|
|
Defending In Depth |
|
Organisations are under attack. Not from competitors, federal regulations or consumer outrage, although those are concerns. But enterprises - and subsequently their client base - have become marked targets. To leverage ... |
|
|
|
|
|
|
30.03.07
|
|
|
|
|
|
Cyber Security & Other Games |
|
Cyber security has proved to be an elusive goal that now requires a radical shift in the mental models of IT practitioners. The first issue stems from the idealised concept of security with the implicit belief that a system ... |
|
|
|
|
|
|
27.03.07
|
|
|
|
|
|
Second Life, Second Identity? |
|
Information is precious and personal information is perhaps the most valuable information we have. Companies and organisations which collect consumer and customer data use this information to analyse and measure specific ... |
|
|
|
|
|
|
20.03.07
|
|
|
|
|
|
Don't Choke In The Name Of Security |
|
News reports about network security breaches have become commonplace. Accompanying these reports is usually a staggering price tag for network downtime, lost productivity, lost revenue, and loss of customer trust. Each time ... |
|
|
|
|
|
|
14.03.07
|
|
|
|
|
|
A Baker's Dozen Of Security Bytes |
|
The lifespan of laptops, PDAs and smartphones is falling as the pace of technology marches ever onwards. But for every new mobile device purchased by organisations of all sizes there is usually a piece of legacy hardware that ... |
|
|
|
|
|
|
12.03.07
|
|
|
|
|
|
Patching Up Security |
|
CEOs and CFOs know that viruses can damage their business and cost millions. But many do not realise that an anti-virus programme cannot help when it comes to the increasingly frequent flaws that are being exposed in corporate ... |
|
|
|
|
|
|
08.03.07
|
|
|
|
|
|
How Cybercrime Operations Work |
|
Hackers are no longer motivated by notoriety - its now all about the money. Cybercrime has become a profession; a business model - and the demographic of your typical mastermind cybercriminal is changing rapidly from lone ... |
|
|
|
|
|
|
27.02.07
|
|
|
|
|
|
Stop Wasting Money On Penetration Testing |
|
Penetration Testing is the final word in proving that technical compliance and good security pratices are in place - or so it should be. But how do you know if youre getting a good service or not? What if the consultant ... |
|
|
|
|
|
|
22.02.07
|
|
|
|
|
|
HP Spying Case Highlights Data Conundrum |
|
The well-publicised HP spying scandal has again brought into sharp focus the value which companies place on confidential company data and intellectual property. In an attempt to discover how board level information was ... |
|
|
|
|
|
|
21.02.07
|
|
|
|
|
|
Password Malpractice, Are You Guilty? |
|
The explosion of passwords in todays enterprise has created a sea of holes in the security infrastructure. Some CIOs have responded to the challenge by bringing in the lifeboats, figuratively speaking, but in many cases the ... |
|
|
|
|
|
|
16.02.07
|
|
|
|
|
|
Has IT Driven You Crazy? |
|
It has long been maintained that you have to be crazy to work in the IT business, and now its official. A recent study by the U.S. Secret Service, who must be considered eminently qualified to recognise the symptoms, and ... |
|
|
|
|
|
|
07.02.07
|
|
|
|
|
|
People Cannot Be Patched |
|
Around 20 years ago managers working in the food and car industries got together in order to implement comprehensive quality management. Under the slogan Total Quality supply chains and production processes began to be ... |
|
|
|
|
|
|
23.01.07
|
|
|
|
|
|
Creating A Culture Of Security |
|
Why is business still plagued by poor data security? Why do we constantly read stories about security breaches, data theft and customer lawsuits stemming from confidential information getting lost or falling into the wrong ... |
|
|
|
|
|
|
18.01.07
|
|
|
|
|
|
Malware Shift Creates New Challenges |
|
Over the past few years those monitoring trends on malicious Internet activities have noticed a significant change. We are seeing a sizeable decrease in the media grabbing pandemic outbreaks of malicious software. Yet with ... |
|
|
|
|
|
|
16.01.07
|
|
|
|
|
|
Porn Affects Your Pupils! |
|
A recent audit undertaken by my company in a high school uncovered inappropriate images on every PC scanned, which is nearly five times the average figure found in corporations and the number of illicit images found per megabyte ... |
|
|
|
|
|
|
12.01.07
|
|
|
|