Pages

Thursday, October 27, 2005

(IN)Secure Magazine version 1.4

SNW: Users See Disaster Recovery As a Top Issue - Security Feed - Blog - CSO Magazine

How to pull off a successful proof of concept - Computerworld

SNW: Users concerned about data security, encryption - Computerworld

Addressing Conflicts of Interest in Security Processes

Help's A Firewall Away > October 24, 2005

How to use cryptography to tighten security - Computerworld

Processes are key to IT security, says Gartner

The danger of relying solely on Active Directory for backups

10 Security Myths That Need To Be Put To Rest

How to use cryptography to tighten security - Computerworld

Keychain - Openssh Key Management - OSNews.com

Telcos Strive for Better Global Security

Making signatures more secure / IBM is developing new technology to foil forgers

Fighting cybercrime on a shoestring budget

FISMA guidance nearly complete

Cybereye: Don't neglect the perimeter in your rush to secure data

Banks to blacklist rogue workers in fraud fight | Tech News on ZDNet

Survey: Online Criminals Are Chasing Web Users Away > October 26, 2005

Get Safer Online, NHTCU suggests

Inside hackers' kindergarten (Karen Dearne, OCTOBER 25, 2005)

Security Tools Under Security Threat

Tuesday, October 25, 2005

DNS servers 'vulnerable to attack' - ZDNet UK News

IAC gives agencies manual on IT security compliance

Justice appeals order cutting some Interior systems from Internet

Squabble continues over credit card breach

Skype flaws open computers to attack

Increasing demand for high quality security professionals

Dutch Say Suspects Hacked 1.5M Computers - Yahoo! News

Computer crime, new figures

Cybercrime: new approach

Hackers, Scammers Hide Malicious JavaScript On Web Sites

Symantec Testing Database Security Appliance

One password to rule them all

Security software traps PCs infected by viruses, spyware

Responding to Data-Security Needs

Email Security: How Much is Enough?

BofA hits delay in move to stronger authentication