your

Why is your network firewall falling short?

Why is your network firewall falling short?

Your network is secure, your servers are safe, and you’ve done everything to protect your network, corporate assets and intellectual property. You have a network firewall, so your perimeter is secure. Your network devices and servers are only accessible through your corporate VPN via two-factor authentication, and all external ports are blocked to non-authenticated traffic.
Alan Murphy Dec 15 2005 11:54AM Security
Your mission? Explain the basics

Your mission? Explain the basics

Paul Simmonds Dec 9 2005 4:38PM Security
Get your priorities right

Get your priorities right

With a bit more effort, threats can be more accurately assessed and prioritised, says Gunter Ollmann
Gunter Ollmann Dec 9 2005 3:49PM Security
Watch your threats

Watch your threats

George Washington University needed to boost its vulnerability scanning in a mixed system environment. By Marcia Savage
Marcia Savage Nov 11 2005 4:10PM Security
Measure your work to prove your value

Measure your work to prove your value

Illena Armstrong Nov 11 2005 11:22AM Security
Give us your views in our 2005 survey

Give us your views in our 2005 survey

Ron Condon Nov 10 2005 4:38PM Security
Find your perfect partner

Find your perfect partner

Outsourcing needn’t be a leap of faith. René Millman looks at how to get the best from third-party security
René Millman Nov 9 2005 3:49PM Security
Ignore application security at your peril!

Ignore application security at your peril!

With malicious attacks at an all time high, the emphasis put on securing the corporate network has led to many companies investing in technologies such as firewalls and intrusion detection systems. Yet whilst companies have been busy securing the network, they have largely ignored the area of application security.
Sarah Saltzman Sep 19 2005 2:26PM Security
Use USBs at your peril, survey warns

Use USBs at your peril, survey warns

Employees are putting their company’s data at risk by not using encrypted USB devices, a new survey has revealed.
David Quainton Aug 26 2005 4:02PM Security
New IM worm speaks your language

New IM worm speaks your language

Researchers at Akonix Systems said they found a new variant of the Kelvir instant messaging worm that adapts to the language of a user's system.
Marcia Savage Aug 24 2005 9:57PM Security
How to make your database secure

How to make your database secure

Data security experts are raising the alarm: viruses are getting increasingly more specialized and have lately attacked SQL Server installations that did not install the latest Microsoft security patches.
Martin Teetz Aug 1 2005 11:10AM Security
Blogging your secrets away?

Blogging your secrets away?

Blogs aren’t all bad. And there are practices you can adopt to protect trade secrets
Staff Writers Jul 22 2005 2:36PM Security
Write down your passwords, increase security

Write down your passwords, increase security

Security buffs have urged employees to write down their passwords in hopes that people will not use the same weak phrase repeatedly, thereby increasing security.
Melissa Loveday Jul 20 2005 5:14PM Security
Why IPS won't break your network

Why IPS won't break your network

Back in 2003 Gartner declared Intrusion Detection Systems (IDS) as dead. Whether this is true, it is an increasing reality that intrusion protection or prevention systems are increasingly becoming a part of many company's networks. While IDS may be waning, IPS (Intrusion Protection Systems) are on the up, yet there is still a pervasive feeling that such technology can cause a network to break or malfunction.
Simon Smith Jul 12 2005 11:28AM Security
Are backups your back door?

Are backups your back door?

You might assume tapes have some kind of protection built-in, but you’d be wrong
Joanna Shields Jul 1 2005 2:07PM Security
Pull on your chief executive’s shoes

Pull on your chief executive’s shoes

Information security professionals are great at taking orders. Business leaders tell us what they want and we'll respond. We'll write rules and policies for use of email, the internet or remote access and we'll act as policemen when these rules are breached. But there's a real need for security professionals to step a little further outside this box.
Bob Spencer Jul 1 2005 12:56PM Security
Make mobility a part of your strategy

Make mobility a part of your strategy

Staff Writers Jun 21 2005 10:48AM Security
Auditors are your new best friends

Auditors are your new best friends

When auditors come calling, CISOs often feel more burdened. But as GM’s Jay Taylor tells Marcia Savage, auditors can really help them
Marcia Savage Jun 16 2005 3:20PM Security
Don't buy your way out of trouble

Don't buy your way out of trouble

The problem with most security companies is they are very product driven - you name your security problem, and they can sell you a product to fix it. Whilst it's always tempting to think that you can fix a problem by buying something from a catalogue, the reality is often very different.
Adrian Polley Jun 13 2005 11:20AM Security
This is your early warning system

This is your early warning system

Pen testing and vulnerability assessments are essentials. But how often and when these checks are made varies from one company to the next, as Marcia Savage found out
Marcia Savage May 12 2005 4:56PM Security

Log In

  |  Forgot your password?