of

The Role of the Corporate Information Security Steering Committee

The Role of the Corporate Information Security Steering Committee

Organizations are becoming increasingly aware that if they fail to implement successful security management processes, it could expose them to untenable risk.
Tom Scholtz Jan 12 2004 11:27AM Security
Managing the Security of Data Flow

Managing the Security of Data Flow

Customer relationship management (CRM) systems are cited as one of the major technology successes of the last decade.
Diane Seddon Jan 12 2004 11:04AM Security
The New Age of e-Commerce

The New Age of e-Commerce

Three billion dollars.
Bob Lonadier Jan 12 2004 10:43AM Security
Tackling the Growing Problem of Online Identity Theft

Tackling the Growing Problem of Online Identity Theft

Catch Me If You Can isn’t just a fun film that hit the jackpot this spring.
Peter Jopling Jan 12 2004 10:05AM Security
Building the pillars of success for a security career

Building the pillars of success for a security career

There is a clear need today for experienced information systems security professionals, and increasing numbers of IT professionals are rushing into to fill the gap.
Jack Krichen Jan 9 2004 4:55PM Security
Control System Security in the Age of Cyberterrorism

Control System Security in the Age of Cyberterrorism

Power producers and utilities today face an unprecedented quantity of constraints upon their business operations.
Brian M. Jan 9 2004 4:49PM Security
Solving the Security Concerns of Flexible Working

Solving the Security Concerns of Flexible Working

IT security is the main barrier to the adoption of flexible working practices, according to a recent survey commissioned by Microsoft.
Bob Stream Jan 9 2004 4:33PM Security
The Art of War: Part 1

The Art of War: Part 1

"The art of war teaches us to rely not on the likelihood of the enemy’s not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have made our position unassailable." Sun Tzu, The Art of War
Darren Thomas Jan 9 2004 4:25PM Security
The Art of War: Part 2

The Art of War: Part 2

"If you know the enemy and know yourself, you need not fear the result of a hundred battles." Sun Tzu, The Art of War
Darren Thomas Jan 9 2004 4:13PM Security
The Art of War: Part 3

The Art of War: Part 3

"If you know the enemy and know yourself, you need not fear the result of a hundred battles." Sun Tzu, The Art of War
Darren Thomas Jan 9 2004 4:02PM Security
The Art of War: Part 4

The Art of War: Part 4

"Success in warfare is gained by carefully accommodating ourselves to the enemy's purpose. If the enemy shows an inclination to advance, lure him on to do so; if he is anxious to retreat, delay on purpose that he may carry out his intentions." Sun Tzu, The Art of War
Darren Thomas Jan 9 2004 3:55PM Security
The Art of War: Part 5

The Art of War: Part 5

"Though the enemy be stronger in numbers, we may prevent him from fighting. Scheme so as to discover his plans and the likelihood of their success. Rouse him, and learn the principle of his activity or inactivity. Force him to reveal himself, so as to find out his vulnerable spots." Sun Tzu, The Art of War
Darren Thomas Jan 9 2004 3:50PM Security
The Art of War: Part 6

The Art of War: Part 6

"Though the enemy be stronger in numbers, we may prevent him from fighting. Scheme so as to discover his plans and the likelihood of their success. Rouse him, and learn the principle of his activity or inactivity. Force him to reveal himself, so as to find out his vulnerable spots." Sun Tzu, The Art of War
Darren Thomas Jan 9 2004 3:37PM Security
The Myth of ROI: Not every expense is an investment

The Myth of ROI: Not every expense is an investment

Information security teams are under increasing pressure to demonstrate financial return on investment (ROI) for security projects.
Tom Scholtz Jan 9 2004 3:30PM Security
The growth of eBusiness Security

The growth of eBusiness Security

Ebusiness security has never been bigger business and industry experts agree that the best growth is yet to come.
Jane Murphy Jan 9 2004 3:27PM Security
The Art of War: Part 7

The Art of War: Part 7

Last month, we looked at just how easy it is for a hacker to gain entrance to an unprotected network.
Darren Thomas Jan 9 2004 3:22PM Security
Security as part of the strategic gameplan

Security as part of the strategic gameplan

A heightened awareness of security issues and the need to safeguard mission-critical, highly confidential data has catapulted security to the top of organisations’ agendas.
Jon Haynes Jan 9 2004 2:48PM Security
The Myth of Information Security ROI: Not Every Expense Is an "Investment"

The Myth of Information Security ROI: Not Every Expense Is an "Investment"

Information security teams are under increasing pressure to demonstrate financial return on investment (ROI) for security projects.
Tom Scholtz Jan 9 2004 2:46PM Security
The challenge of making enterprise management secure

The challenge of making enterprise management secure

There is a computer security mantra which says that the basic issues to manage are “ports, passwords and patches”.
John Alcock Jan 9 2004 2:00PM Security
A new generation of security solutions

A new generation of security solutions

Over the last few years, the nature of security solutions has been evolving to meet the growing and increasing nature of the IT security threat.
Staff Writers Jan 9 2004 1:49PM Security

Log In

  |  Forgot your password?