Monthly Archives: June 2001

Passing the Safe Harbor By

0
Dun & Bradstreet Corp. wasted no time in November when U.S. companies were given an easier way to comply with Europes tough privacy laws.The...

Virtually Insecure

0
In October 2000, Microsoft discovered that someone had broken into its internal network, evidently using a Trojan horse program to commandeer the PC of...

A Healthy Security Attitude

0
The biggest security risk to any organization comes from within. The Computer Crime and Security Survey conducted by the Computer Security Institute has found...

NATs Not Without Trouble

0
A network address translation (NAT) device increases security, making it more difficult for hackers to find your clients network. Couple NAT with a stateful...

Protecting the PDA

0
In what amounts to a 180-degree reversal, the mobile computing industry is starting to take security seriously.Certicom Corp. and F-Secure Corp. are each preparing...

The Social Engineering of Security

0
A few weeks ago, I was talking to the operations manager of a medium-size bank in New England. We were discussing a new commercial...

Finding Pros for IT Security

0
Soured economy or no, you still have to have the skills of a sleuth to find information security professionals.How bad is the dearth? Lee...

eWeek Labs Recommends: Key Security Resources

0
The following sites are tried-and-true security destinations. Every IT pro should bookmark and visit these sites—often.www.securityfocus.com Home of the Bugtraq mailing list archive, plus...

No Mac Is An Island

0
At its recent Worldwide Developers Conference, Apple Computer turned up the pressure on third-party Mac developers to expedite porting their applications to Mac OS...

Tools Keep Track of Servers

0
Veritas Software Corp. is rolling out several tools it says will make it easier for IT administrators to manage, monitor and maintain servers.The tools—Global...