Expert analysis
An IT Manager’s Insight Into Securing Removable Media
When I last looked on the Internet to buy a USB memory stick, I found that for a few hundred pounds I could purchase a 4 gigabyte device the size of a pen. That’s a lot …
Not A Patch On The New Breed Of Cyber-Criminal
The cyber-criminal is getting smarter and more organised and alongside this as have their methods of attack. Whereas 2 years ago the watchword was computer viruses, now new …
RSA Conference Europe 2004 Showcase Video
Here’s a showcase of the RSA Conference Europe 2004 in Barcelona. The video is 3:44 minutes in length, available in Windows Media 9 256K (6.9 MB) and 64K (1.7 MB). Click …
The Rise of Security Threats
The current security threats to business IT infrastructures have increased dramatically. Most notable are the rising number of viruses and similar malicious programs that …
“Shooting the Hostage”: Why Current Generation Intrusion Prevention Systems Fails Business
As a corporate security manager, you are caught between a rock and a hard place. Your networks are under attack at an ever-increasing rate, from viruses, worms and people. The …
The Fedora – Red Hat False Vulnerability Scam
It looks like the “evil minds” have found a new way to use spam for their devious plans. This time spam is combined with a scam that will try to use social …
Understanding E-mail Spoofing
If you receive a snail mail letter, you look to the return address in the top left corner as an indicator of where it originated. However, the sender could write any name and …
Tips on Securing Instant Messaging
According to one of the latest research studies, 92% of all commerical and non-commerical organizations are using instant messaging in the enterprise. Tom Buoniello, VP of …
Security Designs of SSL VPNs
During the Infosecurity Europe 2004 show, we caught up with William Orme, Senior Technical Consultant at Whale Communications, and talked to him about SSL VPNs. In this audio …
Viruses In Handheld Devices
The advertising of computer systems is increasingly centered on handheld devices or personal digital assistants (PDAs). Prices of these devices have gone down considerably …
So Many Worms, So Little Time
Introduction Let’s face it; the Internet is a dangerous place, and it’s not getting any better. Statistics show a rapid increase in the rate of Internet-based …
Baselining with Security Templates
The solution to creating and implementing security baselines on computers in your network is to “just do it.” Security baselines establish the foundation for the …