|
Setting the record straight on secure networking | Hits:7 |
July's trial of the Sasser writer Sven Jaschan in Germany brought back some highly unpleasant memories for IT Directors all over the world. Jaschan's actions, and those of other virus writers and hackers in recent years, have ensured... | 06/04/2009 |
Spammed Trojan horse attempts to turn off security on attacked PCs | Hits:12 |
A new Trojan horse has been spammed out to millions of email addresses around the world in an attempt to disable anti-virus and other security software. The spammed out email messages, which have no subject line... | 06/03/2009 |
Gaining the competitive edge through information security | Hits:12 |
Defining, achieving, maintaining, and improving information security can be key to maintaining a competitive edge. Organizations and their information systems and networks are faced with a wide range of security threats, including computer... | 06/03/2009 |
Renault Ireland selects Juniper's SSL VPN for secure remote access | Hits:21 |
Juniper Networks, Inc. has announced that Renault Ireland has selected its Secure Sockets Layer Virtual Private Network (SSL VPN) solution to provide staff with secure remote access to its corporate network. The solution,... | 06/02/2009 |
Using a Network Analyser as a Security Tool | Hits:5 |
Network analysers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features can make the analyser an excellent security tool. Every administrator these days has already built... | 06/02/2009 |
F-Secure launches Internet security suite to protect against spyware, rootkits and uncontrolled Inte | Hits:6 |
F-Secure has today the latest version of its consumer product, F-Secure Internet Security . It contains an automated package of anti-virus tools and advanced features to protect families against the evolving dangers on the Internet... | 06/02/2009 |
Return on TCO – why measure the cost of security? | Hits:10 |
Total Cost of Ownership (TCO) is not a new concept. Management teams at all levels have always wanted to define the real cost of resources in order to plan and manage budgets, but the pressures of today s business environment has... | 06/01/2009 |
Blended Threats - how can you protect against them | Hits:15 |
The arms race between corporate IT managers and virus writers has stepped up a gear. The new weapon developed by authors of malicious code is the blended threat , typified by the recent Sobig.F and Blaster outbreaks, showing just how... | 06/01/2009 |
Whose Site is it Anyway? | Hits:7 |
Exclusively for Security Park, Richard Moulds from nCipher takes a look at the increasing problem of Website spoofing and explains how ecommerce providers can deliver a higher level of trust. Despite the rapid increase in online commerce... | 05/31/2009 |
2012 Olympic Games could suffer a severe cyber attack unless action is taken now | Hits:9 |
Ahead of his keynote speech at this year s Infosecurity Europe exhibition, David Blunkett has warned that the 2012 Olympic Games could suffer a severe cyber attack unless action is taken now. While government should take the lead, Blunkett... | 05/31/2009 |
Manchester ID cards raise risks to personal data security | Hits:7 |
Home Secretary Jacqui Smith has announced plans to introduce optional ID cards for Manchester citizens from Autumn 2009. All passport holders aged 16 and over will be able to apply for an ID card through their local post office, pharmacy... | 05/31/2009 |
Complying with Regulatory and Business Security Needs | Hits:9 |
For most businesses, government agencies, institutions and other organisations, security can at times seem like an overwhelmingly complex challenge. Threats to your data, both real and perceived, loom from all reaches both... | 05/27/2009 |
How do you deal with Patch Management? | Hits:7 |
2003 has been the year of the Worm worms such as Blaster, Slammer, Sobig (various forms) and Code Red, which can all be traced directly to exploitation of unpatched vulnerabilities. And the cost of these worms? Blaster... | 05/27/2009 |
The Unseen attack and its Costs to Web Revenues | Hits:6 |
The dot.com boom saw hyped up expectations of Web sites delivering a click-no-bricks type organisation that could provide profits out of severely reduced operational costs. In the end this proved to be poor business sense for the... | 05/26/2009 |
Cyberwars: How to fight back | Hits:9 |
The current security threats to business IT infrastructures have increased dramatically. Most notable are the rising number of viruses and similar malicious programs that threaten serious financial loss. The numbers of viruses, worms... | 05/26/2009 |
|