Security


Know Your Vulnerabilities

Is your security plan working? A study suggests that whatever your company is doing right now, it probably isn't enough.

Test Data: Security Loophole?

It's not always the threat of security breaches from the outside that needs your attention. Sometimes the problem comes from inside your company, and it isn't always intentional.

Getting in Front of Security

From networking intrusion to virus detection, the basic security paradigms really haven't changed much in the past.

Wireless Insecurity

Take one look at the tangle of cables connecting the computer to its monitor, peripherals and printers, and it’s not hard to imagine how someone thought "wireless." Sample the wireless 802.11b network (a.k.a. Wi-Fi and AirPort) in a café after crawling around on your hands and knees underneath your desk trying to find a live Ethernet port.

Securing Web Services

Web services—one of the latest waves in business and technology—is closer to reality now that we almost have an agreed-upon security framework: Security Assertions Markup Language (SAML). It may soon be possible for companies to use Web services securely.

Shell Game

Computer forensics involves knowing where to look for data when a criminal attempts to destroy evidence. Find out how and where to seek data that can lead to catching a criminal.

The Homeland Security Imperative

Impending pressure from the FBI or Congress may force companies to share evidence of break-ins, or disclose the SEC level of information security preparedness. Is your company ready?



Defending the Faith

A hardened operating systems brings security to the Bahá‘í International Community's Web site.

Homeland Defense: Are We Walking the Talk?

What's really happened to the security of information technology since Sept. 11?

Defending the Faith

A hardened operating systems brings security to the Bahá‘í International Community's Web site.

Unleash the Cyberhounds!

Once you've been attacked, it's far too late. A good diagnostics system, more commonly known as a forensic program, can provide that preparation.

Put a Good Security Staff in its Place

You've convinced top management, got the funding, and hired a crackerjack security staff. Congratulations! Now comes the really hard part. Having a good security staff won't mean a thing if those security pros aren't effectively integrated into your company, and if they can't develop solid lines of communication.

CA Updates PKI Product

Announced at RSA Conference

The Search for Good Security Staff

The good news: Administering stand-alone mainframe security is easy. The bad: Finding people skilled at securing a mainframe in a distributed environment is very hard.

Security Angst

Enterprise managers, your end users are teenagers now; they’re running amok and defying authority simply because they can. They’re doing it subtly by playing on the Internet and by obscuring their non-business use of your systems, and aggressively by destroying property when disgruntled. Ignoring these threats from within will only encourage them.

Pandora's Box or Panacea?

Is PKI all what it's cracked up to be?

E-Security: Growing Threats Require New Strategies

Reaching out to as many customers as possible means corporate e-business strategies need to consider strategic approaches to e-security as well.

Security

Just as explorers introduced disease to previously isolated populations, opening up corporate systems has added a slew of challenges. Although security policies were originally designed to keep unwanted intruders out, they now must also let the right people in, and do it as quickly and seamlessly as possible.

That Insecure Feeling

Rigorous security and high cost of ownership have kept mainframes safe from hackers. But as they become key players in e-business, mainframes could be at risk.