you

Would you like broadband with that?

Would you like broadband with that?

Telstra will activate wireless hotspots in 44 MacDonald’s outlets across Australia, offering users wireless broadband access starting today.
Nirmal Chandrasena Feb 20 2004 12:00AM Telco/ISP
Friday 13: should you beware?

Friday 13: should you beware?

Vivienne Fisher Feb 13 2004 12:00AM Security
The spy within: So who can you trust?

The spy within: So who can you trust?

Technology can only go so far in protecting company secrets. As Nick Booth discovers, people are the most vulnerable resource
Nick Booth Jan 22 2004 11:26AM Security
On the Highway: Forensics really can help you stop future attacks

On the Highway: Forensics really can help you stop future attacks

Those who forget the past are condemned to repeat it.
Peter Stephenson Jan 22 2004 11:15AM Security
U.S. Secret Service Electronic Crimes Task Force - We Need You to Join Us!

U.S. Secret Service Electronic Crimes Task Force - We Need You to Join Us!

And we really mean it!
Jack Wiles Jan 19 2004 11:21AM Security
Thinking About Security as you Build Your Architecture

Thinking About Security as you Build Your Architecture

The security of an environment is often won or lost at the architecture level.
Brad Johnson, Jan 19 2004 9:47AM Security
Can You Trust Microsoft?

Can You Trust Microsoft?

This year has seen Microsoft out and about wearing its shiny new security cap, proud of internal and external initiatives which it promises will bring about Bill Gates' defined goal of 'trustworthy computing.'
Jon Tullett Jan 16 2004 4:32PM Security
Protecting our Children - You Need to Read This!

Protecting our Children - You Need to Read This!

It's no secret that we now live in a world where technical changes are coming at us at an ever-increasing rate.
Jack Wiles Jan 16 2004 2:46PM Security
You Have Been Warned

You Have Been Warned

My email went belly up the other weekend, despite the fact that yours truly has been using the Internet since the late 1980s and had taken solid precautions against problems occurring.
Steve Gold Jan 16 2004 2:06PM Security
Authentication - Was That Really You Who Just Logged In?

Authentication - Was That Really You Who Just Logged In?

For this month’s article, I felt a need to address one of my most frequent concerns - authentication.
Jack Wiles Jan 16 2004 1:08PM Security
Suspicious Web Services Want YOU!

Suspicious Web Services Want YOU!

The other day, while I was going about my browsing, a pop-under ad stopped by.
Jon Tullett Jan 16 2004 1:02PM Security
Is Information Security Crossing the Proverbial You Know What?

Is Information Security Crossing the Proverbial You Know What?

Information security is a hot topic these days, something that often gets credited to an increased awareness of terrorism.
Dan Taylor Jan 16 2004 11:37AM Security
Computer Forensics - You Need It Now More Than Ever!

Computer Forensics - You Need It Now More Than Ever!

A lot of new terms have come at us over the past decade as computers have reached an unbelievable level of sophistication and speed.
Jack Wiles Jan 16 2004 10:59AM Security
Planning for a disaster is half the work - Can you recover?

Planning for a disaster is half the work - Can you recover?

Increasingly, companies are implementing business continuity plans to ensure the constant availability and support of the company infrastructure and business processes.
Phil Carter Jan 15 2004 1:43PM Security
Dedication is what you need?

Dedication is what you need?

In an ideal world, every company would have a dedicated recovery center to ensure information availability 24/7/365. It is the ultimate defense against unforeseen circumstances impacting on critical business functions.
Andrew Waterston Jan 15 2004 11:14AM Security
Not Everything You Always Wanted to Know About Web Services Security

Not Everything You Always Wanted to Know About Web Services Security

Woody Allen, that famous web services guru and comedian on the side, once described James Joyce as “the most incomprehensible and hence the finest poet of his time.”
Throop Wilder Jan 15 2004 10:13AM Security
Would You Please Swear in the Chief Security Officer?

Would You Please Swear in the Chief Security Officer?

As defense counsel to a corporation or as the chief security officer, hearing such words should send immeasurable fear through the hearts of each participant at any time you are sworn in.
Michael P. Jan 14 2004 3:22PM Security
A Practical and Realistic Approach for Testing the Performance of Firewalls: What Your Security Vendors Don't Want You to Know

A Practical and Realistic Approach for Testing the Performance of Firewalls: What Your Security Vendors Don't Want You to Know

While Internet security has always been important, only recently has it emerged as an important issue for almost all who use the Internet.
Johnson Wu, Jan 14 2004 3:01PM Security
How do you stop the threat from within?

How do you stop the threat from within?

The biggest threat to security is not from outside, it is from the company employee. Julie Jervis asked security experts throughout the U.S. how they are educating these end-users
Julie Jervis Jan 13 2004 5:15PM Security
Blackout blues ...and what you can do to avoid them

Blackout blues ...and what you can do to avoid them

The recent power outage was a powerful reminder of the value of business continuity provisions. Ron Mobed reports.
Ron Mobed Jan 13 2004 4:58PM Security

Log In

  |  Forgot your password?