your

Opinion: Protect data from your staff

Opinion: Protect data from your staff

The rise in data security breaches and trade secret piracy over the past year is a wake-up call for executives. And the threat posed internally is just as great as that at the perimeter.
Jason Ashley, Aug 14 2006 2:44PM Security
Opinion: Protect data from your staff

Opinion: Protect data from your staff

The rise in data security breaches and trade secret piracy over the past year is a wake-up call for executives. And the threat posed internally is just as great as that at the perimeter.
Jason Ashley, Aug 14 2006 2:44PM Security
Be careful where you leave your keys

Be careful where you leave your keys

The internet now has 1.07 billion users worldwide and more people buy online than ever before. But this growth in ecommerce has also created a fertile environment for fraud and security threats.
Richard Moulds Jul 13 2006 11:56AM Security
Hub boosts your laptop's sound

Hub boosts your laptop's sound

Four-port device includes an amp and speakers, and doubles as a battery
charger hub.
Martin Lynch Jul 5 2006 10:00AM Hardware
Get your own personal supercomputer

Get your own personal supercomputer

Tyan has created a mini-supercomputer that can sit beside your desk in the office or classroom.
Martin Lynch Jun 30 2006 9:58AM Hardware
Make your people aware

Make your people aware

Properly planned and executed staff education makes employees more responsible and reaps tangible business benefits. Paul Hansford reports
Staff Writers Jun 12 2006 11:50AM Security
Meet your attackers on their own own turf

Meet your attackers on their own own turf

There’s plenty of talk today about perimeter security strategies. Protecting the perimeter with multilayered security. Identifying the perimeter. The latest buzz on firewalls. Zero-day attacks. Worm storms. Security toolkits with the latest intrusion detection tools. Secure software applications.
Todd Bransford Jun 5 2006 8:28PM Security
Revealing your identity...for an Easter egg

Revealing your identity...for an Easter egg

Research carried out this Easter outside Victoria Station in London has found that 81 percent of people were willing to part with all the personal information needed to steal their identity for the chance to win an Easter egg.
William Eazel Apr 24 2006 10:12AM Security
Your tax info may not be as secure as you think

Your tax info may not be as secure as you think

A rule change proposed by the U.S. Treasury Department and the Internal Revenue Service (IRS) has come under fire from privacy advocates who have taken issue with a clause allowing tax preparers to sell tax-return information to third parties.
Ericka Chickowski Apr 14 2006 9:22PM Security
Your invitation to the SC Forum

Your invitation to the SC Forum

At the SC Magazine Forum, you could gain information, advice and great contacts to help you more readily achieve your goals as an IT security pro. Read on to see if you qualify for a free delegate place.
Staff Writers Apr 14 2006 8:14PM Security
A dress code for your network

A dress code for your network

The huge explosion in mobile working has made organisations recognise the need for effective endpoint security, writes Robert Jaques.
Robert Jaques Apr 5 2006 3:43PM Security
Vaccinate your business against bird flu

Vaccinate your business against bird flu

Over the past few months, birdflu has progressively crept closer to the U.K. What’s this got to do with security you might ask?
Donal Casey Mar 28 2006 9:45AM Security
Protecting your assets

Protecting your assets

The flooring of the Russian stock exchange by malware earlier this year served as a wake-up call for many financial institutions and at the same time brought to mind a recognised computer attack technique: take a system down prior to launching the 'real' attack.
Phil Gould Mar 7 2006 3:18PM Security
The Common Vulnerability Scoring System: Get your threat priorities right

The Common Vulnerability Scoring System: Get your threat priorities right

Over the years, I’ve seen and used a diverse range of methods to evaluate and explain the risks associated with a particular security threat or vulnerability. Depending on the audience and the nature of the environment being evaluated, there has always been – and always will be – a frequent need to reclassify the severity of a finding. This is particularly relevant when making use of findings derived from automated security tools.
Gunter Ollmann Mar 6 2006 7:04PM Security
Warning MP3s Could Seriously Damage Your Reputation

Warning MP3s Could Seriously Damage Your Reputation

So you’re in love with your MP3, you go jogging with it, you sleep with it and you listen to it on the way to work! This year the workplace has become flooded with them as the cheapest MP3s are now sold for as little as £20 storing around 256MB of data. At the top end of the market, digital jukeboxes with storage of 20GB start at under £150 while a 60GB Apple iPod Video player can be had for just £300. That is the same storage capacity as a lot of corporate notebooks.
Martin Allen Feb 3 2006 12:58PM Security
Are your systems just too old?

Are your systems just too old?

Legacy systems are resilient and cost-effective… but were never designed for today’s security needs
Staff Writers Jan 25 2006 2:13PM Security
Safeguarding your inbox

Safeguarding your inbox

Jill Cherveny-Keough never lowers her defenses. When she receives unsolicited email from an unknown source, Cherveny-Keough assumes it contains a worm, virus or verbiage that will attempt to collect and hijack her personal information.
Joseph C. Jan 13 2006 9:19PM Security
Protecting your investment in VoIP

Protecting your investment in VoIP

Within the next two years, most businesses will either pilot or start widescale deployments of voice over IP (VoIP). Why? To extend the capabilities of their phone system, as well as realize significant cost savings.
Goren Fink Dec 19 2005 10:21PM Security
Spyware and users are your top demons

Spyware and users are your top demons

As usual, the SC Magazine readership survey has proven to be a most revealing exercise. Now in its fourth year, the end-of-year survey gives an insight into the mood and daily lives of our readers.
Ron Condon Dec 15 2005 11:02PM Security
Is your SAN or NAS an Achilles heel?

Is your SAN or NAS an Achilles heel?

IT security has long been the focus of corporate attention, while storage security has been — perhaps unnoticeably — absent from the limelight. So it perhaps comes as a surprise to find that the data held in storage environments is frequently left vulnerable, simply because security in this area is so often overlooked.
James Middleton Dec 15 2005 10:36PM Security

Log In

  |  Forgot your password?