Expert analysis
ID Theft Protection Solution: Virtual Authentication Devices
Bharosa Virtual Authentication Devices provide the enterprise with optimal defenses against identity theft crimes including phishing, trojans and malware. Their technology …
Spyware is Being Designed For a Broader Audience Than Ever Before
Monitoring spyware used to be advertised primarily for keeping children safe, or for law enforcement agencies. Why does a spouse need remote installation capabilities with …
Finger On The Pulse Of Identity
The contours of the finger, the patterns of the iris and the shape of the hand can all be used to provide strong authentication, but are these – and other – …
Passwords In Security
Breaking into corporate networks, and thereby corporate information, has never been easier. Why? Firstly, access to systems (usually Windows) at the desktop is universal. …
The Gloves Are Off Taking The Fight To The Spammers
2005 has already seen spammers and virus writers become more shrewd, more malicious, more sophisticated and more hungry for commercial gain. The potential damage that this …
Popular Policies: Keeping Storage Secure
Secure storage of data has always been essential for any organisation, of whatever size. In the past this involved accurate filing of paper records, and then keeping the …
Email Security – What Are The Issues?
In today’s electronic world, email is critical to any business being competitive. In most cases it now forms the backbone of most organisations’ day-to-day …
Combat web attacks with Acunetix Web Vulnerability Scanner 2
Start-up company Acunetix recently released Acunetix Web Vulnerability Scanner: a tool to automatically audit website security. Acunetix WVS 2 crawls an entire website, …
Toward the Strategic Security Imperative: Integrating Automated Patch and Vulnerability Management Into an Enterprise-wide Environment
This article explores the trends that are creating requirements for a strategic – rather than a tactical – approach to information security, patch and …
Information Security in Campus and Open Environments
Much of an information security professional’s job involves keeping outsiders away from the internal network. A great deal of time and money is spent on firewalls and …
Flexible, Safe And Secure?
The recent publication of the authoritative Acas and DTI sponsored workplace employment relations survey (WERS) 2004, highlighted the fact that the number of workplaces …
How To Secure Your Wireless Network
The age of wireless computing has brought unprecedented freedom and mobility for computer systems users in a variety of circumstances. Even in the home setting, a wireless …
Featured news
Sponsored
Don't miss
- Overlooked essentials: API security best practices
- SubSnipe: Open-source tool for finding subdomains vulnerable to takeover
- Void Banshee APT exploited “lingering Windows relic” in zero-day attacks
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?