to

What it comes down to is risk

What it comes down to is risk

Any good information security program should always relate to the business case and its tolerance for risk. The risk tolerance of an organization is the baseline that the program should address, including any additional legal requirements.
Kevin Dickey, Apr 18 2005 12:45PM Security
Small biz calls for ISPs to fight hackers

Small biz calls for ISPs to fight hackers

Three-quarters of SMEs want ISPs to protect them from hackers and viruses according to a new survey.
René Millman Apr 18 2005 12:11PM Security
UC Berkeley to lead cybersecurity research center

UC Berkeley to lead cybersecurity research center

The National Science Foundation plans to establish a collaborative cybersecurity research center led by the University of California, Berkeley.
Marcia Savage Apr 12 2005 5:04PM Security
Critical Microsoft patches ready to roll

Critical Microsoft patches ready to roll

Microsoft is to issue its latest patch update on Tuesday and has already warned users that some are rated critical.
David Quainton Apr 8 2005 4:47PM Security
UC Berkeley chancellor vows to reform security

UC Berkeley chancellor vows to reform security

After the theft of a laptop containing personal information of thousands of graduate students, alumni, and applicants, University of California Berkeley Chancellor Robert Birgeneau has promised tighter data security.
Marcia Savage Apr 6 2005 4:44PM Security
To catch a thief?

To catch a thief?

When we turn our minds to matters of e-security, our first thoughts tend to be about defenses such as firewalls and intrusion detection. And rightly so. After all, there is much wisdom in the pursuit of prevention before cure. But, what happens when our defenses are breached? How should we respond to such an incident?
Robert Brown Apr 6 2005 3:06PM Security
SP2: Coming to an enterprise near you - soon

SP2: Coming to an enterprise near you - soon

Microsoft has hit back at reports businesses are shunning SP2, claiming that the current trend of uptake is very positive.
David Quainton Apr 6 2005 9:31AM Security
Laptop security left to employees

Laptop security left to employees

European IT managers are leaving laptop security in the hands of employees according to a new study.
René Millman Apr 5 2005 5:32PM Security
£2.45bn lost to cybercrime in UK

£2.45bn lost to cybercrime in UK

UK companies lost a total of £2.45bn to e-crime according to new figures from the National Hi-Tech Crime Unit (NHTCU).
René Millman Apr 5 2005 4:59PM Security
Mozilla pays bounty to bug finder

Mozilla pays bounty to bug finder

The Mozilla Foundation has awarded $2,500 to German security researcher as part of its bug bounty program.
René Millman Mar 31 2005 2:15PM Security
Juniper acquires Kagoor to boost VoIP security

Juniper acquires Kagoor to boost VoIP security

Juniper Networks has agreed to acquire Kagoor Networks, a supplier of session border control (SBC) technology, for $67.5 million in cash.
Marcia Savage Mar 31 2005 12:54AM Security
Feinstein calls for more laws to prevent identity theft

Feinstein calls for more laws to prevent identity theft

In the wake of the latest security breach compromising personal data, U.S. Sen. Dianne Feinstein (D-Calif.) joined law enforcement, consumer groups and identity theft victims to urge Congress to beef up protection of people's confidential data.
Marcia Savage Mar 30 2005 8:20PM Security
Blaster writer won't have to pay restitution

Blaster writer won't have to pay restitution

The teenager responsible for the Blaster worm will not have to pay $500,000 restitution to Microsoft after releasing a variant of the worm that attacked Microsoft's website.
René Millman Mar 30 2005 5:17PM Security
Rising number of phishers are turning to pharming

Rising number of phishers are turning to pharming

Phishers increasingly are relying on more advanced methods to steal personal information.
Illena Armstrong Mar 28 2005 11:17PM Security
Arbor Networks spearheads telecom alliance to block attacks

Arbor Networks spearheads telecom alliance to block attacks

Arbor Networks is spearheading an information-sharing alliance between telecommunications giants that aims to thwart denial-of-service and other cyberattacks.
Marcia Savage Mar 28 2005 5:29PM Security
Industry, law enforcement must team up to stop breaches

Industry, law enforcement must team up to stop breaches

Government agencies, financial services companies, data aggregators, and other firms must do a better job combatting identity theft, according to an IT industry group.
Illena Armstrong Mar 25 2005 6:55PM Security
Banks advised to notify customers of data breaches

Banks advised to notify customers of data breaches

The Federal Reserve Board has issued guidance that calls on financial institutions to notify customers of security breaches involving their sensitive data.
Marcia Savage Mar 25 2005 5:30PM Security
DDoS teens may have to sulk in jail

DDoS teens may have to sulk in jail

The FBI has arrested two teenagers in connection with a distributed denial of service (DDoS) attack against a New Jersey sporting goods firm.
David Quainton Mar 23 2005 2:45PM Security
IBM does not send spam back to spammers

IBM does not send spam back to spammers

IBM today launched a new technology aimed at combating spam. Some reports have claimed FairUCE (Fair use of unsolicited commercial email) bounces back spam emails to the IP address they were sent, a practise intended to slow the offending computers down, in fact the system works very differently.
David Quainton Mar 23 2005 11:43AM Security
Top U.S. companies to hit SC Forum

Top U.S. companies to hit SC Forum

IT security executives and CIOs from such companies as Williams-Sonoma, Electrolux and Avaya will be attending the upcoming SC Forum.
From Staff Mar 22 2005 2:14PM Security

Log In

  |  Forgot your password?