risk

Vulnerabilities put Asterisk telephone systems at risk

Vulnerabilities put Asterisk telephone systems at risk

A leading penetration testing vendor announced today that it found three vulnerabilities that put enterprise telephone infrastructure critically at risk.
Ericka Chickowski Jun 12 2006 5:31AM Security
From the SC Forum: Content employees less of a risk

From the SC Forum: Content employees less of a risk

Employees who report high job satisfaction are less likely to become insider threats, a speaker said Tuesday at the SC Forum in Hilton Head Island, S.C.
Dan Kaplan May 17 2006 7:09PM Security
Reduce risk through vendor onus

Reduce risk through vendor onus

Many of us are struggling to extend security responsibility and accountability to third-party vendors and outsourcing companies.
Richard Lawhorn May 10 2006 8:05PM Security
Handle risk better and reap the rewards

Handle risk better and reap the rewards

It’s been a busy month. By the time you read this, three highlights of the infosec year will have passed in quick succession: Infosecurity Europe, Jericho Forum’s annual conference and, of course, the SC Magazine Awards, Europe 2006. If you weren’t there on the night, the full list of winners and finalists is enclosed with this issue in the commemorative book of the night. Congratulations to all those who went home with one of the coveted gongs.
Paul Fisher May 9 2006 4:23PM Security
Reducing risk of online ID theft

Reducing risk of online ID theft

The total cost of U.S. identity fraud in 2004 was $52.6 billion, with 11.6 percent of stolen identity information obtained online, according to Javelin Strategy & Research and the Better Business Bureau. The proliferation of online applications providing access to confidential identity data has magnified vulnerabilities that are not adequately addressed by traditional network security techniques. The following policies, procedures and systems are recommended to implement a security program for online applications.
Bruce Pharr Apr 14 2006 8:14PM Security
Cast the runes to assess future risk

Cast the runes to assess future risk

As a keen future-gazer, I'm often asked how I justify spending time on all this crystal-ball nonsense. Surely it can't be relevant to my day-to-day work? And clearly it's impossible to predict the future.

David Lacey, Nov 10 2005 4:19PM Security
Evil spammers put lives at risk with bogus bird flu vaccines

Evil spammers put lives at risk with bogus bird flu vaccines

Security experts have slammed unprincipled spammers for putting the lives of innocent people at risk by peddling bogus drugs online that claim to combat bird flu.
William Eazel Oct 28 2005 11:40AM Security
Risk is all about keeping control

Risk is all about keeping control

Stuart Okin Oct 21 2005 4:48PM Security
270,000 at risk after USC hack

270,000 at risk after USC hack

The University of Southern California (USC) has warned 270,000 applicants their personal information may have been compromised after its systems were hacked.
David Quainton Jul 20 2005 11:46AM Security
Google turns into ugly security risk monster

Google turns into ugly security risk monster

Google’s email policy and rapid growth is making it the security risk of the century, an expert is warning.
David Quainton Jul 18 2005 4:22PM Security
We are dead wrong about risk

We are dead wrong about risk

Peter Stephenson,CeRNS, Jul 1 2005 2:02PM Security
Federal agencies at risk over IPv6

Federal agencies at risk over IPv6

Most major federal agencies have not begun planning to transition to Internet Protocol Version 6 (IPv6), putting agency information and systems at risk, according to a report from the U.S. Government Accountability Office.
Marcia Savage Jun 30 2005 10:52AM Security
Is risk an overused buzzword?

Is risk an overused buzzword?

Peter Stephenson,CeRNS, Jun 21 2005 11:10AM Security
Risk associated with outbound email spurs corporate monitoring

Risk associated with outbound email spurs corporate monitoring

Sixty-three percent of companies with 1,000 or more employees use or plan to use staff to read outgoing email, according to a survey by email security supplier Proofpoint.
Marcia Savage Jun 6 2005 7:40PM Security
Risk is the one constant

Risk is the one constant

Peter Stephenson,CeRNS, May 13 2005 11:56AM Security
How do you measure risk? - Tell SC Magazine

How do you measure risk? - Tell SC Magazine

What's your company's approach to risk? How do you measure it? We'd like to hear from you.
Ron Condon Apr 28 2005 1:18PM Security
GAO: Weak IRS security puts taxpayer data at risk

GAO: Weak IRS security puts taxpayer data at risk

A lack of proper information security controls at the Internal Revenue Service puts taxpayer and other sensitive data at risk, according to a report issued by the General Accountability Office (GAO).
Marcia Savage Apr 18 2005 5:38PM Security
What it comes down to is risk

What it comes down to is risk

Any good information security program should always relate to the business case and its tolerance for risk. The risk tolerance of an organization is the baseline that the program should address, including any additional legal requirements.
Kevin Dickey, Apr 18 2005 12:45PM Security
1.2m BofA customers at risk of identity theft

1.2m BofA customers at risk of identity theft

Bank of America (BofA) said computer tapes containing U.S. federal government customer information were lost during a shipment to a backup data center.
Marcia Savage Feb 28 2005 4:23PM Security
Software sales at risk with multiple core PCs

Software sales at risk with multiple core PCs

Software prices could skyrocket to unaffordable levels for many users in coming years as computer hardware evolves to multiple core models, a Gartner analyst has claimed.
Fleur Doidge Nov 30 2004 12:00AM Hardware

Log In

  |  Forgot your password?