or

Spyware – a nuisance or a real threat?

Spyware – a nuisance or a real threat?

Spyware is a term whose use is becoming increasingly frequent in the lexicon of internet security threats. Just as computer users begin to think that their systems are protected against current menaces – various types of computer malware and spam, etc, so they are faced with yet another challenge. But just how big a threat is spyware for the corporate and home computer user today?
Matthieu Brignon Jul 6 2004 4:30PM Security
Training, certification or experience? A security dilemma.

Training, certification or experience? A security dilemma.

People who complain about certifications really get me wound up - especially when they hold no certifications of their own but do hold positions where they can wield power against people who have them. I suppose it could be argued that some people can buy their certifications, but on the whole a lot of hard work is required to pass exams and it is on this very topic that my tale begins.
Lannon Rowan Jun 22 2004 10:03AM Security
Third party or third rate?

Third party or third rate?

Gunter Ollmann shows why each organization should assess the security of its third-party hosting providers
Gunter Ollmann May 20 2004 3:47PM Security
Linux or Windows: Which is more vulnerable?

Linux or Windows: Which is more vulnerable?

After examining security vulnerability data over the last year, Forrester Research has determined that both Windows and Linux can be deployed securely, but vendors need to ensure they address several criteria to make this process easier.
Illena Armstrong Apr 6 2004 10:05PM Security
Telstra Fairfax buyout, fact or furphy?

Telstra Fairfax buyout, fact or furphy?

Staff Writers Feb 18 2004 12:00AM Telco/ISP
The big decision: To outsource or not?

The big decision: To outsource or not?

Market analysts predict that more of us will be outsourcing the IT security function over the next few years. In our latest Roundtable discussion, Julie Jervis hears the views and advice of four infosec professionals
Julie Jervis Jan 22 2004 11:40AM Security
To Hide or Not to Hide?

To Hide or Not to Hide?

Security through obscurity is always the subject of heated debate, although the relevant parties often wish it wasn’t, since no one likes their dirty laundry being aired in public.
Jon Tullett Jan 16 2004 10:55AM Security
Centrally Managed Network Security: Hope or Reality?

Centrally Managed Network Security: Hope or Reality?

Ask any IT professional to predict the future of computer networking and you will get different answers.
Dan Thomsen Jan 15 2004 11:40AM Security
Rules or Signatures?

Rules or Signatures?

As the industry increasingly moves towards the adoption of new preventative security products, an interesting debate has arisen as a consequence.
Iain Franklin Jan 15 2004 11:38AM Security
Microsoft XP - Solving Security Concerns or Still a Liability?

Microsoft XP - Solving Security Concerns or Still a Liability?

Microsoft's Windows XP operating system has arrived amid a multi-million dollar worldwide marketing fanfare the like of which we rarely see.
Paul Barker Jan 14 2004 2:37PM Security
Signature-Based or Anomaly-Based Intrusion Detection: The Practice and Pitfalls

Signature-Based or Anomaly-Based Intrusion Detection: The Practice and Pitfalls

Intrusion detection has become big business on the Internet and, to be honest, it's not surprising.
Arnt Brox Jan 14 2004 1:23PM Security
Making the right connection: Which VPN - SSL, IPsec or both?

Making the right connection: Which VPN - SSL, IPsec or both?

What does the future hold for secure virtual private networks? Illena Armstrong gazes into her crystal ball to look for the answer.
Illena Armstrong Jan 13 2004 4:03PM Security
Revolution or evolution?

Revolution or evolution?

New technology brings with it new problems. For mobiles devices it is security. Bob Heard looks back for answers
Bob Heard Jan 13 2004 11:18AM Security
Real risk or shadow? The threat of cyberterrorism

Real risk or shadow? The threat of cyberterrorism

Digital attacks often mirror attacks in the real world. Illena Armstrong asks if they are inevitable and how to respond.
Illena Armstrong Jan 13 2004 10:38AM Security
Biometrics - Problem or Solution?

Biometrics - Problem or Solution?

Biometrics is a security approach that offers great promise, but also presents users and implementers with a number of practical problems.
Steve Mathews Jan 12 2004 3:32PM Security
Content Security - DIY or ISP?

Content Security - DIY or ISP?

As the market for content security products and services continues to grow, it is interesting to compare and contrast the delivery of content security via ‘insourcing’ and outsourcing.
Staff Writers Jan 12 2004 12:41PM Security
Business Continuity and Risk Management: Distant Cousins or Partners in Crime?

Business Continuity and Risk Management: Distant Cousins or Partners in Crime?

In a post 9/11 environment, the terms business continuity and risk management are becoming common parlance within a wide range organizations.
Dave Birch Jan 12 2004 10:13AM Security
IT pros: cash or lifestyle?

IT pros: cash or lifestyle?

IT professionals are increasingly looking at flexible working conditions - rather than just money - when deciding on jobs, according to a recent survey.
Vivienne Fisher Oct 30 2003 12:00AM Training & Development
Spammers or hackers?

Spammers or hackers?

Byron Connolly Jan 1 2000 12:00AM Telco/ISP
Specialise – or go bust

Specialise – or go bust

Fleur Doidge Jan 1 2000 12:00AM Software

Log In

  |  Forgot your password?