Is your security plan working? A study suggests that whatever your company         is doing right now, it probably isn't enough. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    It's not always the threat of security breaches from the outside that         needs your attention. Sometimes the problem comes from inside your company,         and it isn't always intentional.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    From networking intrusion to virus detection, the basic security         paradigms really haven't changed much in the past. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Take one look at the tangle of cables connecting the computer to its         monitor, peripherals and printers, and it’s not hard to imagine how someone         thought "wireless." Sample the wireless 802.11b network (a.k.a.         Wi-Fi and AirPort) in a café after crawling around on your hands         and knees underneath your desk trying to find a live Ethernet port.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Web services—one of the latest waves in business and technology—is closer to reality now that we almost have an agreed-upon security framework: Security Assertions Markup Language (SAML). It may soon be possible for companies to use Web services securely.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Computer forensics involves knowing where to look for data when a criminal attempts to destroy evidence. Find out how and where to seek data that can lead to catching a criminal.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Impending pressure from the FBI or Congress may force companies to share         evidence of break-ins, or disclose the SEC level of information security         preparedness. Is your company ready? 
                    
		            
                
                    
                    
                    
                 
            
    
                
	                
                    
                                        
		            
                    A hardened operating systems brings security to the Bahá‘í International Community's Web site.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    What's really happened to the security of information technology since Sept. 11?
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    A hardened operating systems brings security to the Bahá‘í International Community's Web site.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Once you've been attacked,         it's far too late. A good diagnostics system, more commonly known as a         forensic program, can provide that preparation.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    You've convinced top management, got the funding, and hired a crackerjack         security staff. Congratulations! Now comes the really hard part. Having a good security staff won't mean a thing if those security pros         aren't effectively integrated into your company, and if they can't develop         solid lines of communication.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Announced at RSA Conference
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    The good news: Administering stand-alone mainframe security is easy.         The bad: Finding people skilled at securing a mainframe in a distributed         environment is very hard.
                    
		            
                
                    
                    
                    
                 
            
                
            
                
	                
                    
                                        
		            
                    Enterprise managers, your end users are teenagers now; they’re running         amok and defying authority simply because they can. They’re doing it subtly         by playing on the Internet and by obscuring their non-business use of         your systems, and aggressively by destroying property when disgruntled.         Ignoring these threats from within will only encourage them.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Is PKI all what it's cracked up to be?
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Reaching out to as many customers as possible means corporate e-business strategies need to consider strategic approaches to e-security as well. 
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Just as explorers introduced disease to previously isolated populations,         opening up corporate systems has added a slew of challenges. Although         security policies were originally designed to keep unwanted intruders         out, they now must also let the right people in, and do it as quickly         and seamlessly as possible.
                    
		            
                
                    
                    
                    
                 
            
                
	                
                    
                                        
		            
                    Rigorous security and high cost of ownership have kept mainframes safe from hackers. But as they become key players in e-business, mainframes could be at risk.