to

A Practical and Realistic Approach for Testing the Performance of Firewalls: What Your Security Vendors Don't Want You to Know

A Practical and Realistic Approach for Testing the Performance of Firewalls: What Your Security Vendors Don't Want You to Know

While Internet security has always been important, only recently has it emerged as an important issue for almost all who use the Internet.
Johnson Wu, Jan 14 2004 3:01PM Security
VeriSign tagged to manage RFID

VeriSign tagged to manage RFID

Digital identity firm VeriSign has been chosen to manage a global directory for radio-frequency identification (RFID) product numbers.
Dan Ilett Jan 14 2004 2:28PM Security
Untangling Security Issues to Enable Web-based Email Access

Untangling Security Issues to Enable Web-based Email Access

Today's users consider email a major component of their business and personal communications, and demand the convenience of email access from any location at any time.
Joseph Steinberg Jan 14 2004 1:29PM Security
Using File Hashes to Reduce Forensic Analysis

Using File Hashes to Reduce Forensic Analysis

The "hashkeeper" paradigm or model was first introduced a number of years ago by Brian Deering of the National Drug Intelligence Center (www.hashkeeper.org).
Dan Mares Jan 14 2004 1:27PM Security
Blackout blues ...and what you can do to avoid them

Blackout blues ...and what you can do to avoid them

The recent power outage was a powerful reminder of the value of business continuity provisions. Ron Mobed reports.
Ron Mobed Jan 13 2004 4:58PM Security
Laptop stolen? No need to fret: How to minimize the pain

Laptop stolen? No need to fret: How to minimize the pain

What is the solution to laptop loss? Software tracking, a layered approach to security, or is there another way? Illena Armstrong reports
Illena Armstrong Jan 13 2004 4:49PM Security
Holistic paths to security

Holistic paths to security

Security tools are important for protecting company systems, but, says Adam Lipson, focusing on people can yield better results
Adam Lipson Jan 13 2004 4:36PM Security
Skills to tame the Tigers

Skills to tame the Tigers

Illena Armstrong reports on a project that is seeking to develop the infosecurity professionals of tomorrow
Illena Armstrong Jan 13 2004 3:50PM Security
Owning up to cyberattack

Owning up to cyberattack

A new law in California means you need comprehensive incident and forensics planning says John Patzakis.
John Patzakis Jan 13 2004 2:51PM Security
Kaspersky to protect Samba server

Kaspersky to protect Samba server

Security software developer Kaspersky Labs is bringing its anti-virus protection to Samba file servers.
Dan Ilett Jan 13 2004 2:39PM Security
Free to roam Tackling WLAN security

Free to roam Tackling WLAN security

When employees of the city of Tallahassee asked for wireless access, finding a secure solution seemed almost impossible, says Curtis Franklin
Curtis Franklin Jan 13 2004 1:23PM Security
Time to act: New challenges in 2004

Time to act: New challenges in 2004

Tighter regulation and higher levels of cyber attacks will increase the role of the CSO in 2004. Marcia Savage reports
Marcia Savage Jan 13 2004 11:44AM Security
Battling for budget: Selling security to CEOs

Battling for budget: Selling security to CEOs

If security is seen to enhance business goals Illena Armstrong finds that selling it to the boardroom becomes a much easier task.
Illena Armstrong Jan 13 2004 9:53AM Security
Netilla to take on Europe

Netilla to take on Europe

SSL VPN firm Netilla has chosen provider Wick Hill to be its European distributor to strengthen its hold on the secure remote access market.
Dan Ilett Jan 12 2004 3:21PM Security
Integration: The Only Way to Manage and Grow a Saturated E-security Industry

Integration: The Only Way to Manage and Grow a Saturated E-security Industry

It was recently reported that the worldwide market for IT security and business continuity products and services is growing twice as fast as overall IT industry. By 2006, this market is expected to surpass $150 billion (IDC, 2002).
Russ Cummings Jan 12 2004 2:55PM Security
Is Cyberterrorism a Serious Threat to Commercial Organizations?

Is Cyberterrorism a Serious Threat to Commercial Organizations?

This article appeared in a very abbreviated form in SC Magazine’s January 2003 issue and is presented here in full.
David Love Jan 12 2004 2:46PM Security
Making Life Easier: Top 12 Things CSOs Need to Keep in Mind

Making Life Easier: Top 12 Things CSOs Need to Keep in Mind

1. Keep up with the latest technology -- the bad guys do!
Philip Conrod Jan 12 2004 2:26PM Security
Automated Vulnerability Assessment: How to Underpin Your Security Investment

Automated Vulnerability Assessment: How to Underpin Your Security Investment

Many organizations are now relying upon the vital support that vulnerability assessment can offer as the fourth pillar of security.
Amer Deeba Jan 12 2004 2:10PM Security
Waking Up to Reality: Security and Handheld Computing Devices

Waking Up to Reality: Security and Handheld Computing Devices

Handheld computing devices, like Palms and Pocket PCs, play an essential role in many people’s lives.
Dick Mackey Jan 12 2004 2:04PM Security
Memorized Passwords: The Gateway to Identity Theft

Memorized Passwords: The Gateway to Identity Theft

Identity theft is one of the fastest growing crimes worldwide.
Paul Ardoin Jan 12 2004 1:20PM Security

Log In

  |  Forgot your password?