securing

The evolution of a threat

The evolution of a threat

Exclusive extract from new book on securing web apps.
Michal Zalewski Dec 5 2011 1:45PM Security
Securing businesses is "extremely challenging", claim UK bosses

Securing businesses is "extremely challenging", claim UK bosses

British businesses are finding that protecting their organisations from hackers, social networking threats and browser vulnerabilities is an increasing struggle, according to research
Richard Thurston Jun 11 2008 11:00AM Security
From Interop: Securing Wi-Fi must be priority

From Interop: Securing Wi-Fi must be priority

As the use of Wi-Fi by businesses becomes more pervasive, IT departments must rethink their wireless security strategy to combat threats, a panel said Tuesday at the Interop conference in Las Vegas.
Dan Kaplan May 1 2008 10:36AM Security
Securing Wi-Fi must be priority

Securing Wi-Fi must be priority

As the use of Wi-Fi by businesses becomes more pervasive, IT departments must rethink their wireless security strategy to combat threats, a panel said Tuesday at the Interop conference in Las Vegas.
Dan Kaplan Apr 30 2008 2:19PM Security
Event describes importance of securing Web 2.0

Event describes importance of securing Web 2.0

The Secure Enterprise 2.0 Forum, which looked at the advantages and security risks of Web 2.0 technology use in the enterprise, debuted today in New York.
Greg Masters Apr 30 2008 10:12AM Security
Blue Coat covers security for Gold Coast Council

Blue Coat covers security for Gold Coast Council

Gold Coast City Council has deployed Blue Coat Systems’ ProxySG and ProxyAV appliances to provide Web security, policy control, reduce bandwidth consumption, speed application performance and protect against malware.
Lilia Guan Jan 21 2008 2:25PM Security
Weighing the options for securing back-up data

Weighing the options for securing back-up data

With the looming threats of publicly exposed personal data breaches, mishandled confidential partner information and lost intellectual property assets, an increasing number of enterprises are investigating options for securing data stored on both tape- and disk-based media.
Greg Farris, Sep 10 2007 3:03PM Security
Securing data in motion vs. data at rest? It’s the wrong question!

Securing data in motion vs. data at rest? It’s the wrong question!

Securing vital and sensitive corporate data is an ongoing and forefront concern for any organisation. However, recently there have been numerous vendor announcements for new products claiming to solve data security problems and compliance challenges by either protecting “data in motion” or “data at rest.”
David Shaw Jun 6 2007 10:40AM Security
Securing the future of information technology

Securing the future of information technology

Running parallel to the huge business benefits brought about by the ubiquitous and increasingly open-access use of computers are huge risks resulting from information security breaches.
Patrick Love, Head of Fiduciary Support, Global Wealth Sol Dec 15 2006 12:14PM Security
Debate: Client-side security is a much better way of securing infrastructure than securing the gateway

Debate: Client-side security is a much better way of securing infrastructure than securing the gateway

Paul Goossens Mar 8 2006 5:15PM Security
Los Alamos securing communications

Los Alamos securing communications

A team of Los Alamos scientists, in collaboration with researchers from the National Institute of Standards and Technology in Boulder, Colo., and Albion College, in Albion, Mich., have achieved quantum key distribution (QKD) at telecommunications industry wavelengths in a 50-kilometer (31 mile) optical fiber.
William Eazel Feb 21 2006 11:04AM Security
Securing IT is innovative thinking

Securing IT is innovative thinking

Nothing new is really going down in information security right now. At least that’s the take of some of SC’s Editorial Advisory Board members. There is no innovation, some say. The industry is stuck in a rut, say others. And it seems they’re not alone.
Illena Armstrong Jan 11 2006 8:50PM Security
Securing instant messaging

Securing instant messaging

It was only recently that IM was the preserve of teens and net-savvy companies. But like so many applications that start small, IM has made the leap from cool tool to useful business application. US analyst Gartner suggests that IM "will rival email in terms of both volume and ubiquity." In 2005 alone, it believes half of all companies will be using enterprise-level IM clients.
David Beesley Jul 6 2005 10:38AM Security
The challenge of securing VoIP

The challenge of securing VoIP

Voice over IP (VoIP) is rapidly becoming a pervasive technology as businesses embrace cost savings on calls whilst enjoying advanced communications applications sitting within the network.
John Porter Dec 21 2004 12:01PM Security
Eight steps to securing administrative passwords

Eight steps to securing administrative passwords

When password management comes to mind, most IT managers think of their own personal passwords or those of end users, which are used to access the company's network, sales database or e-mail systems.
Calum Macleod Dec 15 2004 12:27PM Security
Securing removable media

Securing removable media

Removable media devices are here to stay. Their ease of use and low cost have made them ubiquitous in the work environment – but at what price? In this article we look at the pro’s and con’s of removable media, and the steps IT managers can take to mitigate the security risks associated with them.
Magnus Ahlberg Nov 2 2004 4:25PM Security
Meeting the challenges of securing your business

Meeting the challenges of securing your business

Events in the news during the past few years have taught us all many lessons. However, the primary lesson that all businessmen should have learned, is the need to keep their businesses secure in an ever changing and increasingly malevolent world. From fears about Y2K to the tragic events of September 11, the need for heighten security is readily apparent. Heightened alert is a worldwide status.
Russell Sarder Jun 15 2004 12:21PM Security
Securing the Network Edge

Securing the Network Edge

In the evolution of communications networks, the lines between computing and networking have become less than clear.
Dan Taylor Jan 16 2004 9:49AM Security
Securing Enterprise Application Portals

Securing Enterprise Application Portals

A critical evaluation of success in today’s economy must be the ability to respond to an ever-increasing rate of change.
Tony Caine Jan 15 2004 12:09PM Security
Securing and Managing Electronic Messaging in the Enterprise

Securing and Managing Electronic Messaging in the Enterprise

The threats and problems posed by email in large and complex organizations are of a different type and scale of magnitude from the email problems that such organizations first solved with an email ‘point product’ some years previously.
Staff Writers Jan 15 2004 10:53AM Security

Log In

  |  Forgot your password?