Pages

Friday, May 20, 2005

HP muscles in on small-business security

Company is attempting to simplify security for small companies that lack IT resources or knowledge.

Trio of security holes kick sysadmins in teeth

CONFESSIONS OF A CTO

Maybe it?s the culture of Jerry Springer, Dr. Phil, and Oprah, but whatever is at the root of it, it seems that many CSOs and CIOs have suddenly decided to bare their souls and come clean, and as a result are discovering that like most things in life...

Example of phishing email

IOL: Finance/ Labour

Banks Delay Transfers To Stop Phisher Thievery

IT Observer - Information Security Issues for Instant Messaging

IT Observer - Information Security Issues for Instant Messaging

Compliance Pipeline | How To: Using Identity Management To Demonstrate HIPAA Compliance

Compliance Pipeline | How To: Using Identity Management To Demonstrate HIPAA Compliance

Thursday, May 19, 2005

JPMorgan Launches 'Contactless' Credit Card

JPMorgan Launches 'Contactless' Credit Card

First Sarbanes-Oxley Prosecution Under Way

First Sarbanes-Oxley Prosecution Under Way

Encryption: the key to secure data?

Encryption: the key to secure data?

Computers Seized in Data-Theft Probe

Computers�Seized in Data-Theft Probe

Data theft involving four banks could affect 500,000 customers - Computerworld

Data theft involving four banks could affect 500,000 customers - Computerworld

InformationWeek > Desktop Search > Google Pushes Security In Enterprise Desktop Search Launch > May 18, 2005

InformationWeek > Desktop Search > Google Pushes Security In Enterprise Desktop Search Launch > May 18, 2005

Let the experts secure IT

Let the experts secure IT

Security Pipeline | How To Avoid Getting Spyware

Security Pipeline | How To Avoid Getting Spyware

Security Pipeline | Enterprise Employees Clueless About Phishing

Security Pipeline | Enterprise Employees Clueless About Phishing

Wednesday, May 18, 2005

Patients Skip the Clipboards with Online Medical Records

Patients Skip the Clipboards with Online Medical Records

Security's shortcoming: Too many machines, not enough training

Security's shortcoming: Too many machines, not enough training

The hottest business you never heard of | Perspectives | CNET News.com

The hottest business you never heard of | Perspectives | CNET News.com

Lax security leaving networks wide open - IT Week

Lax security leaving networks wide open - IT Week

CardTrak - "Tracking Bank Credit & Payment Cards for the American Consumer"

CardTrak - "Tracking Bank Credit & Payment Cards for the American Consumer"

Vendors agree vulnerability scoring system | The Register

Vendors agree vulnerability scoring system | The Register

Revenge motivates insider hacking attacks | The Register

Revenge motivates insider hacking attacks | The Register

Take This Job and Shove It - CSO Magazine - May 2005

Take This Job and Shove It - CSO Magazine - May 2005

asahi.com:Web sites get costly lesson in security-ENGLISH

asahi.com:Web sites get costly lesson in security�-�ENGLISH

AP Wire | 05/17/2005 | State programmer accused of hacking was a 'satisfactory' employee

AP Wire | 05/17/2005 | State programmer accused of hacking was a 'satisfactory' employee

IT-Analysis.com - When businesses have their identities stol

IT-Analysis.com - When businesses have their identities stol

Lurking Liabilities in Security Law - Computerworld

Lurking Liabilities in Security Law - Computerworld

Privacy breaches: How to avoid making headlines

Privacy breaches: How to avoid making headlines

Students Find Personal Data Easy To Access - Security Feed - Blog - CSO Magazine

Students Find Personal Data Easy To Access - Security Feed - Blog - CSO Magazine

Study: Disgruntled Workers Likely Saboteurs - Yahoo! News

Study: Disgruntled Workers Likely Saboteurs - Yahoo! News

Tuesday, May 17, 2005

WS-I Security Document Identifies Web Services Threats

WS-I Security Document Identifies Web Services Threats

IT Observer - Identity Theft-More Than Just a Security Threat

IT Observer - Identity Theft � More Than Just a Security Threat

IT Observer - IM at Work Means Extra Security Threats

IT Observer - IM at Work Means Extra Security Threats

Hoax mail tries to crack FNB passwords

Hoax mail tries to crack FNB passwords

ISD 2005: Five strategies security managers can't afford to ignore

ISD 2005: Five strategies security managers can't afford to ignore

SecurityFocus HOME News: Phishing gets personal

SecurityFocus HOME News: Phishing gets personal

Preserving Digital Evidence to Bring Hackers and Attackers to Justice

Preserving Digital Evidence to Bring Hackers and Attackers to Justice

Security breach hits another online bank - WhatPC?

Security breach hits another online bank - WhatPC?

Upgraded Wi-Fi Security for Windows XP SP2

Upgraded Wi-Fi Security for Windows XP SP2

Prepared to Be Probed... | eGov monitor

Prepared to Be Probed... | eGov monitor

Insider hackers 'driven by hate of bosses'

Insider hackers 'driven by hate of bosses'

BBC NEWS | Business | The enemy within

BBC NEWS | Business | The enemy within

Monday, May 16, 2005

F.B.I. Said to Misuse Funds for Health Fraud Cases - New York Times

F.B.I. Said to Misuse Funds for Health Fraud Cases - New York Times

U.S. Military and Government Computers Hacked by Teenager (Security Holes)

U.S. Military and Government Computers Hacked by Teenager (Security Holes)

Security in the headlines | InfoWorld | Column | 2005-05-16 | By Steve Fox

Security in the headlines | InfoWorld | Column | 2005-05-16 | By Steve Fox

Security's weakest links | InfoWorld | Analysis | 2005-05-16 | By Bob Francis

Security�s weakest links | InfoWorld | Analysis | 2005-05-16 | By Bob Francis

Another HIPAA round - 2005-05-16

Another HIPAA round - 2005-05-16

Data-Security Laws Sprout In Wake Of Breaches

Data-Security Laws Sprout In Wake Of Breaches

Wachovia and BofA Notifying Customers of Security Breach

Wachovia and BofA Notifying Customers of Security Breach

Schneider Electric - ATS International - New way to secure Ethernet networks against hackers

Schneider Electric - ATS International - New way to secure Ethernet networks against hackers

HometownAnnapolis.com, Top Stories - Shoplifters use aluminum to foil store security

HometownAnnapolis.com, Top Stories - Shoplifters use aluminum to foil store security

APP.COM - Web Extra: Online job hunters snared by fraud

APP.COM - Web Extra: Online job hunters snared by fraud

IT Observer - Confessions of a CTO

IT Observer - Confessions of a CTO

eEye Spies More Holes in IE, Outlook

eEye Spies More Holes in IE, Outlook