - neither more nor less.” Lewis Carroll, Through the Looking Glass
Dan Houser Jan 12 2004 2:43PM Security
Microsoft and the Return of PKI

Microsoft and the Return of PKI

Many businesses have written off public key infrastructure (PKI) as a dead technology.
Robert Lonadier Jan 12 2004 2:21PM Security
The Five Critical Stages of Policy Management

The Five Critical Stages of Policy Management

A series of recent bloody court battles, well-documented in the press, have highlighted the importance of clear policies governing the use of an organization’s information systems.
Nathan Millard Jan 12 2004 1:43PM Security
Preventing Fraud Online: Digital Fingerprinting of PCs

Preventing Fraud Online: Digital Fingerprinting of PCs

Fraud is a serious problem in today’s online world.
Diana Kelley Jan 12 2004 1:33PM Security
The Economic Return of Security

The Economic Return of Security

Security, physical, cyber, and otherwise, is on everyone’s mind these days.
Robert Lonadier Jan 12 2004 1:06PM Security
Patch Management - The Foundation of IT Security

Patch Management - The Foundation of IT Security

The widespread impact of the SQL Slammer worm in January 2003 highlighted an issue that most security professionals see as a basic fact - IT system security is not based on a single installation, but on an ongoing management of risks and vulnerabilities.
Paul Collins Jan 12 2004 12:48PM Security
Meeting the Challenge of Identity Management: The Role of VPNs and Biometric Authentication

Meeting the Challenge of Identity Management: The Role of VPNs and Biometric Authentication

Organizations are increasingly being asked to provide staff with remote access to corporate systems.
Ken Douglas Jan 12 2004 12:25PM Security
Jurassic Park, the Insurance Model and the Economic Return of Security

Jurassic Park, the Insurance Model and the Economic Return of Security

Remember Jurassic Park? In both the novel and the movie versions, the dinosaurs quickly adapted to their new surroundings, thwarting all attempts by the humans at controlling their evolutionary destiny.
Robert Lonadier Jan 12 2004 11:45AM Security
Business Leaders and IT Security – Will the Two Ever Have a Meeting of Minds?

Business Leaders and IT Security – Will the Two Ever Have a Meeting of Minds?

Those responsible for IT security are constantly complaining that they can’t get the budget they need, but are they going about it the wrong way?
Andre Armstrong Jan 12 2004 11:30AM Security

Log In

  |  Forgot your password?