on

Put the Plug on those Productivity Drains and Turn On the Taps of Efficiency

Put the Plug on those Productivity Drains and Turn On the Taps of Efficiency

While companies understand that they need to protect themselves and their employees against content security threats (such as the circulation of inappropriate material, litigation, spam, loss or corruption of data, viruses and malicious code), they also need to consider how email and web security can boost productivity.
Alyn Hockey Jan 19 2004 10:40AM Security
You've Got a Whole Lot to Lose On the Web

You've Got a Whole Lot to Lose On the Web

Cyberattacks are not only coming from diverse parts of the world, but, compared to years past, they are hitting their targets more and more frequently these days.
Illena Armstrong Jan 19 2004 10:39AM Security
Mimail takes on a new disguise

Mimail takes on a new disguise

The Mimail worm is circulating the internet under a new guise.
Dan Ilett Jan 16 2004 4:42PM Security
Close the Door on Unwanted Guests: Keys to a Safe and Secure Wireless Network

Close the Door on Unwanted Guests: Keys to a Safe and Secure Wireless Network

As the benefits of a wireless local area network (WLAN) become more apparent, an increasing number of businesses are quick to adopt this technology.
Chris O’Ferrell Jan 16 2004 11:12AM Security
The ‘Risk Gap’: Business Perspectives on Security

The ‘Risk Gap’: Business Perspectives on Security

The dramatic rise in the pace and sophistication of cyberattacks is resulting in real financial and operational losses to major corporations.
Bruce Murphy Jan 16 2004 10:58AM Security
Calculating PKI Return on Investment - Why Is It So Difficult?

Calculating PKI Return on Investment - Why Is It So Difficult?

Companies invest millions of dollars into public key infrastructure (PKI) products and services; yet demonstrating a return on that investment can prove difficult.
Robert Lonadier Jan 16 2004 10:18AM Security
Looking for Security Problems, Focus on Organizational Fault Lines

Looking for Security Problems, Focus on Organizational Fault Lines

While it is hard to argue that the general level of security competence is increasing and better security tools are available every day, why is it that security remains a problem?
Mark K. Jan 16 2004 10:17AM Security
Mobile Security: New Needs on New Devices

Mobile Security: New Needs on New Devices

As personal digital assistants become more powerful and merge with wireless technology, new means are necessary to ensure the security of such devices as well as the enterprise network they are participating in.
Richard Aufreiter Jan 16 2004 9:47AM Security
Do It Yourself Security: Cutting Our Umbilical Dependence on the Consultant Community

Do It Yourself Security: Cutting Our Umbilical Dependence on the Consultant Community

A long while ago I had a business card identity that branded me as a Security Export Consultant.
Melisa LaBancz-Bleasdale Jan 15 2004 1:26PM Security
How to Get Boardroom Buy-in on Business Continuity

How to Get Boardroom Buy-in on Business Continuity

For the person responsible for business continuity (BC), getting board-level commitment can be the biggest obstacle to creating a process to manage an ongoing program of business continuity activities.
Staff Writers Jan 15 2004 10:09AM Security
New Technology Cracks Down on ID Theft?

New Technology Cracks Down on ID Theft?

For the second time in four years, the U.S. General Accounting Office reported identity theft as the fastest growing crime in America, with businesses and consumers losing billions of dollars to identity thieves.
Larry Gilbert Jan 14 2004 4:33PM Security
Information Security on The Internet

Information Security on The Internet

In the aftermath of the September 11 terrorist events in the United States, the fear that malevolent hackers and other criminal perpetrators might unleash a cyberattack on the Internet is becoming an increasing concern.
Jason B. Jan 14 2004 2:49PM Security
Hacker Repellent: Deterring Hackers on a Shoestring Budget

Hacker Repellent: Deterring Hackers on a Shoestring Budget

Today, hackers scan and probe sites of all sizes to find those most vulnerable to e-shoplifting, data theft or portals to access broader attacks.
Amit Klein Jan 14 2004 1:21PM Security
Blocking attacks on applications

Blocking attacks on applications

Web services may be critical for business but leave you wide open to attack. Abhishek Chauhan looks at protection techniques
Abhishek Chauhan Jan 13 2004 2:25PM Security
On your marks: Get set for the next IT hurdle

On your marks: Get set for the next IT hurdle

Memories of Y2K may have faded, but, says Steve Gold, another challenge could be just around the corner.
Steve Gold Jan 13 2004 1:03PM Security
An Industry Built on Sand?

An Industry Built on Sand?

Forensic information is of paramount importance to the security professional.
Iain Franklin Jan 12 2004 3:45PM Security
Netilla to take on Europe

Netilla to take on Europe

SSL VPN firm Netilla has chosen provider Wick Hill to be its European distributor to strengthen its hold on the secure remote access market.
Dan Ilett Jan 12 2004 3:21PM Security
Crying Wolf on Cyberterrorism?

Crying Wolf on Cyberterrorism?

Terrorism (n): the systematic use of violence as a means to intimidate or coerce societies or governments.
Jon Tullett Jan 12 2004 2:35PM Security
Hints and Tips on Securing your Mobile Workforce

Hints and Tips on Securing your Mobile Workforce

So you have a mobile workforce, you have invested in laptops, PDAs, mobiles and smartphones and your staff are out there chasing and winning business.
Kurt Lennartsson Jan 12 2004 1:30PM Security
On the Offensive over Identity Theft

On the Offensive over Identity Theft

Catch Me If You Can isn’t just a hit at the movies this winter.
Jeff Drake Jan 12 2004 1:28PM Security

Log In

  |  Forgot your password?