to

International cooperation to catch cybercriminals is up

International cooperation to catch cybercriminals is up

International cooperation in cracking down on cybercrime has increased, said a computer crime specialist with the U.S. Department of Justice.
Marcia Savage Jan 20 2005 12:43AM Security
Time for a Sophisticated Approach to Security

Time for a Sophisticated Approach to Security

As a new year begins, we aspire to achieve more and worker harder. Those with more sinister agendas are no exception, namely - spammers and virus writers -and 2005 will see these people become more shrewd, more malicious, more sophisticated and more hungry for commercial gain.
Matt Peachey Jan 18 2005 3:58PM Security
Wibhu changes name to AirTight

Wibhu changes name to AirTight

Staff Writers Jan 14 2005 5:04PM Security
NitroData adds to its team

NitroData adds to its team

Staff Writers Jan 14 2005 5:04PM Security
Endforce plans to expand its market reach

Endforce plans to expand its market reach

Staff Writers Jan 14 2005 5:03PM Security
Bill proposes to protect Social Security details

Bill proposes to protect Social Security details

Staff Writers Jan 14 2005 5:02PM Security
A virus to suit all of your tastes

A virus to suit all of your tastes

Staff Writers Jan 14 2005 5:01PM Security
Gmail reveals secrets to hackers

Gmail reveals secrets to hackers

People sending emails to Gmail accounts may find they reveal more than they bargained for. A bug within Google mail service allows hackers to reveal details of other users’ personal emails, and even their account passwords.
David Quainton Jan 13 2005 12:10PM Security
Storage is key to security

Storage is key to security

Ten things to know when selecting a storage security solution.
Steve Wllson Jan 11 2005 1:02PM Security
Time to change the way people look at infosec

Time to change the way people look at infosec

Staff Writers Jan 11 2005 1:01PM Security
Web browsers battling it out to be number one

Web browsers battling it out to be number one

Nick Barron Jan 11 2005 12:22PM Security
Are you sitting next to a criminal?

Are you sitting next to a criminal?

Computer criminals could be working next to you every day, yet be stealing from your business.
Kathleen O'Connor Jan 11 2005 12:10PM Security
Symantec-Veritas merger no surprise to industry

Symantec-Veritas merger no surprise to industry

Marcia Savage Jan 11 2005 11:18AM Security
Educause and CIS in joint offering to colleges

Educause and CIS in joint offering to colleges

Staff Writers Jan 10 2005 5:00PM Security
Banks failing to tackle email phishing attacks

Banks failing to tackle email phishing attacks

David Quainton Jan 10 2005 4:53PM Security
Bill to create new cybersecurity post reintroduced

Bill to create new cybersecurity post reintroduced

Lawmakers have reintroduced a bill to create an assistant secretary for cybersecurity position in the Department of Homeland Security.
Marcia Savage Jan 7 2005 4:56PM Security
Closing the door to web hackers

Closing the door to web hackers

More organizations are turning to remote access to boost productivity, but this makes them more vulnerable to malicious attacks. Check Point’s Niall Moynihan looks at how to go about protecting your web services
Niall Moynihan Jan 7 2005 11:47AM Security
Intel to offer new chip management control

Intel to offer new chip management control

Intel is taking out-of-band technology to the chip level.

Staff Writers Dec 29 2004 9:59AM Hardware
Government urged to clarify roles

Government urged to clarify roles

Microsoft is calling for the government to change its ways, reports Jon Tullett
Jon Tullett Dec 18 2004 9:39PM Security
CFO responsibility to fund log analysis for Sarbanes-Oxley compliance

CFO responsibility to fund log analysis for Sarbanes-Oxley compliance

Corporations responsible for complying with Sarbanes-Oxley, face great hurdles with a basic compliance objective: analysis of their (server and security device) event logs. Some do not for lack of awareness, and others because of the difficulty (and cost) of performing the analysis. Further, issuers erroneously place the cost burden of SOX compliance on the IT security department, when the costs should be borne by the CFO’s SOX compliance budget.
Ron Lepofsky Dec 15 2004 12:27PM Security

Log In

  |  Forgot your password?