you

How do you measure risk? - Tell SC Magazine

How do you measure risk? - Tell SC Magazine

What's your company's approach to risk? How do you measure it? We'd like to hear from you.
Ron Condon Apr 28 2005 1:18PM Security
Don't you know your blog's toxic?

Don't you know your blog's toxic?

Malicious code and keyloggers are been distributed via “toxic” weblogs (blogs) according to security company Websense.
René Millman Apr 14 2005 4:37PM Security
SP2: Coming to an enterprise near you - soon

SP2: Coming to an enterprise near you - soon

Microsoft has hit back at reports businesses are shunning SP2, claiming that the current trend of uptake is very positive.
David Quainton Apr 6 2005 9:31AM Security
Failing to protect systems will turn you into roadkill

Failing to protect systems will turn you into roadkill

It must be conference season. I've never asked my colleagues on the speaking circuit if they've made this observation, but it seems I get a lot of questions that indicate that, although security folks protect their enterprises, they don't protect their security assets.
Peter Stephenson Mar 17 2005 2:04PM Security
Would you show this card to Mom?

Would you show this card to Mom?

Poor performance has prompted a move to learn from the private sector.
Illena Armstrong Mar 16 2005 5:24PM Security
Are you sitting next to a criminal?

Are you sitting next to a criminal?

Computer criminals could be working next to you every day, yet be stealing from your business.
Kathleen O'Connor Jan 11 2005 12:10PM Security
Your passwords can either break you or save you

Your passwords can either break you or save you

Calum Macleod Jan 11 2005 11:10AM Security
What you measure is what you get

What you measure is what you get

Creating Information Security Performance Measures: Five Recommendations for CIOs and CISOs
Edward Schwartz Jan 5 2005 2:07PM Security
Can you trust poachers who turn gamekeeper?

Can you trust poachers who turn gamekeeper?

David Quainton reports on two firms that are taking the risk of having a virus writer on their staff
David Quainton Dec 3 2004 4:28PM Security
Control what you let in

Control what you let in

Neglecting to watch what you allow into your network can create unnecessary threats, says Lance Braunstein
Lance Braunstein Dec 2 2004 5:31PM Security
If you fail to prepare, be prepared to fail

If you fail to prepare, be prepared to fail

Many companies are leaving themselves open to attack by failing to follow a few simple security principles. Roy Hills gives us some helpful hints on how to tighten your firewall security in order to protect your network
Roy Hills Nov 12 2004 5:21PM Security
We are all doomed – if you believe the hype

We are all doomed – if you believe the hype

Jon Tullett Oct 15 2004 4:24PM Security
Balancing security products with management time: are you stretching yourself too thin?

Balancing security products with management time: are you stretching yourself too thin?

With new threats emerging by the second, enterprise security has become paramount. IT managers, however, are faced with the daunting task of coordinating numerous elements from VPNs and e-mail scanning systems to content filters and anti-virus software.
John Edwards Oct 6 2004 3:36PM Security
Do you already know your cyber attacker?

Do you already know your cyber attacker?

The victim of a hardware robbery decided to investigate things further when his business began to suffer. Justice was served as the culprits were caught and legal history was made. Neil Hare-Brown explains how
Neil Hare-Brown Sep 2 2004 3:18PM Security
Balancing security products with management time. Are you stretching yourself too thin?

Balancing security products with management time. Are you stretching yourself too thin?

With new threats emerging by the second, enterprise security has become paramount. IT managers, however, are faced with the daunting task of coordinating numerous elements from VPNs and e-mail scanning systems to content filters and anti-virus software.
John Edwards Aug 31 2004 5:21PM Security
Who do you go to for all your browsing needs?

Who do you go to for all your browsing needs?

Jon Tullett Aug 5 2004 4:18PM Security
Open source. Love it or hate it, but can you trust it?

Open source. Love it or hate it, but can you trust it?

Open source software (OSS) is firmly entrenched in the infrastructure of the Internet, and is now making inroads into the security market too. But although the darling of techies everywhere, OSS has its doubters. In particular, many corporate managers have concerns about support, accountability, and longevity.
Jon Tullett Jul 28 2004 11:15AM Security
Oracle promises channel: we won't abandon you this time

Oracle promises channel: we won't abandon you this time

Senior Oracle executives have used the opening keynote at the company's Australian user conference to reassure channel partners that its often confusing approach to indirect sales has finally solidified.
Angus Kidman Jul 7 2004 12:00AM Software
Can MSSPs help you stay legal?

Can MSSPs help you stay legal?

As organizations adapt to compliance requirements, John Sterlicchi explores the value of having a managed security service provider
John May 13 2004 9:21AM Security
Channel to vendors: We need you

Channel to vendors: We need you

Most resellers and integrators want vendors to assist in the sales process when creating a business case for customers and chasing big deals, according to exclusive research conducted by Channel Enablers in conjunction with CRN.
Byron Connolly Mar 1 2004 12:00AM Hardware

Log In

  |  Forgot your password?