to

One tool to rule them all

One tool to rule them all

The box that can multitask isn’t just a jack of all trades – it has much to offer, finds René Millman
René Millman Jul 1 2005 11:09AM Security
Four steps to business continuity

Four steps to business continuity

Complex business continuity plans just don’t work, warns Jonathan Gossels. So keep it simple
Jonathan Gossels, Jun 29 2005 5:01PM Security
Big phish to fry

Big phish to fry

Phishing is as lucrative as it is prolific. According to the latest official figures from UK payments body, APACS, phishing scams and Trojan keystroke loggers were behind UK online bank fraud totalling £12m in 2004; while BlackSpider Technologies estimates that nearly seven million phishing emails have been sent across the UK in the last month alone.
John Cheney, Jun 29 2005 10:31AM Security
Pod slurping threat to company data

Pod slurping threat to company data

A security researcher has warned how easy it is to copy vast amounts of confidential files using an iPod, a small copying program and some social engineering.
René Millman Jun 24 2005 4:35PM Security
Insider attack now biggest threat to banks

Insider attack now biggest threat to banks

Insider attacks have become the biggest threat to financial networks, according to a new study.
René Millman Jun 23 2005 2:39PM Security
It’s not just home users who are to blame

It’s not just home users who are to blame

Illena Armstrong Jun 21 2005 12:49PM Security
Network Appliance to buy Decru in $272 million deal

Network Appliance to buy Decru in $272 million deal

Data storage supplier Network Appliance has agreed to buy storage security firm Decru for $272 million in cash and stock.
Marcia Savage Jun 16 2005 9:59PM Security
Try to turn SOX into an opportunity

Try to turn SOX into an opportunity

Lloyd Hession Jun 16 2005 4:36PM Security
Another cold war is about to start

Another cold war is about to start

It’s becoming clear that spyware will be one of the biggest problems facing users and companies. But, writes René Millman, you can fight back
René Millman Jun 16 2005 12:26PM Security
Vigilar inks deal to acquire Intense School

Vigilar inks deal to acquire Intense School

Vigilar, an Atlanta-based information security consulting company, has agreed to acquire IT and security training firm Intense School.
Marcia Savage Jun 15 2005 10:20PM Security
Federal agencies need to bolster efforts against new threats

Federal agencies need to bolster efforts against new threats

Emerging threats such as phishing and spyware pose hazards to federal IT systems and more needs to be done to protect them, according to a report released Monday by the Government Accountability Office.
Marcia Savage Jun 14 2005 2:18PM Security
(ISC)2 kicks off program to support local infosec groups

(ISC)2 kicks off program to support local infosec groups

The International Information Systems Security Certification Consortium - (ISC)2 - has launched a pilot program to provide local networking and professional growth opportunities for its members.
Marcia Savage Jun 10 2005 9:41PM Security
Microsoft plans to release 10 security updates

Microsoft plans to release 10 security updates

Microsoft plans next week to release 10 security bulletins, including some rated as critical for Windows.
Marcia Savage Jun 9 2005 11:25PM Security
EL AL dumps IDS in bid to stop DoS attacks

EL AL dumps IDS in bid to stop DoS attacks

Israel's airline El Al has replaced all its intrusion detection systems with intrusion prevention appliances - a move it says has cut the threat of worm and denial-of-service attacks.
Ron Condon Jun 9 2005 3:51PM Security
Password safety 'foreign' to most staff

Password safety 'foreign' to most staff

Nearly half of all IT managers have major concerns about the level of password management within their company, a report has revealed.
David Quainton Jun 9 2005 2:57PM Security
North Korea poised to attack U.S.

North Korea poised to attack U.S.

North Korea is ready to launch an army of well-trained hackers on the U.S., according to a military expert.
David Quainton Jun 3 2005 2:40PM Security
The roadmap to identity management

The roadmap to identity management

What does Identity and Access Management (I&AM) really mean to a business? The answer varies depending on who you talk to. For example, consider the viewpoints of the three board-level people most directly involved in decisions on any I&AM investment: the CEO, CFO, and CIO/CTO.
Stuart Okin Jun 3 2005 12:27PM Security
AEP Networks to acquire SSL VPN firm

AEP Networks to acquire SSL VPN firm

Aiming to broaden its reach into the public-sector market, AEP Networks has agreed to acquire V-ONE, a maker of SSL VPN products.
Marcia Savage May 23 2005 9:33PM Security
Fed ex delivered to Microsoft

Fed ex delivered to Microsoft

Microsoft has hired a special agent as its new chief security advisor in the UK.
Rajneet Ryatt May 20 2005 4:19PM Security
Companies fail to lock the IM backdoor

Companies fail to lock the IM backdoor

Nearly two-thirds of companies are totally unprotected against the risks of Instant Messaging (IM) misuse, according to a new study.
David Quainton May 16 2005 3:22PM Security

Log In

  |  Forgot your password?