to

Managing Your Security Risks: Ten Questions to Ask Before the Next Product Demo

Managing Your Security Risks: Ten Questions to Ask Before the Next Product Demo

The year is still relatively young, which usually means that at some point, we all sit down either alone or with a group of trusted friends and colleagues, and make up lists of issues we intend to resolve over the course of the next 12 months.
Drew Williams Jan 19 2004 10:18AM Security
Linux not ready to kill Unix -- yet

Linux not ready to kill Unix -- yet

Despite the relentless march of Linux, major vendors believe commercial Unix releases aren't ready for the scrapheap yet.
Angus Kidman Jan 19 2004 12:00AM Software
My Personal Firewall: I Should Have Listened to It!

My Personal Firewall: I Should Have Listened to It!

You could actually title this article "Virus Alert - I just Got Nailed," Part Two. (The link to the first installment, published in December 2001, is www.infosecnews.com/opinion/2001/12/12_03.htm).
Jack Wiles Jan 16 2004 4:49PM Security
Protecting our Children - You Need to Read This!

Protecting our Children - You Need to Read This!

It's no secret that we now live in a world where technical changes are coming at us at an ever-increasing rate.
Jack Wiles Jan 16 2004 2:46PM Security
It Never Ceases to Amaze Me

It Never Ceases to Amaze Me

I think I’ve used that phrase in these columns before.
Peter Stephenson Jan 16 2004 1:34PM Security
SECURITY LIBRARY: CERT Guide to System and Network Security

SECURITY LIBRARY: CERT Guide to System and Network Security

CERT (www.cert.org) has released a comprehensive guide for protecting information systems.
Anton Chuvakin Jan 16 2004 1:04PM Security
Close the Door on Unwanted Guests: Keys to a Safe and Secure Wireless Network

Close the Door on Unwanted Guests: Keys to a Safe and Secure Wireless Network

As the benefits of a wireless local area network (WLAN) become more apparent, an increasing number of businesses are quick to adopt this technology.
Chris O’Ferrell Jan 16 2004 11:12AM Security
Authentication: From Passwords to Public Keys

Authentication: From Passwords to Public Keys

An exciting book on authentication, of all things?
Anton Chuvakin Jan 16 2004 11:01AM Security
To Hide or Not to Hide?

To Hide or Not to Hide?

Security through obscurity is always the subject of heated debate, although the relevant parties often wish it wasn’t, since no one likes their dirty laundry being aired in public.
Jon Tullett Jan 16 2004 10:55AM Security
Summer’s Long Days: Bouncing from Thought to Thought

Summer’s Long Days: Bouncing from Thought to Thought

Good old reliable time, not the Internet kind, does some flying.
Illena Armstrong Jan 16 2004 10:36AM Security
Taking a Realistic Approach to Remote Authentication

Taking a Realistic Approach to Remote Authentication

Just under a decade ago, I was asked to write a white paper on the future of telecommunications and networking for a major telecom company who shall remain nameless.
Steve Gold Jan 16 2004 9:53AM Security
Business Issues Relating to the Patriot Act

Business Issues Relating to the Patriot Act

Since its passage in October last year, everyone (in the U.S. at least) has heard of the Patriot Act (USAPA). It is 342 pages of reform extending the powers of international intelligence agencies and law enforcement organizations.
Thresa Lang Jan 15 2004 1:55PM Security
Smart ID Cards to Protect Citizen Privacy

Smart ID Cards to Protect Citizen Privacy

Secure identification of individuals within a country’s population is a fundamental and critical function for any population’s economic and moral well-being.
Bruno Lassus Jan 15 2004 11:12AM Security
It Could Never Happen to Us…

It Could Never Happen to Us…

Simply by operating on a day-to-day basis, companies are risking their reputations.
Graham Peat Jan 15 2004 11:11AM Security
Not Everything You Always Wanted to Know About Web Services Security

Not Everything You Always Wanted to Know About Web Services Security

Woody Allen, that famous web services guru and comedian on the side, once described James Joyce as “the most incomprehensible and hence the finest poet of his time.”
Throop Wilder Jan 15 2004 10:13AM Security
How to Get Boardroom Buy-in on Business Continuity

How to Get Boardroom Buy-in on Business Continuity

For the person responsible for business continuity (BC), getting board-level commitment can be the biggest obstacle to creating a process to manage an ongoing program of business continuity activities.
Staff Writers Jan 15 2004 10:09AM Security
Cyberliability: Turning the Spotlight to Internal IT Security

Cyberliability: Turning the Spotlight to Internal IT Security

Is your company data an asset or a threat?
Staff Writers Jan 14 2004 4:05PM Security
Companies Look to Long-Time Networkers to Combat Cyberthreats

Companies Look to Long-Time Networkers to Combat Cyberthreats

While it makes perfect sense that the United States FBI needs a comprehensive security strategy, many companies and organizations initially did not see the need for securing their intellectual assets.
Robert Blakley Jan 14 2004 3:51PM Security
What to Look for in a Web Application Protection System

What to Look for in a Web Application Protection System

The number of technology pundits decrying the state of Internet security has reached an unbearable level.
Abishek Chauhan Jan 14 2004 3:44PM Security
From Business Policy to Network Policy

From Business Policy to Network Policy

At the core of decisions about Internet access, monitoring and content filtering are business policies that specify where, when and how users will access web content.
Steve House Jan 14 2004 3:40PM Security

Log In

  |  Forgot your password?