Bridging the Telecoms Skills Gap The telecoms sector is booming once again, following five years of relative dormancy. The evidence is everywhere. In the UK alone there’s BT’s 21CN, which will see over 4500 exchanges swapped out in the coming years. Over the summer of this year, we saw the rollout of the UK’s first HDTV-ready, 10GB Ethernet infrastructure for Sky’s triple-play services.
Wednesday, 1 November 2006 03:07 EST | IT Insight
Best Practice for Database Encryption Solutions Encryption can provide strong security for data at rest, but developing a database encryption strategy must take many factors into consideration. Organizations must balance between the requirement for security and the desire for excellent performance.
Tuesday, 31 October 2006 02:54 EST | Information Security
Records Management Reduces Risk Records are paper or digital documents or forms that provide evidence of the activities of organisations and individuals. They are created during normal business activities, and are maintained to comply with regulations and to support operations.
Wednesday, 25 October 2006 03:29 EST | IT Insight
Safend Protector 3.0 Review Today’s enterprises characterized by a proliferation of easily accessible computer ports, such as USB and PCMCIA. In addition, a variety of communication adapters such as wireless and Bluetooth and other storage devices such as digital cameras, smart phones and PDAs all enable effortless access to endpoints.
Tuesday, 24 October 2006 02:51 EST | Reviews
Less Than Zero Threat, part 2 In part 1, we introduced the idea of a Less-Than-Zero threat and defined it relative to a Zero-Day threat. Now, I'll go a little deeper on each and discuss ways to protect your organization from them.
Monday, 23 October 2006 13:46 EST | Information Security
Less Than Zero Threat, Part 1 The security industry and trade press have directed a lot of attention toward the 'Zero-day attack,' promoting it as THE threat to guard against. According to the marketing hype, the Zero-Day attack is the one that you should most fear, so you must put in place measures to defend your organization from it.
Monday, 23 October 2006 13:41 EST | Information Security
Malicious Code Injection: Not Just for SQL More and more, developers are becoming aware of the threats posed by malicious code, and SQL injection in particular, and by leaving code vulnerable to such attacks. However, while SQL is the most popular type of code injection attack, there are several others that can be just as dangerous to your applications and your data, including LDAP injection and XPath injection.
Monday, 23 October 2006 03:03 EST | Information Security
Archive
|
|
Ê
Latest News
SECUDE appoints Open-Source specialist as Linux Expert 02.11.06ÊÊSECUDE IT Security GmbH has confirmed the appointment of Felipe Rodriguez, a Linux Kernel contributor and owner of the Open-Source project MGSTEP, as its Linux Expert.
Increased Spam Fuelled Through Botnet Activities 02.11.06ÊÊMessageLabs, a provider of integrated messaging and web security services to businesses worldwide, has announced the results of its Intelligence Report for October 2006.
How to keep your VoIP net safe 30.10.06ÊÊOne of the major challenges in implementing a converged network is having a coherent security policy for the management and control of a system that is carrying voice, video and data.
User tricks, security treats 30.10.06ÊÊThirteen malevolent spirits may haunt the halls and cubicles of your company, and if you're going to scare them into security compliance you may need to get a little bit spooky yourself.
10 Steps to More Secure Wireless 27.10.06ÊÊWe have all heard about the stories of spammers using open home wireless networks to fill the net with junk mail.
BT acquires Counterpane Internet Security 25.10.06ÊÊBT has announced that it has acquired Counterpane Internet Security, a provider of managed networked security services, as part of its strategy to expand and develop its global professional services capabilities.
Perdemia updates Permission Analyzer 25.10.06ÊÊPerdemia has upgraded Permission Analyzer, a powerful Windows administration tool that quickly determines whether the system access permissions are properly set, need to be changed, or have been altered by people who are not authorized to make changes.
Mac OS Bluetooth exploit - Inqtana.d 25.10.06ÊÊInqtanad is a proof-of-concept exploit, which has not yet been seen in the wild, that is installed on a Mac OS X computer via Bluetooth from a computer or PDA running a Linux system.
|
|