Pages

Friday, May 06, 2005

PC-dumping ex-prosecutor mired in teen porn scandal | The Register

PC-dumping ex-prosecutor mired in teen porn scandal | The Register

Much Controversy Over Google's Accelerator-InsideGoogle - part of the Blog News Channel

� Much Controversy Over Google's Accelerator��InsideGoogle - part of the Blog News Channel

Recent compromises highlight the need for strong security practices and policies

Recent compromises highlight the need for strong security practices and policies

SecurityFocus HOME News: Americans are pants at password security

SecurityFocus HOME News: Americans are pants at password security

Wired News: Your Identity, Open to All

Wired News: Your Identity, Open to All

CIOs lose sleep over security, not revenue - silicon.com

CIOs lose sleep over security, not revenue - silicon.com

Microsoft: Exchange encryption on the cards: ZDNet Australia: News: Software

Microsoft: Exchange encryption on the cards: ZDNet Australia: News: Software

U.S. military security defeated by copy and paste | CNET News.com

U.S. military security defeated by copy and paste | CNET News.com

Credit cards: $5mn stolen from ATMs

Credit cards: $5mn stolen from ATMs

Wednesday, May 04, 2005

Legal Technology - Can Electronic Info Be Kept Secret?

Legal Technology - Can Electronic Info Be Kept Secret?

Affordable Disaster Recovery for SMBs Within Reach

Affordable Disaster Recovery for SMBs Within Reach

HIPAA Security: Don't Disband the Committee Just Yet (Journal of AHIMA)

HIPAA Security: Don't Disband the Committee Just Yet (Journal of AHIMA)

Surviving the politics of IT - Computerworld

Surviving the politics of IT - Computerworld

Data Losses Blamed On Stores And Software

Data Losses Blamed On Stores And Software

Cisco slammed for RFID staff tracker - vnunet.com

Cisco slammed for RFID staff tracker - vnunet.com

Bill calls for encrypted Social Security cards / Lawmaker sees proposal as a way to thwart illegal immigrants and would-be terrorists

Bill calls for encrypted Social Security cards / Lawmaker sees proposal as a way to thwart illegal immigrants and would-be terrorists

Security Starts With Hard Thought, Not Hard Ware - BIOS : Technology For Business

Security Starts With Hard Thought, Not Hard Ware - BIOS : Technology For Business

Devil\'s Advocate: Biometrics offer false hope - silicon.com

Devil\'s Advocate: Biometrics offer false hope - silicon.com

IT Observer - Mobile Security: Data goes walkabout

IT Observer - Mobile Security: Data goes walkabout

Tuesday, May 03, 2005

Internet fraud hits bank customer

The New Zealand Herald

TNC Endpoint Security Gains Traction

TNC Endpoint Security Gains Traction

Outsourcing Woes Trouble Leading Companies

Outsourcing Woes Trouble Leading Companies

Now you see it; now you don't: US faces embarassment over PDF security

Now you see it; now you don't: US faces embarassment over PDF security

InformationWeek > Network security > Eight Top Tips For Network Security > May 1, 2005

InformationWeek > Network security > Eight Top Tips For Network Security > May 1, 2005

CastleCops - How A Security Specialist Fell Victim To Attack

CastleCops - How A Security Specialist Fell Victim To Attack

Messaging Pipeline | Increased IM Federation Is Good News -- And Bad

Messaging Pipeline | Increased IM Federation Is Good News -- And Bad

Messaging Pipeline | Opinion: Why The Enterprise Is Ready For Presence Technology

Messaging Pipeline | Opinion: Why The Enterprise Is Ready For Presence Technology

Bank Systems & Technology : Security Pros Respond to New Jersey Bank Breach

Bank Systems & Technology : Security Pros Respond to New Jersey Bank Breach

Bank Systems & Technology : How United Bankers' Bank Ensures Customer Authentication Online

Bank Systems & Technology : How United Bankers' Bank Ensures Customer Authentication Online

A Reassuring Touch

A Reassuring Touch

Monday, May 02, 2005

CIO Today - Worldwide Technology - Protecting Laptops in the Enterprise

CIO Today - Worldwide Technology - Protecting Laptops in the Enterprise

SANS Top 20 Vulnerabilities - The Experts Consensus

SANS Top 20 Vulnerabilities - The Experts Consensus

Data for 600,000 Time Warner employees MIA | Tech News on ZDNet

Data for 600,000 Time Warner employees MIA | Tech News on ZDNet

Backup tapes are backdoor for ID thieves | The Register

Backup tapes are backdoor for ID thieves | The Register

Cisco wears a big target, plugs IOS leaks

Cisco wears a big target, plugs IOS leaks

Group to demo ways to secure desktops

Group to demo ways to secure desktops

As GAO watches IRS works to patch security holes

As GAO watches IRS works to patch security holes

IT Execs Scurry To Consolidate... - Computerworld

IT Execs Scurry To Consolidate... - Computerworld

Security Log - Computerworld

Security Log - Computerworld

Secunia - Advisories - GlobalScape Secure FTP Command Parsing Buffer Overflow

Secunia - Advisories - GlobalScape Secure FTP Command Parsing Buffer Overflow

IT Observer - Internet Telephony and Security

IT Observer - Internet Telephony and Security