Please turn on your JavaScript for this page to function normally.
Combat web attacks with Acunetix Web Vulnerability Scanner 2

Start-up company Acunetix recently released Acunetix Web Vulnerability Scanner: a tool to automatically audit website security. Acunetix WVS 2 crawls an entire website, …

Toward the Strategic Security Imperative: Integrating Automated Patch and Vulnerability Management Into an Enterprise-wide Environment

This article explores the trends that are creating requirements for a strategic – rather than a tactical – approach to information security, patch and …

Information Security in Campus and Open Environments

Much of an information security professional’s job involves keeping outsiders away from the internal network. A great deal of time and money is spent on firewalls and …

Flexible, Safe And Secure?

The recent publication of the authoritative Acas and DTI sponsored workplace employment relations survey (WERS) 2004, highlighted the fact that the number of workplaces …

How To Secure Your Wireless Network

The age of wireless computing has brought unprecedented freedom and mobility for computer systems users in a variety of circumstances. Even in the home setting, a wireless …

An IT Manager’s Guide to Provisioning and Identity Management

Provisioning is the job of ensuring that, at all times during their career with an employer, staff have all of the necessary access privileges, equipment and other IT …

Linux Security – Is it Ready For The Average User?

There seems to be a new important security patch out for Linux every month, lots of “do not use this program” warnings, too many articles and books with too little …

Trike – A Conceptual Framework for Threat Modeling

Trike is a unified conceptual framework for security auditing from a risk management perspective through the generation of threat models in a reliable, repeatable manner. A …

New Car Safe for your IT Equipment

SecureITsafe Ltd have just announced the launch of a totally portable steel case that can be mounted in the boot of any car using the existing vehicle anchorages. The high …

Prepare For Disasters That Could Bring Your Business To A Halt

Many companies associate disaster recovery with catastrophic events – earthquakes, floods, fires and other natural or man-made disasters that make data recovery from …

Data Breaches: Turn Back the Tide

Executive Summary Despite the hundreds of millions of dollars that organizations have invested in information security technology to secure their critical business-technology …

Don't miss

Cybersecurity news