your

Know your customers, inside and out

Know your customers, inside and out

The best way to work with the Patriot Act is to stay one step ahead of the pack, says Kristin Lovejoy
Kristin Lovejoy May 9 2005 12:37PM Security
Is your security event management tool credible?

Is your security event management tool credible?

Security Event Management (SEM) vendors often talk about scalability when addressing the degree to which their products can accommodate growth in a customer's increasing network and/or security requirements.
Roberto Angelino, Apr 20 2005 12:32PM Security
Welcome to your new-look SC Magazine

Welcome to your new-look SC Magazine

We've got a brand-new look in SC Magazine from this month, with a fast-paced new opening section that is designed to give you as complete a picture of what's happening around the world of IT security as you'll find anywhere.
Ron Condon Apr 19 2005 12:58PM Security
Keep a grip on your assets

Keep a grip on your assets

Intellectual property is a company’s best friend, so Cigna’s CISO takes a holistic approach to guarding it. Marcia Savage reports
Marcia Savage Apr 18 2005 12:24PM Security
Don't you know your blog's toxic?

Don't you know your blog's toxic?

Malicious code and keyloggers are been distributed via “toxic” weblogs (blogs) according to security company Websense.
René Millman Apr 14 2005 4:37PM Security
Beware the devil on your desktop

Beware the devil on your desktop

That wireless access point you don’t recognize on the finance boss’s desk could be an open door for hackers. René Millman outlines why
René Millman Apr 13 2005 3:21PM Security
Take control of your security

Take control of your security

Let's face it, managing security policies can give you a headache. Coping with the rules and properties and policies affecting hundreds of devices - firewalls, intrusion prevention systems, and anti-virus servers - is hard enough, and that's before trying to manage them, or change their state.
Amit Tailor Mar 21 2005 3:18PM Security
Complexity can damage your system defences

Complexity can damage your system defences

Staff Writers Jan 14 2005 5:07PM Security
A virus to suit all of your tastes

A virus to suit all of your tastes

Staff Writers Jan 14 2005 5:01PM Security
Your passwords can either break you or save you

Your passwords can either break you or save you

Calum Macleod Jan 11 2005 11:10AM Security
Is your website an easy target?

Is your website an easy target?

Working to strict deadlines and under financial constraints, website developers are often forced to place security near the bottom of the list of requirements. Marcia Savage looks at the inevitable consequences
Marcia Savage Jan 7 2005 12:38PM Security
Protect your Crown Jewels

Protect your Crown Jewels

Companies need to change their attitudes to outsourcing, says Neil Lloyd.
Neil Lloyd Jan 4 2005 2:36PM Security
The zombies are ready to attack your networks

The zombies are ready to attack your networks

Nick Barron Dec 6 2004 4:34PM Security
Know your facts ... it’s all in the research

Know your facts ... it’s all in the research

Gerhard Eschelbeck realized that understanding a threat makes it easier to combat. We asked him to explain his four Laws of Vulnerabilities
Gerhard Eschelbeck Dec 2 2004 12:06PM Security
It’s time to tame your networks

It’s time to tame your networks

Had enough of trying to keep track of the ever increasing number of devices that claim to protect your network? Tareque Choudhury explains how centralized management can be the solution to gaining control
Tareque Choudhury Nov 12 2004 5:19PM Security
Will your company make the grade?

Will your company make the grade?

As the deadline to comply with the Sarbanes-Oxley Act looms, companies are getting themselves ready, Marcia Savage reports
Marcia Savage Nov 12 2004 5:13PM Security
Why it’s time to get physical with your computer

Why it’s time to get physical with your computer

Nick Barron Nov 12 2004 4:55PM Security
The trouble with your double

The trouble with your double

It is estimated that identity theft accounts for nearly 40 per cent of all white collar crime in the UK. How can you protect yourself and your business from falling victim to this growing problem?
Geoff Webster Nov 10 2004 10:59AM Security
Biometrics: How to plan your very own project

Biometrics: How to plan your very own project

Good planning before you implement biometrics is key if you want to reap the benefits of this technology, Martin Jacobs explains why
Martin Jacobs Oct 15 2004 4:22PM Security
How valuable is your data?

How valuable is your data?

We have seen it in ‘The Thomas Crown Affair’ and ‘Star Wars’ and countless other movies. But could it happen in real life? Could a fraudster posing as somebody else easily get their hands on valuable assets?
Joanna Shields Oct 6 2004 3:36PM Security

Log In

  |  Forgot your password?